# Hints
# Finding credentials in plaintext
What type of information you want to find? Where admin can save his passwords?
### How to Extract Hashes and Bruteforce Them with Hashcat (Using rockyou.txt)
Sometimes you need to change format - check it from "examples hashes" from hashcat site ( just google it)
---
#### 1. ZIP Archives
```bash
zip2hashcat.py archive.zip > zip.hash
hashcat -m 13600 -a 0 zip.hash /usr/share/wordlists/rockyou.txt.gz
```
#### 2. 7z Archives
```
7z2hashcat.py archive.7z > 7z.hash
hashcat -m 11600 -a 0 7z.hash /usr/share/wordlists/rockyou.txt.gz
```
#### 3. RAR Archives
```
rar2hashcat.py archive.rar > rar3.hash
hashcat -m 13000 -a 0 rar3.hash /usr/share/wordlists/rockyou.txt.gz
#for rar5
hashcat -m 13010 -a 0 rar5.hash /usr/share/wordlists/rockyou.txt.gz
```
#### 4. KeePass Databases (1.x and 2.x)
```
keepass2john database.kdbx > keepass.hash
hashcat -m 13400 -a 0 keepass.hash /usr/share/wordlists/rockyou.txt.gz
```
<br><br><br>
# Dump LSASS process in Windows
1. Can you upload some interesting tools with kiwi inside the machine?
2. Or maybe dump some interesting registry hive?
<br><br><br><br><br><br>
# MSI Install
https://labs.cyber-ed.ru/group/119/task/20
1. Can you check some interesting registry hive
2. How you can abuse it
3. Generate what you need with msfvenom
4. Run it inside the rdp session
<br><br><br><br><br><br>
# Dump credentials from SAM and system database
https://labs.cyber-ed.ru/group/119/task/402
1. Check if you have seBackupPrivilege?
2. If yes and Active - can you abuse it with some code from github? Or if yes and Disable - can you enable it?
3. Dump what you need and parse it
<br><br><br><br><br><br>
# Print Nightmare
https://labs.cyber-ed.ru/group/119/task/341
1. Check if you have access to RPC
2. Generate msfvenom as dll
3. Start smb share as `sudo impacket-smbserver Share . -smb2support`
4. run exploit with `printnightmare.py`
<br><br><br><br><br><br>
# Home tasks
## MSSQL abuse
https://labs.cyber-ed.ru/group/119/task/39
1. Can you bruteforce the user for mssql?
2. MSSQL have some privileges- can you check it?
## DLL hijacking
https://labs.cyber-ed.ru/group/119/task/409
1. Can you find some strange exe file? What if you run it?
## Impersonate user
https://labs.cyber-ed.ru/group/119/task/403
1. Do you like potatoes? Maybe hackers also like potato with privileges?
# Medium task with impersonation
https://labs.cyber-ed.ru/group/119/task/428
1. Can you find anywhere some credentials?