Heist

got 3 users, 3 passwords (one cracked using john), tried to login but failed… (tried all options) please help me

i got 9 users and 3 passwords, i discovered shares on user.
any help?

Find more users.

(JadeWolf + Comments on Forum + Google) / Loosing Marbles = Root Dance!!!

Lesson learned trying to download a file from Windows, RTFM on the software that you connected to the box with // Once you find the password it is a Windows machine and don’t used **** but m******r

ROOTED! THANKS @noi !

Rooted.

First Windows machine for me, i was a bit confused per moments x)

Thanks for the machine !

Feel free to PM me for hints (user / root)

was able to get c*****.txt and user:pwd but cant figure out how to get e*** a******?

Great machine for those new to exploiting Windows, like myself. I learned a lot from this machine, thanks @MinatoTW! Techinically there is no exploitation involved (making it the perfect machine for practicing you Windows-fu), its a game of “find the creds”. All the tips you need are in the first 11-12 pages already. Here are some things to read up on though:

Powershell
Impacket
Process Memory Dumps
Windows Sysinternals

Also FYI if anyone is wondering why the metasploit modules don’t work, a quick inspection using wireshark shows msf sends the request in SOAP format, which causes the server to respond with a 500 code.

Hey guys,

This is my first Windows box, and I’m having some trouble with even figuring out how to start off… I discovered the three plaintext passwords from the C*.txt file, along with the two users H* and A*. Not sure what to do with this information…

If you’d like to help, please shoot me a PM! I’d appreciate it :slight_smile:

hey this is my first windows box and i have found the /a*********/c*****.txt file on the website but dont really know where to go from here.
any help would be appreciated

root, fun box. was late to party so did the intended way.
al hints are in the first 10 pages.

I keep getting this when I try to run strings… Anyone know why

Please be aware that, similar to other debug tools that capture “process state” information, files saved by
Sysinternals tools may include personally identifiable or other sensitive information(such as usernames, passwords,
paths to files accessed, and paths to registry accessed).By using this software, you acknowledge that you are aware of
this and take sole responsibility for any personally identifiable or other sensitive information provided to Microsoft
or any other party through your use of the software.

There was an option to disable the eua.
Saw it on the microsoftwebsite

Rhaa, stuck !

I’ve found the 3 creds, cracked passwords
Figured out the user / password combination for the first user
found more users using impacket
msf helped me validate which creds were working or not
I can list shares with two users…

W***m doesn’t work though…but I’m not sure how to use it though

I don’t know what to do from here, can someone help me ?
Thanks !

Type your comment> @archaic said:

Rhaa, stuck !

I’ve found the 3 creds, cracked passwords
Figured out the user / password combination for the first user
found more users using impacket
msf helped me validate which creds were working or not
I can list shares with two users…

W***m doesn’t work though…but I’m not sure how to use it though

I don’t know what to do from here, can someone help me ?
Thanks !

Do not use Metasploit W***m.

ROOTED !!

Ouf, got User, thanks to bumika
Had just a typo in a username (stupid). Caps matter

Maybe someone can help here. After getting user, did you change shells to pursue root? I’m currently using ev*******m, and not able to execute commands to pursue that.

This was a fun one… Had a great time…

PS > whoami
supportdesk\administrator

First box rooted on HTB for me, got a lot of help from the forum… Fun ride with a lot of fun and new information !

I lost a lot of time because the hashes file I was feeding hashcat didn’t end with a newline. It needs a newline.