You Got Mail
Test your recon and phishing skills in order to complete your objective. - by tryhackme
Last updated
Was this helpful?
Test your recon and phishing skills in order to complete your objective. - by tryhackme
Last updated
Was this helpful?
The following post by 0xb0b is licensed under CC BY 4.0
We start with an Nmap scan and find some Windows-related ports, including 139/445 SMB, 3389 RDP, 5985 WinRM, some RPC ports >49000, as well as mail-related ports, 25,587 smtp, 110 pop3 and 143 imap.
In the assessment we have the authorization for a passive reconnaiceces on https://brownbrick.co/
. On the Team page we'll find six mail adresses.
We save those mails to a file for later use.
The use of cewl here is not a passive reconnaissance as required in the scenario. However, this is included here for traceability and reproducibility. The password can be found directly on the index page.
We brute force the SMTP login with the mail addresses found and the keywords of the page as passwords. We have a hit for lhedvig@brownbrick.co
.
Now that we have access to a mail account, we can use it to send mails to the other mail addresses. Since the scenario is a phishing scenario, we will try it very simply with an executable.
For this we use a reverse shell written in Go, as we have already used in the AOC 24 Side Quest 4
https://0xb0b.gitbook.io/writeups/tryhackme/2024/advent-of-cyber-24-side-quest/t4-krampus-festival#payload-preparation.
This has to be compiled on a windows machine.
Next, we use swaks in combination with xargs to send the mail to each email address we found with the executable as an attachment. We choose something simple as the subject and body.
We have set up a listener (before sending the mails)...
... And shortly afterwards we receive a connection back. We are the user wrohit
. The user flag can be found at the user's Desktop.
The user wrohit
is part of the Administrators group.
Furthermore there is no Windows Defender running:
This allows us to use Mimikatz, to dump the hashes using lsadump::sam
.
The hash of wrohit
is crackable.
The password hash for the Administrators Dashboard of the hMailServer can be found at C:\Program Files (x86)\hMailServer\Bin\hMailServer.INI
It's a MD5 hash which is crackable: