I wanted to connect via RDP to the machine, instead of staying on the webshell.
I ran this command to enable RDP on the machine: Set-ItemProperty -Path 'HKLM:\System\CurrentControlSet\Control\Terminal Server' -name 'fDenyTSConnections' -value 0, but I cannot connect to it.
xfreerdp tells me the connection fails (not even speaking about authenticating).
I know it is not mandatory for this box but I just wanted to know if it was possible, and if yes, how
I got it, but now I’m stuck trying to get to the DC01 domain but I got some nt hashes from the administrator but don’t know how to connect to the dc01, at the question “Take over the domain and submit the contents of the flag.txt file on the Administrator Desktop on DC01”
mkevin,
I have the NTL of the administrator just stuck on how to execute the PTH to DC01, I use mimikatz and I get a new window when I use the admins ntlm but I still cant access the DC, any hints?
Mike,
I am at that point and now am stuck on how I get access to the DC? I tried doing the PTH attack with admin user but it seems it is not working, I feel like I am missing one small step.
Thank you for your time.
Hint on accessing the DC01?
I am using chisel for my proxy tunnel, I am authenticating with the DC via crackmapexec however I cant find the flag.
Thank you
I got rdp connection but I have no tools (like powerView) on MS01 to do some further enumeration, do we need them and if yes, how can we bring files from our attacker’s machine to MS01? (I know that we had “File transfer” module, but I’m not sure how to do it with proxy connection to the target )
Within Skills assessment 1, tools like powerview are blocked, that being said you need to use crackmapexec to access the DC01. I used the tool raiseChild.py via impacket to obtain the DC01 admin hash. Once I obtained the DC01 admin hash i then used CME, to enumerate the DC to find the flag on the Desktop. Think CME with the -x parameter.
To copy tools over to MS01 from your attack host, you can literally copy past the tool over, or use certutil however in this assessment those ways are blocked.
thank you everyone for your awesome tips they’re much appreciated i found myself referring back to older modules and getting back to the basics. i would refer to file transfer module, password attack module, and pivoting tunneling and porttforwarding module. best of luck to everyone. and thank you once again.