Skip to content

Latest commit

 

History

History
130 lines (66 loc) · 4.22 KB

heist.md

File metadata and controls

130 lines (66 loc) · 4.22 KB

HEIST HACKTHEBOX

ENUMERATION

NMAP

image

WEB

image

I login as guest

image

I see this messages talking about problems with cisco router

image

If you click in Attachment you can see intersting things:

image

I copy and save this to my machine and i clone this repository to deecrypt cisco passwords:

https://github.com/theevilbit/ciscot7

I crack very easy the passwords:

image

This are the credentials:

image

I create users.txt file with hazard (user from forum) admin (file) rout3r (file)

And i create a passwords.txt witw both cracked passwords

Password Spryng:

image

0 results...

I go back to Hazard file and i see other hash:

image

I try to crack it:

image

Perfect, now i put in passwords file and i try other Password Sprying:

image

PERFECT!! I have credentials!

I try crackmapexec to test winrm to access to victim local machine bur anytthing:

image

New Resources:

image

I can't access to RPC

But i have Read Permisions in IPC$ share smb resource

I can enumerate users with lookupsid.py from impacket python library

image

I do this regular expresion to save users in users.txt file:

image

I try other password spying and...

image

I have credentials to Chase user:

image

I can access with evil-winrm to victim machine!

image

I find this processes for firefox

image

I try to use procdump for 64 bits

I download from here: https://docs.microsoft.com/en-us/sysinternals/downloads/procdump

I upload to victim machine

image

I search firefox process:

image

I have dumped

image

I start to download this to my kali machine.

I do strings and i found password:

image

I have admin Creds!!

PWNED!!

image

THANKS!

Video for this in this youtube channel:

https://www.youtube.com/channel/UCmMvgBYm3m53losIj2pE9jA