192.168.249.141 (MS01)

Enumeration

sudo nmap -sV -A -T4 -p- 192.168.129.141 -Pn -o target.fullmap141

Username
Password
Hash
Hash Type

nurhodelta

password

$2y$10$fCOiMky4n5hCJx3cpsG20Od4wHtlkCLKmO6VLobJNRIg9ooHTkgjK

bcrypt

  • Apparently this is a rabbit hole, we are supposed to exploit the service itself

Exploitation

Initial Foothold

OR

  • Get the reverse shell as mary regardless

Privilege Escalation

chevron-rightAlternate Method with PrintSpooferhashtag
  • The example provided is done after the change made to match the OSCP+ exam format

    • Eric Wallows is a credential set provided, and is used to start a ssh connection with .141

    • Running whoami /priv shows us that Eric has the same permissions as Mary Williams, hence the approach to priv escalate ended up being the same

Username
Password
NTLM Hash

MS01/Administrator

December31

3c4495bbd678fac8c9d218be4f2bbc7b

MS01/Mary.Williams

< Cannot be cracked >

9a3121977ee93af56ebd0ef4f527a35e

OSCP/eric.wallows

EricLikesRunning800

a1f18f9362b5485cca07aedda6792454

OSCP/celia.almeda

e728ecbadfb02f51ce8eed753f3ff3fd

  • Good to know that celia.almeda is an active account

Last updated