Am I meant to be able to successfully login/authenticate to the wm service using the hd account? Or, am I meant to do password guessing against the users obtained from l******d.py ? Any help is appreciated
To help you, there is a module on metasploit, which let you test usernames-passwords on the remote system to see if you can login. It also gives you the option to make a file of user-pass combinations and use it to test all of these and see what and how many combinations are correct.
PS: That module do not let you login , but finds the right combination
Hi, I’ve found two passwords in the “file”. I think the username could be Hd, rr or a***n.
I tried with smbclient, I failed.
I tried witn WM, I failed.
I tried with lo***d.py I failed.
I tried with Metasploit, I failed.
I tried many other tools but nothing worked. I can’t access the shares or connect to a service.
Don’t know what to do…
You’ll need to do something with lo******d.py with what you have (play around with the information sets here, you need both a working cred including both username and password) to get more information. From there, try playing with the other service you are aware of. A useful github repo has been previously linked in this thread.
Cracked secret 5 password. Have 3 users from con*** file, and few more from impacket script.
Do I have to crack/find more passwords in order to use that high port exploit? With the current credentials a receive invalid login.
Many thanks!
NVM: After I posted this, I got user in few minutes. Cracked more passwords from the con*** file.
NVM: After I posted this, I got user in few minutes. Cracked more passwords from the con*** file.
How in the ■■■■ can you crack “more” passwords from the c***** file considering there’s only 3 things to decrypt?
At the time when I posted here, I only cracked one password from the c***** file, the secret 5 password.
After that, I cracked the other 2 passwords from the same file.
■■■■, so i have 3 passwords and 3 usernames. I am able to connect to the share with the credentials. I have tried using the ruby script and other w**** tools but keep getting authentication errors. I even tried using my windows vm to user more native w**** tools. Can someone push me towards the right direction! I would greatly appreciate it!
■■■■, so i have 3 passwords and 3 usernames. I am able to connect to the share with the credentials. I have tried using the ruby script and other w**** tools but keep getting authentication errors. I even tried using my windows vm to user more native w**** tools. Can someone push me towards the right direction! I would greatly appreciate it!
Try metasploit module to check right combination of those creds
Currently working on root but seem to have hit a brick wall. I’m pretty certain I’ve figured out the correct application as the file I’m looking at has been mentioned several times in the forum, however I haven’t been able to decrypt it. Uploaded an application to get the password but it was ineffective as a master password seems to be in use.
A lot of the previous comments imply that the answer is much simpler than it might appear. Would really appreciate a nudge in the right direction. Heading to bed now - sorry if I don’t respond for a few hours.
usernames and 3 cracked passwrds from c***** file didn’t help authenticate neither ./l***d.py script nor msf w login module. Any help on how to get the correct username?
Update : Rooted! The root was so simple than user. Wasted a day for root complicating things…
Ok so I have 3 password and 3 username which i got from the file they give you
I can connect to samba / rpc but i cant enumerate from this cause few rights
i tried the rb script and evil-winrm on both windows and linux machine
I tried to bruteforce username with the 3 password using the metasploit auxiliary tool
I obviously tried all the combinations between these username/password
Still doesnt work, im really stuck, I already tried all the options.