SMB


Nmap discovered a Windows Directory server on the port 445 of the 192.168.103.188 host.

┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/craft2]
└─$ nmap -Pn --script smb-enum-shares -sV -p139,445 $IP
Starting Nmap 7.95 ( https://nmap.org ) at 2025-07-04 18:14 CEST
Nmap scan report for 192.168.103.188
Host is up (0.020s latency).
 
PORT    STATE    SERVICE       VERSION
139/tcp filtered netbios-ssn
445/tcp open     microsoft-ds?
 
Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 17.38 seconds

Share mapping failed.

Null Session


┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/craft2]
└─$ nxc smb $IP -u 'blah' -p 'blah' --shares --interfaces  
SMB         192.168.103.188 445    CRAFT2           [*] Windows 10 / Server 2019 Build 17763 x64 (name:CRAFT2) (domain:CRAFT2) (signing:False) (SMBv1:False)
SMB         192.168.103.188 445    CRAFT2           [-] CRAFT2\blah:blah STATUS_LOGON_FAILURE 
 
┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/craft2]
└─$ nxc smb $IP -u '' -p '' --shares --interfaces  
SMB         192.168.103.188 445    CRAFT2           [*] Windows 10 / Server 2019 Build 17763 x64 (name:CRAFT2) (domain:CRAFT2) (signing:False) (SMBv1:False)
SMB         192.168.103.188 445    CRAFT2           [-] CRAFT2\: STATUS_ACCESS_DENIED 
SMB         192.168.103.188 445    CRAFT2           [-] Error enumerating shares: Error occurs while reading from remote(104)

The target SMB server does not allow both guest and anonymous accesses.

thecybergeek Session


The credential of the thecybergeek user was leaked through the phishing attack, and cracked at a later stage.

┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/craft2]
└─$ nxc smb $IP -u 'thecybergeek' -p 'winniethepooh' --shares --interfaces 
SMB         192.168.103.188 445    CRAFT2           [*] Windows 10 / Server 2019 Build 17763 x64 (name:CRAFT2) (domain:CRAFT2) (signing:False) (SMBv1:False)
SMB         192.168.103.188 445    CRAFT2           [+] CRAFT2\thecybergeek:winniethepooh 
SMB         192.168.103.188 445    CRAFT2           [*] Enumerated shares
SMB         192.168.103.188 445    CRAFT2           Share           Permissions     Remark
SMB         192.168.103.188 445    CRAFT2           -----           -----------     ------
SMB         192.168.103.188 445    CRAFT2           ADMIN$                          Remote Admin
SMB         192.168.103.188 445    CRAFT2           C$                              Default share
SMB         192.168.103.188 445    CRAFT2           IPC$            READ            Remote IPC
SMB         192.168.103.188 445    CRAFT2           WebApp          READ,WRITE

Successfully authenticated. WebApp share is the only none default share and the thecybergeek user has both read and write accesses.

WebApp Share


┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/craft2]
└─$ smbclient //craft.offsec/WebApp -U 'thecybergeek%winniethepooh'     
lpcfg_do_global_parameter: WARNING: The "syslog" option is deprecated
Try "help" to get a list of possible commands.
smb: \> ls
  .                                   D        0  Fri Jul  4 18:59:49 2025
  ..                                  D        0  Fri Jul  4 18:59:49 2025
  assets                              D        0  Tue Apr  5 18:16:03 2022
  css                                 D        0  Tue Apr  5 18:16:03 2022
  index.php                           A     9768  Mon Jan 31 17:21:52 2022
  js                                  D        0  Tue Apr  5 18:16:03 2022
  upload.php                          A      896  Mon Jan 31 16:23:02 2022
  uploads                             D        0  Fri Jul  4 18:52:08 2025
 
		10327807 blocks of size 4096. 1587950 blocks available

This appears to be the web root directory. Code execution is possible via uploading a malicious PHP file to the WebApp share.