hmm
Any help on decrypting the co**C****.xml?
I’ve been trying with Metasploit module and a rb decoder I found online but nothing seems to work.
EDIT: Rooted. Great VM. I really enjoyed it and find out a couple of Windows related things that I didn’t know. Thanks @L4mpje.
To those that have this issue. Just download what you need locally and search on google ways of looking up password using the Program linked to xml file.
Feel free to PM me for hints
Type your comment> @DameDrewby said:
Type your comment> @bashocker said:
Frustrating box for us new at pen testing. I can only mount the large vhd but not the small one. Any suggestions?
That’s the only one you should need
Thanks! I have been trying to figure this part out for no reason
I need a nudge. I have the x*l file and saw to use decryptor but cannot get it to work for admin password.
Just got root only using linux vm, nice box @L4mpje!
I’ve been reading the forum and saw everybody mentioning that root would be difficult. Sometimes you should use come google hacking to get better results. I can tell you there is a very useful snake script to decrypt a certain password. Only a base64 looking string is needed.
Rooted! Did everything in Kali no need for the Windows VM. Just look into Mounting in Linux.
User: After Mount You have everything you need. Look for the Windows equivalent of /etc/*
Root: Look at the Programs, Research ones you don’t know.
Feel free to PM me if you need a nudge.
I´m having this issue trying to decrypt the CC.*ml with 0xNoOne ´s script… any idea how can I fix it? Thanks!
File “mremoteng_decrypt.py”, line 49, in
main()
File “mremoteng_decrypt.py”, line 45, in main
plaintext = cipher.decrypt_and_verify(ciphertext, tag)
File “/usr/lib/python3/dist-packages/Cryptodome/Cipher/_mode_gcm.py”, line 504, in decrypt_and_verify
self.verify(received_mac_tag)
File “/usr/lib/python3/dist-packages/Cryptodome/Cipher/_mode_gcm.py”, line 456, in verify
raise ValueError(“MAC check failed”)
ValueError: MAC check failed
Type your comment> @zfyra
Check your DM
Kind of stuck at the moment with the root portion. Firstly, this is my first box so I am not as knowledgeable. I am fairly certain i know of the weak link on the system but not sure how to implement the .py, I ‘think’ is correct, to the windows system if that is even what i need to do. I would like to maintain using Linux if possible and not resort to Windows emulator. I read people using the mr*r but I am unfamiliar with it and cant seem to figure it out. If someone could PM me I would greatly appreciate it.
Edit: Figured it out, fun box a lot of stupid mistakes on my part. Thanks @L4mpje !
Cheers @L4mpje for forcing me to learn some basic windows enum. This was my first window machine. Just rooted with Linux only no need for a window VM. Note all the hints have been mentioned just Enum + think + decrypt + google
Rooted. Thanks @L4mpje . Its nice box
User: Enumeration and mount
Root: Enumeration and research
Feel free to PM me for hints
I cracked the HASH from the S*M Database. Now i am stuck. please give me hint
Good box.
User: Mounting all the things is the way to go, once that’s done, just extracting and cracking files is enough and can be done without much system resources.
Root: This one had me stumped for a while. Turns out, I missed one of the flags in a script that I had found earlier that proved useful. This box CAN be rooted without a Windows VM.
Could anyone pm me how they cracked the passwords after extraction? i can’t get HC or Jonny to play ball
I am totally new here. Please I Need Help to solve box
Type your comment> @sebaileyus said:
Could anyone pm me how they cracked the passwords after extraction? i can’t get HC or Jonny to play ball
Buddy is very simple (I was stuck for a while) use the py script on this forum… don’t put jonny to play…
I just rooted! Thanks @L4mpje I learned a loooooottt.
need a nudge on SSh…Anybody
User’d and root’d,
tons of fun, not sure if you ever find this in the wild but a very interesting box!
Usered and rooted Bastion today. It was really interesting and fun box to hack, much easier after the “Heist” though. Thanks for the efforts @L4mpje!