Hackthebox - Heist
Contents
From nmap, there are some service opened.
With further scanning, I found that port 5985 and 49668 are opened as well.
This is the web page.
Press Login as guest
, we are redirected to issues.php
. hazard
could be a username.
I got config.txt
from the Attachment
. There are some credentials encrypted. One is md5, I use hashcat to decrypt it.
Since they mentioned cisco router
in issues.php
, I used ciscot7.py
to decrypt cisco type 7 password.
Now I got 3 usernames and 3 passwords, I used crackmapexec
to see which pair can login to smb.
I can login to rpc with this credential as well, so I use lookupsid.py
to get more usernames.
I used winrm_login
module in msf, trying to find the credential pair for winrm.
I got connected as chase
with evil-winrm
.
I access C:\inetpub\wwwroot\login.php
to find the credential for the web portal.
I cracked the password from a cracking website, and get login as administrator
with this password using evil-winrm
.
Author L3o
LastMod 2020-05-26