- nxc rdp and smb scans on JUMP01 ![[images/Pasted image 20251015094522.png]] - `xfreerdp3` into JUMP01 with hwilliam ![[images/Pasted image 20251015095906.png]] - nothing to be found in hwilliam's folders - link to My Safes on desktop - my safes folder is empty within documents - found the below file at `c:\temp\unattended2.xml` with potential creds - tried this password as Administrator and root with nxc scans targeting DC01 but no dice - just a head fake; remember to quickly abandon these red herrings![[images/Pasted image 20251015100003.png]] - more rdp enum with `--continue-on-success` flag ![[images/Pasted image 20251015113414.png]] - bdavid is pwned - let's try to `xfreerdp3` into JUMP01 as bdavid with a shared drive for transfers ```bash proxychains4 xfreerdp3 /v:172.16.119.7 /u:bdavid /p:'<password>' /dynamic-resolution /drive:linux,. ``` - transfer share doesn't appear to work on rdp client due to incorrect perms on kali folder - after running a `chmod 777` on local kali folder the transfer share works - lets dump LSASS and move to Kali ![[images/Pasted image 20251015114042.png]] - getting perms errors ![[images/Pasted image 20251015115133.png]] - check perms ![[images/Pasted image 20251015115240.png]]![[images/Pasted image 20251015115257.png]] - maybe try again by run powershell as admin - this works ![[images/Pasted image 20251015120321.png]] - we are part of remote mgmt users so lets try to move files with `evil-winrm` - initially fails because perms on kali folder were insufficient ![[images/Pasted image 20251015120554.png]] - run a `chmod 777` on kali folder, then download - this works ![[images/Pasted image 20251015120618.png]] - run `pypykatz` on `lsass.dmp` to view local logon session cache ![[images/Pasted image 20251015121224.png]] - we have user NT hashes and one interesting new machine user account `JUMP01
- also a new password for stom? - time to spray these new potential creds