Iām in the db. Iām trying to send a request to my server (re**r) so that i can fetch the Nv2.
But, my server is always excepting the error āErrno 104 Connection reset by peerā
Initially before using Im*****t to authenticate, I also tried me*******t modules. I was getting the same error. Can someone help me with this?
Update: The problem was with my machine and mis-configured server that was handling the request. Itās solved.
Got root shell!
Awesome box, learned a lot about Windows enumeration & priv esc.
Also learned new tricks with I*****t and M-**L.
Thanks to @DarkNight2019 for some hints with initial shell.
Feel to PM me if you need help with the box.
Having issues with reverse shell on this box. I am a windows noob. Can anyone point me in the right direction? I have m**vc account and can run commands.
What to do after getting the NT hash. I tried to crack it but unsuccessful. Do we have to use those hash to login to some other service or do something more with the MS*** queries.
Please dm for any hints.
Thanks
Trying to get into the SMB service. Tried all the tools and scripts mentioned in the last 14 pages, downloaded them from multiple places (GitHub, repos), no dice. Like others have said, anonymous login/null session doesnāt seem viable. Am noob, mostly Linux experience. Windows hacking is another world to me. Hints would be greatly appreciated.
Kind of a n00b here so I could use a hint. I have a UN and PW for ML from a certain file and Iāve tried DR and ML enumeration and X********L and **C Enumeration and Iām getting nowhere after double digit hours on this box. Probably missing something simple to a proper admin.
Still stuck in the same spot. I have re***g user and pass from the XM file macro, but I canāt use it to login on SL, SB, or anything Iām seeing. I feel like I need to enumerate more, but Iām not sure what else I havenāt tried. Hints and tips appreciated
Just got a login into ml. Now am trying to use x*****e to get a connection back so I can capture the ntlm hash. I canāt seem to crack the hash for m*******c user. Anyone I can pm?
Just got a login into ml. Now am trying to use x*****e to get a connection back so I can capture the ntlm hash. I canāt seem to crack the hash for m*******c user. Anyone I can pm?
PM me with what program youāve tried and what is the syntax, might be able to help
Alright, been stuck on privesc for several hours. Able to execute commands via XP, but honestly lost on where to go from there. Canāt seem to establish a reverse shell of any kind.
Okay, finally found some shares. Only tool that worked for me out of the dozen I tried was a Metasploit script, which Iām trying to avoid due to the OSCP restrictions. Really interested in what everyone else used. Found Rep****, but still canāt log in. I know this is probably ridiculously simple, but Iām stumped. Can I get a PM, please?