Academy Help Windows file transfer module

Upload the attached file named upload_win.zip to the target using the method of your choice. Once uploaded, RDP to the box, unzip the archive, and run “hasher upload_win.txt” from the command line. Submit the generated hash as your answer.

No matter what i do, the hash i get does not seem to be right.
I cant transfer the file using power shell for some reason, so i gave up on that and i used my own powershell, which i assume the result would be the same if i used HTB’s powershell

out of 4 hash types i tried they are all wrong apparently ?
can someone help me?

I just found a solution for us, you can’t upload files to the windows virtual machine in the usual way but we can indirectly upload the upload_win.zip file to the windows server, what you need to do is:

1)encode the file upload_win.zip with the system you used to download it in base64
2)copy the base64 string you just got and use the following command at the parrot-htb virtual machine to get the original .zip file:
echo <base64_value> | base64 -d -w 0 > upload_win.zip
3)you run http server service at parrot virtual machine
4)RDP to the window virtual machine and download the file upload_win.zip from the parrot virtual machine by the command in module
=> you will have .zip file in your Windows VM

1 Like

Oh no you didnt :smiley: Im sort of frustrated, as the guidelines are very clear.
Upload without RDPing.
RDP after you uploaded.

1 Like

did you solve the question?

i almost the same solution, i’m living in mainland China, thanks for the GFVV, i cant use rdp tool(mstsc) to connect the final target directly, even i connected the vpn which htb provides me.
then i tried to connect the pwnbox first ,but in the box ,it seems cannt connect the target , WTF, i feel angry

now am tring to use the hasher in my computer to calculate the .txt file, it’s looks very silly.

Exactly! From Kali how can I upload without rdping?
Perhaps the question assume that we have a windows attack machine.

In my opinion, with Kali/parrot and only with the knowledge of this section/module this is can’t be achieved!

Uhh it is really easier than it looks like, I simply downloaded the file into my VM box “Kali” then I extracted the contents to examine what they where and it turns out it was a simple txt file with codes. I then RDPed into the target and on the desktop there is already a txt file which I simply copy-pasted the codes from the extracted file and then in the target I open CMD and cd to Desktop , and then run “hasher upload_win.txt” and got the generated hash :alien:

Hello, there are two of us, don’t be discouraged :D, try this (with pwnbox):

  1. wget https://academy.hackthebox.com/storage/modules/24/upload_win.zip
  2. xfree rdp /v:[[ip]] /u:[[user]] /p: [[password]]
  3. impacket-smbserver share -smb2suppport [[file path]]
  4. (with CMD) copy [[ip]]\share\upload_win.zip . (I recommend going to Desktop)
  5. hasher upload_win.txt
1 Like

Done!