Need help regarding the actual user shell.
I’ve obtained a username and a password, but I’ve tried attacking all the ports I could find with a lot of the impacket execs (smbexec,psexec,wmiexec), and some metasploit things. The user just seems to have no access to anything meaningful? Appreciate either a DM or a hint here. I feel like I’m really close, but missing something silly
Need help regarding the actual user shell.
I’ve obtained a username and a password, but I’ve tried attacking all the ports I could find with a lot of the impacket execs (smbexec,psexec,wmiexec), and some metasploit things. The user just seems to have no access to anything meaningful? Appreciate either a DM or a hint here. I feel like I’m really close, but missing something silly
If you don’t know the tool you will never find this, check @mcruz comment on the previous page
I did not need to use that dog tool to get root. PTH’ in the house. Going to work on learning a little more. It sounds like this is the perfect time to set up that Windows Vm to learn working with that other tool so I will be do that as well. Thanks to the creators. Shout out to @egre55 who is probably my favorite box maker.
Without a doubt the hardest one I’ve done so far. Very little experience with windows. Needed alot of help with this one, but hopefully I learned something. Did not even have fun with this box, since there were only a few things I figured out by myself and not looking at some tutorial or asking someone on the forum. Thanks to all those who helped.
Normally don’t comment. Really stuck on this one… Used nmap sb**u**s.ne to get users. Not sure if I’m missing some or what, but I can’t get the impacket scripts to work without passwords. Banging my head against the wall.
Need help regarding the actual user shell.
I’ve obtained a username and a password, but I’ve tried attacking all the ports I could find with a lot of the impacket execs (smbexec,psexec,wmiexec), and some metasploit things. The user just seems to have no access to anything meaningful? Appreciate either a DM or a hint here. I feel like I’m really close, but missing something silly
If you don’t know the tool you will never find this, check @mcruz comment on the previous page
I did see it previously, but I couldn’t figure out what “EVIL” meant
EDIT: Nevermind, found it. But now I’m confused as to why all my other tools failed. What made this tool special?
hmm I have user creds but no flag, though I just got the admin hash… for user I see a share that I have read permissions to and can use a tool to list the files but I can’t connect to read or download them. please help this poor newb out
update
I have user since I was DM’d a good tool to use. There was no need to access that share
hmm I have user creds but no flag, though I just got the admin hash… for user I see a share that I have read permissions to and can use a tool to list the files but I can’t connect to read or download them. please help this poor newb out
update
I have user since I was DM’d a good tool to use. There was no need to access that share
Same problem I found the user password and discover a New attack on keberos but I wasn’t able to get the flag or a shell…
struggling with root at the moment, i’m looking at the dog tool and see many many paths but it feels like im just going down rabbit holes, any tiny hint on the next step would be appreciated!