NVM: After I posted this, I got user in few minutes. Cracked more passwords from the con*** file.
How in the ■■■■ can you crack “more” passwords from the c***** file considering there’s only 3 things to decrypt?
At the time when I posted here, I only cracked one password from the c***** file, the secret 5 password.
After that, I cracked the other 2 passwords from the same file.
■■■■, so i have 3 passwords and 3 usernames. I am able to connect to the share with the credentials. I have tried using the ruby script and other w**** tools but keep getting authentication errors. I even tried using my windows vm to user more native w**** tools. Can someone push me towards the right direction! I would greatly appreciate it!
■■■■, so i have 3 passwords and 3 usernames. I am able to connect to the share with the credentials. I have tried using the ruby script and other w**** tools but keep getting authentication errors. I even tried using my windows vm to user more native w**** tools. Can someone push me towards the right direction! I would greatly appreciate it!
Try metasploit module to check right combination of those creds
Currently working on root but seem to have hit a brick wall. I’m pretty certain I’ve figured out the correct application as the file I’m looking at has been mentioned several times in the forum, however I haven’t been able to decrypt it. Uploaded an application to get the password but it was ineffective as a master password seems to be in use.
A lot of the previous comments imply that the answer is much simpler than it might appear. Would really appreciate a nudge in the right direction. Heading to bed now - sorry if I don’t respond for a few hours.
usernames and 3 cracked passwrds from c***** file didn’t help authenticate neither ./l***d.py script nor msf w login module. Any help on how to get the correct username?
Update : Rooted! The root was so simple than user. Wasted a day for root complicating things…
Ok so I have 3 password and 3 username which i got from the file they give you
I can connect to samba / rpc but i cant enumerate from this cause few rights
i tried the rb script and evil-winrm on both windows and linux machine
I tried to bruteforce username with the 3 password using the metasploit auxiliary tool
I obviously tried all the combinations between these username/password
Still doesnt work, im really stuck, I already tried all the options.
hey, anybody could help me out? I can’t get opencl to work on my ivybridge soo… can’t really do that one thing I’m supposed to do. I know what I should, but unable. Could anyone give it to me? Thanks
–edit: got it, got in to the s**** but nothing seems to be up there. Please some nudge?
hey, anybody could help me out? I can’t get opencl to work on my ivybridge soo… can’t really do that one thing I’m supposed to do. I know what I should, but unable. Could anyone give it to me? Thanks
–edit: got it, got in to the s**** but nothing seems to be up there. Please some nudge?
I’ve got 3 sets of creds. I tried metasploits w****_lo***, previously linked evil-w**r* and a python winrm lib too (wrote my own little wrapper for a pass checker brute forcer all combinations). Nothing seems to work. I tried adding some obvious/stock ones like Administrator. Nothing, going nuts about how to utilise these creds, they can’t be for nothing… please nudge
This is the easiest root privesc I’ve made. But I’ve not followed the usual path as most people to get it… So yeah there are 2 ways (at least) to get root.