TL;DR

  • We have found some shares on the machine
  • A password in the shares gives us access to the server
  • On the server winPEAS has found an autologon password
  • Using secretdumps with the password we have found reveals the administrator NTLM hashes

NETWORK

ENUMERATION

Shares

Let’s download everything with the following command

smbclient "\\\\172.31.1.4\\Office_share" -c 'prompt OFF;recurse ON;mget *' -U '%'

We have found something interesting

find . -type f -exec echo -e '\n===\n' \; -exec cat {} \;

FOOTHOLD

Password spray

Because we have a list of users, we can test them against the password we have found

Let’s generate some valid name

the following crammapexec has revealed the password to be working for the user “jcakes”

Reverse shell

Using the the credentials found, we get access on the machine

PRIV ESCALATION

From user jcakes to user bdover

Enumeration with winPEASany.exe has reveals some autologon information

Using crackmapexec, we have found that this password works with user bdover

Dumping credentials

Using the admin NTLM hash we get access to the machine as administrator


CAPTURE FLAGS