HTB Timelapse WIP writeup
Apr 11, 2022
I am not good at all with Windows machines so this will be fun…
- Start off with adding to our /etc/hosts file
2. nmap scan results
3. We will see what guest can see in SMB
4. Dev and Helpdesk subfolders
5. Dev contents
6. HelpDesk contents
7. Where the zip file ends up (will go to whatever directory you were in when initiating the smb get request)
8. Try unzipping the file
9. zip2john will help us crack the password
10. You can use locate if you don’t know where rockyou is located (apt-get install locate). Attempt to crack the hash
11. We find a pfx file inside so we’ll try pfx2john and see where we get
12. ??? Still a WIP