Cicada
Season 6 Machine

Nmap results:
SMB
Let's look at SMB first.
The HR share is the only one we seem to be able to access as anonymous.
Let's download that file and check it out.
This is the content of that file:
Ok so we got a password (Cicada$M6Corpb*@Lp#nZp!8) but not a username.
I experimented a bit with crackmapexec which is a really neat tool and with this command:
Results:
Now we have some users that we could try our previously obtained password with.
I had to try two before hitting the right one.
Looks like michael.wrightson didn't change his default password and he has broader permissions than our unauthenticated guest earlier:
I didn't find anything useful using Michael's credentials however..
Let's run ldapdomaindump

We found credentials for another user here. 'david.orelious'. And he has access to the 'DEV' share.
'Backup_script.ps1' contains some hardcoded credentials for Emily Oscars
Emily is a member of the 'Remote Management Users' and 'Backup Operators' groups and has access to the C$ share.
After some digging I found the user flag here:
Last updated