SMB - 445
Anonymous access is allowed and we can list shares.
smbmap -H 10.10.10.100
[+] IP: 10.10.10.100:445 Name: 10.10.10.100
Disk Permissions Comment
---- ----------- -------
ADMIN$ NO ACCESS Remote Admin
C$ NO ACCESS Default share
IPC$ NO ACCESS Remote IPC
NETLOGON NO ACCESS Logon server share
Replication READ ONLY
SYSVOL NO ACCESS Logon server share
Users NO ACCESS Going through the replication share:
smbclient -N //10.10.10.100/ReplicationReplication/
└── Policies/
└── {GUID}/
├── GPT.INI # Defines the Group Policy Template version
├── Machine/ # Contains machine-specific policies
│ ├── Registry.pol # Registry settings for the machine
│ ├── Scripts/ # Startup/shutdown scripts
│ ├── Preferences/ # Group Policy Preferences settings
├── User/ # Contains user-specific policies
│ ├── Registry.pol # Registry settings for the user
│ ├── Scripts/ # Logon/logoff scripts
│ ├── Preferences/ # User-specific preferences
├── ADM/ # Administrative Templates (older GPOs)
├── GPT.CACHE/ # Cached policy settings
└── GPO.XML # XML representation of the policy (newer versions)We find a file:
We find our first set of credentials set. Password here is encrypted. After a bit of googling I learned about the MS14-025 vulnerability. The cpassword is encrypted with a weak AES-32 bit algorithm and MS also posted the key in their docs.
Here it is: active.htb\SVC_TGS:GPPstillStandingStrong2k18
Last updated