This flag involves two machines that can be found at the following IP Addresses:

Objective: Gain initial access on the domain client and escalate your privileges so that you can log into the Domain Controller. The Flag is on one of the user Desktops on the domain controller in a file called Flag.txt.

Important Note:

You’ll need Kali Linux to solve this challenge:

In the immortal words of IPPSEC, ‘Let’s start with an NMAP!’

nmap -sC -sV 172.25.0.71

Untitled

We can see that this computer is a member of the delegate.local domain with a hostname of CORP-SERVER1. We don’t see too much here that stands out as unusual:

nmap 172.25.0.71 -p 5985
#Comment: This will show as open.

An early move a penetration tester will take given a machine like this would be to scan for shared folders. We don’t have any username or password information. Therefore, a check to see if any anonymous shares exist is a good call. There are a number of different tools available that will allow us to scan for anonymous/unauthenticated shared folders. Crackmapexec is always a good choice.

crackmapexec smb 172.25.0.71 -u '' -p '' --shares

Untitled