Office - HTB
by paven - Saturday February 17, 2024 at 03:07 PM
#11
(Feb 17, 2024, 08:43 PM)ConnorDev Wrote: Did you find what to do with those credenciales? I've tried too many things but nothing success.

same here, just found the tstark domain account but can't do much with that. Tried to bruteforce more users and nothing
Reply
#12
use creds to enum shares
Reply
#13
(Feb 17, 2024, 09:08 PM)0xfd9aac Wrote: Is it possible to decrypt TLS from .pcap without keylog file?

i don't think so.

i've tried PCredz and it didn't come up with anything
Reply
#14
(Feb 17, 2024, 09:12 PM)EnriQueHTB777 Wrote:
(Feb 17, 2024, 09:05 PM)tiresomeenergy Wrote: use creds to enum shares

I found a lot of users in the domain but with brute force I didn't get the password of any of them (I tried to log in also in the joomla panel)? anyone give me a hint what else to try?

try finding the password
Reply
#15
(Feb 17, 2024, 09:20 PM)bingle Wrote:
(Feb 17, 2024, 07:27 PM)DataNinja Wrote:
(Feb 17, 2024, 07:16 PM)4ce Wrote:
(Feb 17, 2024, 07:13 PM)DataNinja Wrote: {
      "type": "application",
      "id": "224",
      "attributes": {
        "user": "root",
        "id": 224
      }
    },
    {
      "type": "application",
      "id": "224",
      "attributes": {
        "password": "H0lOgrams4reTakIng0Ver754!",
        "id": 224
      }

Niceeeeeeeeeee Cool

use kerbrute for find a user and use thit password with connect to smb and download pcap and analyze with wireshark
Found nothing with kerbrute 
2024/02/17 15:04:28 >  Using KDC(s):
2024/02/17 15:04:28 >  10.129.110.54:88

2024/02/17 15:09:11 >  [+] VALID USERNAME:      administrator@office.htb
2024/02/17 15:26:32 >  [+] VALID USERNAME:      dlanor@office.htb
2024/02/17 15:52:44 >  [+] VALID USERNAME:      etower@office.htb
what's the user you found ?

use a different list from seclists repo (Users directory) pick a big one and let it run for a while.
Reply
#16
(Feb 17, 2024, 09:35 PM)0xfd9aac Wrote: Any hint how to get something useful from .pcap?

kerberos preauth packets... such as cipher?
Reply
#17
I got this hash, what can I do with it, I can't crack it:
PPotts::OFFICE:**********cf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
If you want to get the hash , find the resume.php file and interact with it
Reply
#18
nah bro use wireshark
Reply
#19
(Feb 17, 2024, 10:09 PM)KayKay Wrote:
(Feb 17, 2024, 09:57 PM)gtastav Wrote: I got this hash, what can I do with it, I can't crack it:
PPotts::OFFICE:**********cf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
If you want to get the hash , find the resume.php file and interact with it

how you access the internal site ?

port forward 8083
also when you get a shell you can find C:\xampp\htdocs\internal\resume.php
Reply
#20
how are y'all getting a shell? i got the tstark creds on my own but then i hit a wall
Reply


Possibly Related Threads…
Thread Author Replies Views Last Post
  [FREE] CPTS 12 FLAGS pulsebreaker 68 1,872 1 hour ago
Last Post: VictorPipeau
  [FREE] HackTheBox Dante - complete writeup written by Tamarisk Tamarisk 601 91,444 1 hour ago
Last Post: VictorPipeau
  [FREE] 300+ Writeups PDF HackTheBox/HTB premium retired Tamarisk 371 92,747 2 hours ago
Last Post: phannguyenbaouy1
  [FREE] HackTheBox Academy - CBBH CDSA CPTS All Modules Flags Techtom 21 2,595 6 hours ago
Last Post: popoler
  Hack the box Pro Labs, VIP, VIP+ 1 month free Method RedBlock 23 2,241 Yesterday, 02:10 PM
Last Post: kkkato

Forum Jump:


 Users browsing this forum: 1 Guest(s)