TL;DR
- We have found some shares on the machine
- A password in the shares gives us access to the server
- On the server winPEAS has found an autologon password
- Using secretdumps with the password we have found reveals the administrator NTLM hashes
NETWORK
ENUMERATION
Shares
Let’s download everything with the following command
smbclient "\\\\172.31.1.4\\Office_share" -c 'prompt OFF;recurse ON;mget *' -U '%'
We have found something interesting
find . -type f -exec echo -e '\n===\n' \; -exec cat {} \;
FOOTHOLD
Password spray
Because we have a list of users, we can test them against the password we have found
Let’s generate some valid name
the following crammapexec has revealed the password to be working for the user “jcakes”
Reverse shell
Using the the credentials found, we get access on the machine
PRIV ESCALATION
From user jcakes to user bdover
Enumeration with winPEASany.exe has reveals some autologon information
Using crackmapexec, we have found that this password works with user bdover
Dumping credentials
Using the admin NTLM hash we get access to the machine as administrator