ElMariachi-PC PwntillDawn
IP Address = 10.150.150.69
Difficulty = Easy
Nmap Scan:
From the scan we can see its a windows box. So lets enumerate the smb server
It shows that we can’t list shares anonymously. On looking at the ports we can see a weird port on 5040 and nmap isn’t able to identify the service running on it
I tried connecting to it using netcat but I didn’t get any response
Lets get back to the smb port and try further enumeration. Using the metasploit module, I attempted to brute force but wasn’t successfull
At this point I rescanned the host again and got another port which was running thinvnc on port 60000
I checked out metasploit to see if there’s any thing on it. Cool there is
I’ll use the exploit
And it gave us a credential desperado:TooComplicatedToGuessMeAhahahahahahahh
. I’ll login via rdp using newly found credential
Flags:
Flag67: 2971f3459fe55db1237aad5e0f0a259a41633962
And we’re done
Write-ups have been authorized for this machine by the PwnTillDawn Crew! Here’s the link to access it Wizlynx and PwntillDawn