mirror of
https://github.com/AbdullahRizwan101/CTF-Writeups
synced 2025-02-17 04:28:25 +00:00
1.2 KiB
1.2 KiB
TryHackMe-THROWBACK-TBSEC-DC01
We have the credentials from the email
TBSEC_GUEST:WelcomeTBSEC1!
But in order to login I tried using win-rm
and ssh
both failed then I tried with RDP and got access
![](https://imgur.com/Ho5AHDs.png)
![](https://imgur.com/ampdw1G.png)
Run powershell-empire --rest
and starkiller
![](https://imgur.com/wpzT0WF.png)
![](https://imgur.com/5lG3Rd1.png)
We have our listener ready
![](https://imgur.com/TqOQJnJ.png)
For setting a stager
![](https://imgur.com/aegimtS.png)
![](https://imgur.com/iTE4Rh6.png)
Now we need to deliver this bat file to target
![](https://imgur.com/fwnUaSg.png)
![](https://imgur.com/ITXp4LB.png)
![](https://imgur.com/Ofkg2vw.png)
Run the built in rubeus from starkiller
![](https://imgur.com/qQnZeMC.png)
![](https://imgur.com/5qlKOWh.png)
You can easily transfer the file by simpling clicking Download icon
![](https://imgur.com/Fgw8BZV.png)
![](https://imgur.com/nMxIDdx.png)
On running hashcat we will crack the hash
![](https://imgur.com/gQ8e57J.png)
We can now login through RDP with that account
![](https://imgur.com/dMtOKgt.png)