VulNet: Roasted
Last updated
Last updated
Lets run some nmap scans to find open ports and services running on them
Lets enumerate the SMB Shares using Smbmap as anonymous
Looks like we can read the IPC$ , lets enumerate valid domain users using impacket's lookupsid.py, lets save the output in a file called usernames. (Hit Enter for when it asks for the password)
Now lets only get the usernames from the file and save it into the same file
Now lets use another python script from impacket that will check if there are any valid usernames and if they require Kerberos pre-authentication(PREAUTH) enabled. The domain is vulnnet-rst.local as we saw in the nmap scan. Also lets save any hashes we get in a file called asrep_hashes.txt
We have a hash, lets crack it using hashcat
We have the password. Now lets try to access the smb shares with the credentials. Lets first look at the shares.
We have two new shares, lets look at NETLOGIN first and download the available files onto our machine
Lets look at the file
We have credentials, lets login to the machine.
Lets read the user flag
Lets look at what this user can do in more detail
We belong the the admin group, so lets dump hashes with another impacket tool
Lets login as admin
Lets read the admin flag