Cicada
Initial Access
Enumerate SMB Shares:
Used
smbclient
to list accessible shares:Found the
HR
share and accessed it:
Found Credentials:
Discovered a file containing credentials:
Enumerate Users:
Used
nxc
to enumerate users via RID brute-forcing:Identified users like
michael.wrightson
,david.orelious
, andemily.oscars
.
Authenticate as
michael.wrightson
:Used the found credentials to authenticate:
Explore SMB Shares:
Found additional shares and accessed the
dev
share:
Found New Credentials:
Discovered credentials for
emily.oscars
:
Authenticate as
emily.oscars
:Used
evil-winrm
to authenticate:
Privilege Escalation
Check Privileges:
Ran
whoami /priv
and foundSeBackupPrivilege
andSeRestorePrivilege
enabled.
Dump SAM and SYSTEM Hives:
Created a
Temp
folder and dumped the hives:
Transfer Files Using SMB Server:
Set up an SMB server on the attacking machine:
Copied the files to the SMB share from the target machine:
Extract NTLM Hashes:
Used
pypykatz
to extract the hashes:Found the NTLM hash for the
Administrator
:
Authenticate as
Administrator
:Used
evil-winrm
with the NTLM hash:
Retrieve the Root Flag:
Navigated to the
Administrator
desktop and read theroot.txt
file:
Last updated
Was this helpful?