Exploitation


The following information is found during the web enumeration earlier;

With the several names, naming convention, and default password revealed, it would be possible to create a list of potential users to attempt to authenticate to the PSWA endpoint

Naming Convention


The naming convention appears to be the first letter of firstname and followed by lastname I will create a list of potentially usernames following the aforementioned format above.

┌──(kali㉿kali)-[~/archive/htb/labs/acute]
└─$ cat users          
edavies
imonks
jmorgan
awallace
lhopkins
chall
fcastle
daniel

daniel is added as is

Authentication


The default password belongs to the edavies user on the Acute-PC01 host Initial Foothold established to the Acute-PC01 host as the edavies user via PSWA

Judging by the IP address, the Acute-PC01 host might be a Docker container

Error Messages


While performing a manual brute-force attack, I found something interesting

The error message for incorrect credential is very clear with the following; Sign-in failed. Verify that you have entered your credentials correctly.

However, I get a different error message when attempting to authenticate with the default password for the chall user; An authorization failure occurred. Verify that you are authorized to connect to the destination computer.

That is not the standard authentication error and it’s about authorization.

Looking further into the error message on the official Microsoft documentation reveals a list of potential causes This may indicate that the credential itself might be correct, however the chall user is not authorized to authenticate to the WinRM service