Heist - HackTheBox

image (28)

I started by doing a scan with Nmap to detect the ports and services that the machine has open.

nmap1 (1)

Seeing that there was a web server, I headed over to it.

pagina (1)

I had a login panel, I looked at the source code and noticed some routes that caught my attention.

codigofuente (1)

I accessed /login.php?guest=true and found a conversation between the user and the admin, the user left a link that had another route, look what it had.

paginamenaje

I had a few hashes, I thought they might be credentials for the main page login.

contraseñaencriptada

Crack the first one with john the ripper.

contraseñacrackeada (1)

I validated the user hazard who had a conversation with the admin and the cracked credential with crackmapexec and it turned out to be successful.

pruebaconcrackmapexec (1)

I tried different users in the login panel but no luck, I also tried to see if I had access to any shared resources with smbclient but found nothing.

intentodesmbclient

I thought of another alternative, try to dump more users with the user hazard and the password cracked with john using the tool lookupsid.py.

usodelookupsid

I dumped a few of them, and with the ones I had I created a user dictionary to brute force another password cracked from another hash.

crackpassword

For brute force I used the crackmapexec tool, it detected that the user Chase was valid.

credencialultima

I authenticated with evil-winrm and I could now see the user flag.

flagdeuser


ESCALADA DE PRIVILEGIOS

For privilege escalation I found Firefox processes running on the system.

findstr

I downloaded the procdump64.exe utility and dumped it into a Firefox process.

procdump

I made a string from the dump and exported it to a file called cred.txt, filtered it by login.php and it reported some credentials, I tried to validate them with crackmapexec using the Administrator user.

pnwed

Dio pwned that allowed me to log in with psexec with maximum privileges.

psexec

I was also able to access it with evil-winrm.

evilwinrmadmin+

Leave a comment