rootđź’€bl4ck4non-sec:~#

Hack. Eat. Sleep. Repeat!!!

View on GitHub

Box: Sauna

Level: Easy

OS: Windows


Lets get started

Recon

Portscanning

command:```

From our scan we have quite a number of ports open. We’ll start our enumeration from port 80.

Enumeration (Port 80)

Navigate to the webpage

image

Scrolling down, you get this

image

We get “client 1”, “client 2” without names of the employees.

Checking around the webpage, I found this

image

Scrolling down,

image

We now have their names revealed.

From our nmap scan we can see the kerberos service running on port 88

Lets try to get users who have this service enabled

Enumeration (Port 88)

Save the names in a file say users.txt