An image to describe post

Upon spawning the machine, we got the ip address of the target machine.

Let's run nmap to find the open ports using the following command -

nmap -sV -sC {IP Address}

An image to describe post

Alright, so we've got ourselves a Windows box here with three ports open.

Now, onto the juicy part – understanding what's going on behind those ports. After a bit of sleuthing, it turns out Port 445 is doing some Microsoft networking magic, tied to the good old NetBIOS service from the vintage Microsoft OS days. This bad boy is running Server Message Block (SMB).

To get a closer look at what treasures might be hiding in those SMB shares, we're busting out smbclient. Let's see what secrets this box is holding!

smbclient -L {IP address}

An image to describe post

Using the -L flag with the smbclient command like smbclient -L {IP Address} gives us a sneak peek into the shares hanging out on our target machine. W've got four sharenames staring back at us. Time to crack them open and see what goodies they've got stashed away. Let's dive in and explore each one!

An image to describe post

umm...let's check the next one

An image to describe post

Again,

An image to describe post

Alright, so we could get into IPC. Let's check what it got.

An image to describe post

An image to describe post
That's weird, whatever command i type in it always shows,

NT_STATUS_NO_SUCH_FILE listing *

Let's move on-to the next sharename that we had using the following command -

smbclient \\\\{IP address}\WorkShares

An image to describe post

Cool! We got into WorkShare and we can see two possible directories here.

An image to describe post

So, Amy.J has a text file called worknotes.txt. I just ran a get command to get them into the local machine.

An image to describe post

And James.P has flag.txt file which might be our flag.

An image to describe post

And thus we can solve this machine.