Infiltrator HTB
by dogedofedoge - Saturday August 31, 2024 at 07:45 PM
#81
(Sep 01, 2024, 12:39 PM)x1rx Wrote:
(Sep 01, 2024, 12:35 PM)jsvensson Wrote:
(Sep 01, 2024, 12:28 PM)x1rx Wrote: winrm_svc pass


from cryptography.hazmat.primitives.ciphers import Cipher, algorithms, modes
from cryptography.hazmat.primitives import serialization
from cryptography.hazmat.backends import default_backend
import base64

def decrypt_string(key: str, cipher_text: str) -> str:
    key_bytes = key.encode('utf-8')
    cipher_bytes = base64.b64decode(cipher_text)

    if len(key_bytes) not in {16, 24, 32}:
        raise ValueError("Key must be 16, 24, or 32 bytes long")

    cipher = Cipher(algorithms.AES(key_bytes), modes.CBC(b'\x00' * 16), backend=default_backend())
    decryptor = cipher.decryptor()

    decrypted_bytes = decryptor.update(cipher_bytes) + decryptor.finalize()

    return decrypted_bytes.decode('utf-8')

key = 'b14ca5898a4e4133bbce2ea2315a1916'
cipher_text = 'TGlu22oo8GIHRkJBBpZ1nQ/x6l36MVj3Ukv4Hw86qGE='

print(decrypt_string(key,decrypt_string(key, cipher_text)))

well nice that you shared it but from where did you got:
key = 'b14ca5898a4e4133bbce2ea2315a1916'
cipher_text = 'TGlu22oo8GIHRkJBBpZ1nQ/x6l36MVj3Ukv4Hw86qGE='


From OutputMessenger , you should open it from a windows machine with m.harris credentials . Then you will find a UserExplorer.exe . dnSpy will give you this informations

Damm i thought so, so i should install application and then connect but on which port as i tried on 14123 and it didn't worked?
Reply
#82
now i opened k.turner messanger acc but no thing useful

IT SEEMS WE can perform phising attack

This forum account is currently banned. Ban Length: Permanent (N/A Remaining)
Ban Reason: Asking for rep is not allowed
Reply
#83
(Sep 01, 2024, 12:39 PM)x1rx Wrote:
(Sep 01, 2024, 12:35 PM)jsvensson Wrote:
(Sep 01, 2024, 12:28 PM)x1rx Wrote: winrm_svc pass


from cryptography.hazmat.primitives.ciphers import Cipher, algorithms, modes
from cryptography.hazmat.primitives import serialization
from cryptography.hazmat.backends import default_backend
import base64

def decrypt_string(key: str, cipher_text: str) -> str:
    key_bytes = key.encode('utf-8')
    cipher_bytes = base64.b64decode(cipher_text)

    if len(key_bytes) not in {16, 24, 32}:
        raise ValueError("Key must be 16, 24, or 32 bytes long")

    cipher = Cipher(algorithms.AES(key_bytes), modes.CBC(b'\x00' * 16), backend=default_backend())
    decryptor = cipher.decryptor()

    decrypted_bytes = decryptor.update(cipher_bytes) + decryptor.finalize()

    return decrypted_bytes.decode('utf-8')

key = 'b14ca5898a4e4133bbce2ea2315a1916'
cipher_text = 'TGlu22oo8GIHRkJBBpZ1nQ/x6l36MVj3Ukv4Hw86qGE='

print(decrypt_string(key,decrypt_string(key, cipher_text)))

well nice that you shared it but from where did you got:
key = 'b14ca5898a4e4133bbce2ea2315a1916'
cipher_text = 'TGlu22oo8GIHRkJBBpZ1nQ/x6l36MVj3Ukv4Hw86qGE='


From OutputMessenger , you should open it from a windows machine with m.harris credentials . Then you will find a UserExplorer.exe . dnSpy will give you this informations

from the winrm_svc user, i saw something about the Chiefs_Marketing_chat group, have you found anyway to get access to this group?

edit: seem like O.martinez is the only one have access to this chat group

This forum account is currently banned. Ban Length: Permanent (N/A Remaining)
Ban Reason: Malware. /Thread-Shellter-Pro-v4-7-x86-NOT-WORKING-crack
Reply
#84
(Sep 01, 2024, 02:06 PM)osamy7593 Wrote: now i opened k.turner messanger acc but no thing useful

IT SEEMS WE can perform phising attack

not sure if you will help you but you can also login to Output Messenger as M.harris, winrm_svc and probably O.martinez but i don't have this user cred yet

This forum account is currently banned. Ban Length: Permanent (N/A Remaining)
Ban Reason: Malware. /Thread-Shellter-Pro-v4-7-x86-NOT-WORKING-crack
Reply
#85
Ok u found something?

This forum account is currently banned. Ban Length: Permanent (N/A Remaining)
Ban Reason: Asking for rep is not allowed
Reply
#86
creds of the 2 first user has been posted here so no i didn't found anything new

