# TryHackMe-THROWBACK-PROD(10.200.34.219) ## NMAP ``` Nmap scan report for 10.200.34.219 Host is up (0.19s latency). Not shown: 993 filtered ports PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH for_Windows_7.7 (protocol 2.0) | ssh-hostkey: | 2048 85:b8:1f:80:46:3d:91:0f:8c:f2:f2:3f:5c:87:67:72 (RSA) | 256 5c:0d:46:e9:42:d4:4d:a0:36:d6:19:e5:f3:ce:49:06 (ECDSA) |_ 256 e2:2a:cb:39:85:0f:73:06:a9:23:9d:bf:be:f7:50:0c (ED25519) 80/tcp open http Microsoft IIS httpd 10.0 | http-methods: |_ Potentially risky methods: TRACE |_http-server-header: Microsoft-IIS/10.0 |_http-title: Throwback Hacks 135/tcp open msrpc Microsoft Windows RPC 139/tcp open netbios-ssn Microsoft Windows netbios-ssn 445/tcp open microsoft-ds? 3389/tcp open ms-wbt-server Microsoft Terminal Services | rdp-ntlm-info: | Target_Name: THROWBACK | NetBIOS_Domain_Name: THROWBACK | NetBIOS_Computer_Name: THROWBACK-PROD | DNS_Domain_Name: THROWBACK.local | DNS_Computer_Name: THROWBACK-PROD.THROWBACK.local | DNS_Tree_Name: THROWBACK.local | Product_Version: 10.0.17763 |_ System_Time: 2021-02-22T17:08:55+00:00 | ssl-cert: Subject: commonName=THROWBACK-PROD.THROWBACK.local | Not valid before: 2021-02-21T16:52:43 |_Not valid after: 2021-08-23T16:52:43 |_ssl-date: 2021-02-22T17:09:35+00:00; +13s from scanner time. 5357/tcp open http Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP) |_http-server-header: Microsoft-HTTPAPI/2.0 |_http-title: Service Unavailable Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows Host script results: |_clock-skew: mean: 12s, deviation: 0s, median: 12s | smb2-security-mode: | 2.02: |_ Message signing enabled but not required | smb2-time: | date: 2021-02-22T17:08:58 |_ start_date: N/A ``` ### PORT 80 (HTTP) Since this host has AD running so we can run a tool called `responder` to start an attack called LLMNR/NBT-NS poisoning I ran this tool for 2 days and it didn't gave me the hash , there was a problem in Throwbacks network so I had to continue looking up the writeups ### Remmina Since this windows machine has port 3389 open which is for `Remote Desktop Protocol` we can login with PetersJ's passoword which is `Throwback317` ### Installing Starkiller Starkiller is C2 (Command and Control) frontend interface for "Empire" used for post exploitation without interfereing with the actual machine it self. It is used for enumeration and for identifiying privilege escalation vectors so for that we need to have `starkiller` and `empire` Now we have to `chmod +x starkiller-1.3.2.AppImage` and `./starkiller-1.3.2.AppImage --no-sandbox` We will be presented with a login prompt ### Installing Empire Empire is great tool similar to meatsploit for post exploitation and information gathering used on windows machines Run `git clone https://github.com/BC-SECURITY/Empire.git` Run `install.sh` This installation would take a long time. So going back to starkiller we log in with the credentials `empireadmin:passowrd123` and we need to make this application listen on defualt port which is `1337` leet but in order login we want empire to be running So our installation for empire is complete but still we need to install some dependencies `pip3 install poetry` and `poetry install` then `poetry run python empire` One last thing to do `pip3 install click` and when you run `powershell-empire` And it works but we need to use it with `--rest`,so By using this option it will use the default ports and will allow us to use frontend which starkiller On logging in with the default credentials above Now we are going to create our listener We have our listener created Now we need to create our stager which is the payload we are going to transfer on the target machine Click on the download or save icon to save the payload somewhere on your local machine and then start a python3 http server to host it in order to download it from the target machine The web server is running We have that on the target machine all we need to do is launch the payload On launching we will see some information regarding the target machine in the `agents` section We can see that starkiller is acting like C2 server which sends commands on the target machine and we can see the output over the GUI Run `seatbelt` module This module did enumeration for us a found a user with a saved credential Now we have logged in as `admin-petersj` in order to dig deep we have to run mimikatz but for that we need to create another listener and stager in order to run c2 commands as elevated user On running this payload again Now we need to run `mimikatz` module through our C2 Running `privilege::debug` will give us a status `OK` means we can escalate our privileges to NT-AUTHORITY We ran the command and notice if scroll down a little be we can see the password hashes of the users There's a feature in Starkiller which can save all the credentials or hashes found in a neat way Now we have the credentials but don't know on which host these credentials are valid so we are going to something called` Pass The Hash` a realy attack for that we need to run `proxychains` or `autoroute` for that we need to have meterepreter session Install `Crackmapexec` https://github.com/byt3bl33d3r/CrackMapExec/wiki/Installation#binaries We can see that we can ping the ohter machines as well so the task says that the hash from task 10 will work which was from `HumprehyW` 's hash and the other from the list of credentials we dumped using mimikatz PetersJ:Throwback317 runas /savecred /user: /profile "cmd.exe" use auxiliary/server/socks4a