Walkthrough of Nest on HTB.

Nmap Scan

SMB Shares

  • Users

User Enum

USERNAMEPASSWORD
TempUserwelcome2019
c.smithfTEzAfYDoz1YzkqhQkH6GQFYKp1XY5hm7bjOP86yYxE=xRxRxPANCAK3SxRxRx
WBQ201953D8w
XtH4nkS4Pl4y1nGX
  • XML Enum
  • Downloaded RUScanner .Net app and reviewed code using Visual Studio
  • Stepped through the app in Debug mode to get the decrypted password.
  • xRxRxPANCAK3SxRxRx

Enumerated C.Smith user

  • found a file called “Debug Mode Password.txt
    • This file is an alternate data stream file
    • To View file I used allinfo command
  • Downloaded these file and read it using alternate file name

Enumerated Password: WBQ201953D8w

  • Sprayed password against all users did not work
  • Enumerated port 4386

Telnet Port 4386

  • After Enumerating directories I found Ldap.conf with administrator user and encrypted password.

Enumerated HqkSvc.exe

  • Earlier I found HqkSvc.exe I decompiled the app using JetBrain dotpeek.
  • I modified the VB script Utils.vb with this encrypted string
  • I also had to modify the RU_config.xml file with the encrypted password string.
  • Ran Debug and stepped through the app to decrypt the password.

Root Flag

Leave a Reply

Your email address will not be published. Required fields are marked *