This forum account is currently banned. Ban Length: Permanent (N/A Remaining)
Ban Reason: Malware. /Thread-Shellter-Pro-v4-7-x86-NOT-WORKING-crack
Reply
#87
(Sep 01, 2024, 12:45 PM)jsvensson Wrote:
(Sep 01, 2024, 12:39 PM)x1rx Wrote:
(Sep 01, 2024, 12:35 PM)jsvensson Wrote:
(Sep 01, 2024, 12:28 PM)x1rx Wrote: winrm_svc pass


from cryptography.hazmat.primitives.ciphers import Cipher, algorithms, modes
from cryptography.hazmat.primitives import serialization
from cryptography.hazmat.backends import default_backend
import base64

def decrypt_string(key: str, cipher_text: str) -> str:
    key_bytes = key.encode('utf-8')
    cipher_bytes = base64.b64decode(cipher_text)

    if len(key_bytes) not in {16, 24, 32}:
        raise ValueError("Key must be 16, 24, or 32 bytes long")

    cipher = Cipher(algorithms.AES(key_bytes), modes.CBC(b'\x00' * 16), backend=default_backend())
    decryptor = cipher.decryptor()

    decrypted_bytes = decryptor.update(cipher_bytes) + decryptor.finalize()

    return decrypted_bytes.decode('utf-8')

key = 'b14ca5898a4e4133bbce2ea2315a1916'
cipher_text = 'TGlu22oo8GIHRkJBBpZ1nQ/x6l36MVj3Ukv4Hw86qGE='

print(decrypt_string(key,decrypt_string(key, cipher_text)))

well nice that you shared it but from where did you got:
key = 'b14ca5898a4e4133bbce2ea2315a1916'
cipher_text = 'TGlu22oo8GIHRkJBBpZ1nQ/x6l36MVj3Ukv4Hw86qGE='


From OutputMessenger , you should open it from a windows machine with m.harris credentials . Then you will find a UserExplorer.exe . dnSpy will give you this informations

Damm i thought so, so i should install application and then connect but on which port as i tried on 14123 and it didn't worked?

Try 14121
Reply
#88
(Sep 01, 2024, 02:48 PM)a44857437 Wrote:
(Sep 01, 2024, 12:45 PM)jsvensson Wrote:
(Sep 01, 2024, 12:39 PM)x1rx Wrote:
(Sep 01, 2024, 12:35 PM)jsvensson Wrote:
(Sep 01, 2024, 12:28 PM)x1rx Wrote: winrm_svc pass


from cryptography.hazmat.primitives.ciphers import Cipher, algorithms, modes
from cryptography.hazmat.primitives import serialization
from cryptography.hazmat.backends import default_backend
import base64

def decrypt_string(key: str, cipher_text: str) -> str:
    key_bytes = key.encode('utf-8')
    cipher_bytes = base64.b64decode(cipher_text)

    if len(key_bytes) not in {16, 24, 32}:
        raise ValueError("Key must be 16, 24, or 32 bytes long")

    cipher = Cipher(algorithms.AES(key_bytes), modes.CBC(b'\x00' * 16), backend=default_backend())
    decryptor = cipher.decryptor()

    decrypted_bytes = decryptor.update(cipher_bytes) + decryptor.finalize()

    return decrypted_bytes.decode('utf-8')

key = 'b14ca5898a4e4133bbce2ea2315a1916'
cipher_text = 'TGlu22oo8GIHRkJBBpZ1nQ/x6l36MVj3Ukv4Hw86qGE='

print(decrypt_string(key,decrypt_string(key, cipher_text)))

well nice that you shared it but from where did you got:
key = 'b14ca5898a4e4133bbce2ea2315a1916'
cipher_text = 'TGlu22oo8GIHRkJBBpZ1nQ/x6l36MVj3Ukv4Hw86qGE='


From OutputMessenger , you should open it from a windows machine with m.harris credentials . Then you will find a UserExplorer.exe . dnSpy will give you this informations

Damm i thought so, so i should install application and then connect but on which port as i tried on 14123 and it didn't worked?

Try 14121

now i'm in but no thing usefull u found ??

This forum account is currently banned. Ban Length: Permanent (N/A Remaining)
Ban Reason: Asking for rep is not allowed
Reply
#89
(Sep 01, 2024, 02:56 PM)osamy7593 Wrote:
(Sep 01, 2024, 02:48 PM)a44857437 Wrote:
(Sep 01, 2024, 12:45 PM)jsvensson Wrote:
(Sep 01, 2024, 12:39 PM)x1rx Wrote:
(Sep 01, 2024, 12:35 PM)jsvensson Wrote: well nice that you shared it but from where did you got:
key = 'b14ca5898a4e4133bbce2ea2315a1916'
cipher_text = 'TGlu22oo8GIHRkJBBpZ1nQ/x6l36MVj3Ukv4Hw86qGE='


From OutputMessenger , you should open it from a windows machine with m.harris credentials . Then you will find a UserExplorer.exe . dnSpy will give you this informations

Damm i thought so, so i should install application and then connect but on which port as i tried on 14123 and it didn't worked?

Try 14121

now i'm in but no thing usefull u found ??

No... there are 2 databases in the Output Messenger directory, but as far as I can see, nothing interesting so far
Reply
#90
can anyone give me a hint on how to connect with the output messenger?
I've downloaded the unix client and try to connect with user k.turner@Infiltrator.htb and his pw in the AD description but the client stays on sing in...

Also how do you get the port forwarding to work?

This forum account is currently banned. Ban Length: Permanent (N/A Remaining)
Ban Reason: Leeching.
Reply


Possibly Related Threads…
Thread Author Replies Views Last Post
  Hack the box Pro Labs, VIP, VIP+ 1 month free Method RedBlock 23 2,187 2 hours ago
Last Post: kkkato
  [FREE] HackTheBox Academy - CBBH CDSA CPTS All Modules Flags Techtom 20 2,495 Yesterday, 11:06 PM
Last Post: op334
Heart [FREE] HackTheBox All Cheatsheets Tamarisk 3 398 Yesterday, 10:36 PM
Last Post: op334
  [FREE] 300+ Writeups PDF HackTheBox/HTB premium retired Tamarisk 369 92,015 Yesterday, 04:10 PM
Last Post: sabbyahmed
  CBBH Write Ups hiddenhacker 22 6,229 Yesterday, 06:39 AM
Last Post: Usercomplex

Forum Jump:


 Users browsing this forum: 2 Guest(s)