HTB | Bastion
Last updated
Last updated
This is a Windows box. You can find it here.
Extracting passwords from SAM
Exploiting MRemoteNG
IP: 10.10.10.134
smbclient gives share
We can connect to Backup and found note.txt
On looking further we found backup files
Here we can see .vhd files refer to this article for mounting .vhd files on Kali
Mount the share and guestmount the .vhd file
With full access to the file system, I have access to the registry files. These files can be locked when the system is running, but I won’t have that issue on a mounted drive. In the config directory where the registry hives are stored, I’ll use secretsdump.py to dump the password hashes:
Found the hashes and password for L4mpje
We saw port 22 open let's ssh
and we are in
found user.txt
found mRemoteNG
On looking further we found confCons.xml
copy the file to our system
found mRemoteNG_password_decrypt.
found the administrator password
we are in and found the root.txt