Heist
Heist
Page 1 / 11
SYNOPSIS
Heist is an easy difficulty Windows box with an “Issues” portal accessible on the web server, from
which it is possible to gain Cisco password hashes. These hashes are cracked, and subsequently
RID bruteforce and password spraying are used to gain a foothold on the box. The user is found
to be running Firefox. The firefox.exe process can be dumped and searched for the
administrator’s password.
Page 2 / 11
Enumeration
Nmap
We find IIS running on port 80, MSRPC on port 135 and SMB on 445. Additionally, port 5985
(associated with WinRM) is exposed, which may allow remote sessions.
IIS
Page 3 / 11
The post talks about a Cisco router configuration. Clicking on the attachment shows the
configuration.
On searching about Cisco configurations, we find that the hashes are Cisco type 5 and type 7
password hashes. The type 5 hashes can be cracked using an online tool such as this.
Page 4 / 11
The two type 7 hashes were cracked revealed to be $uperP@ssword and Q
4)sJu\Y8qz*A3?d.
Let’s save these and crack the type 5 hash next. This can be cracked using John the Ripper and
rockyou.
The password is revealed to be “stealth1agent”. Enumeration of the “Issues” page revealed the
usernames “Hazard” and “Administrator”. Let’s bruteforce SMB with these passwords using
CrackMapExec (CME).
Page 5 / 11
Foothold
Let’s try logging into WinRM with these using the CME winrm module.
The login failed, which means that the user “hazard” isn’t in the “Remote Management Users”
group. However, possession of valid credentials will still let us enumerate the box. Let’s try
enumerating the users on the box using RID bruteforce. RID stands for Relative Identifier, which is
a part of SID (Security Identifier) used to uniquely identify a user or service on a Windows host.
The Domain or Local Identifier is constant for a given computer, while the RID is unique. So we
can query the box for it’s “Local Computer Identifier”, and bruteforce RID values, which will return
usernames for valid SIDs. The --rid-brute option in CME can do this for us.
Page 6 / 11
CME was able to identify three additional usernames - support, Chase and Jason. Let’s use the
passwords from earlier and check if one of them is valid for the usernames we found.
Authentication was successful with the username Chase and password Q4)sJu\Y8qz*A3?d. The
evil-winrm script can be used to login via WinRM.
Page 7 / 11
Privilege Escalation
According to this Chase will be checking the issues list frequently. Looking at the running
processes, we see that Firefox is active.
Maybe he’s using firefox to login to the Issues portal? As we have control over the process, we
can dump the process and find passwords in it.
Page 8 / 11
The procdump utility can be used to dump process memory. Download and transfer it to the
server.
We need to use the -ma flag to dump the entire memory of the process.
The server will use the credentials guest / guest for authentication.
Page 9 / 11
Now mount the share on the box and copy the file to it.
The page used login_password as the parameter to submit passwords. We can search the dump
for strings like “login_password” to find any requests.
We can see the entire URL string with the username and password parameters.
Page 10 / 11
The password “4dD!5}x/re8]FBuZ” can be used to login as Administrator.
Page 11 / 11