Below you will find pages that utilize the taxonomy term “Smbclient”
Hack The Box - Machines
read more
EscapeTwo

Note: Machine Information As is common in real life Windows pentests, you will start this box with credentials for the following account: rose / KxEPkKe6R8su
Summary
- found juicy file in SMB share
- extracted passwords from unzipped xlsx file
- reverse shell as sql_svc using mssql and xp_cmdshell
- password spray to find credential reuse
- writeowner abuse using impacket
- ADCS-ESC4 using certipy
Initial Enumeration
Port scanning
As always I start off with a port scan. first a full port scan followed by a detailed targetted port scan.
Hack The Box - Machines
read more
Cicada

Summary
- use anonymous sessions to find txt in HR share
- use RID-bruteforcing to find usernames
- password spray password on found user to find valid credentials
- read AD user info using rpcclient and find new password
- winrm into the box with new credentials (user)
- abuse SeBackupPrivilege to escalate to Administrator (root)
Initial Enumeration
As always I start with a port scan using nmap to find running services.
First I find all open ports using a simple port scan: