Monteverde

The guessing game for the user part is rly lame…
I use c***me with a custom wordlist and it finds nothing.

Can someone pm me pls ?

EDIT : Found it. Thanks for the PM guys !
Just try every samaccountname you see here even if you think it is a group. It was my error.

Spoiler Removed

Type your comment> @Crafty said:

The guessing game for the user part is rly lame…
I use c***me with a custom wordlist and it finds nothing.

Can someone pm me pls ?

You don’t need a wordlist and it’s not a guessing game.

Type your comment> @dpgg said:

Type your comment> @Crafty said:

The guessing game for the user part is rly lame…
I use c***me with a custom wordlist and it finds nothing.

Can someone pm me pls ?

You don’t need a wordlist and it’s not a guessing game.

Yes it’s a guessing game and yes you need a wordlist because there are few users here.

For user, think basic enumeration and basic tools. There is some guessing involved, but a simple for loop in bash is more than enough, and honestly isn’t much faster than just manually testing.

also tried cme for winrm and smb with no luck, used top300-rockyou wordlist, ping me if anyone had luck with this approach

Spoiler Removed

Spoiler Removed

Spoiler Removed

Hi ,

I found username and pass word with cme , but i couldn executre command on the system with this password using cme and e***-***rm , any hits please…

best wishes

So trying to get a certain exploit working via the evil but not sure what I should edit… atm when I run it literally nothing happens, or rather nothing is returned…

Please PM me if you can help, and if you found another way to root, please point me in that direction.

Thanks,

Type your comment> @n3m3n said:

Hi ,

I found username and pass word with cme , but i couldn executre command on the system with this password using cme and e***-***rm , any hits please…

best wishes

I think you may have just a bit more enumeration to do. Try enumerating a very common service with what you have found.

i got user!!!
only basic tools.
enum…

Got user it was easy but frustrating for me
Hints;
Basic enum and you have list of users just remember the lazy admin here who does not care about passwords at all
then do more general enum and you should have some thing that could go along with evil

Fun box! Learned quite a bit as well. Thanks @egre55

got user, on to root

oups

Type your comment> @gverre said:

oups

nope i still have errors :smiley:

I just finished the machine.
All in all it was a good and fun machine. Thanks to the creator :slight_smile:

I hope this is ok to leave here as someone may find it useful GitHub - tobor88/ReversePowerShell: Functions that can be used to gain Reverse Shells with PowerShell