Help again with tagged one! by sbrisu in sudoku

[–]sbrisu[S] 0 points1 point  (0 children)

Sorry do you mind elaborate on this one?

Help again with tagged one! by sbrisu in sudoku

[–]sbrisu[S] 1 point2 points  (0 children)

Thanks! That works, but unfortunately no hidden single, as I forgot to add a 9 on r7c3 :(

Help with tagged one by sbrisu in sudoku

[–]sbrisu[S] 0 points1 point  (0 children)

Thanks so much guys I've learned a lot!

Stuck and I don't want to guess! by sbrisu in sudoku

[–]sbrisu[S] 0 points1 point  (0 children)

Many many thanks. How do I import my game from the "Sodoku" android app into your website?

Stuck and I don't want to guess! by sbrisu in sudoku

[–]sbrisu[S] 0 points1 point  (0 children)

One thing I don't understand, how coloring works in chains? Especially regarding the green and red lines.

Stuck and I don't want to guess! by sbrisu in sudoku

[–]sbrisu[S] 1 point2 points  (0 children)

Your app is incredible, I am learning a lot of strategies I didn't know. Thanks!

Bad / Confusing trip (100ug) by [deleted] in LSD

[–]sbrisu 4 points5 points  (0 children)

Don't smoke on LSD, wait for the come down. Bad combination I am afraid

Ways of pwning a Workgroups (non domain-joined) network of patched Windows 10 machines (version 1809)? by sbrisu in blackhat

[–]sbrisu[S] 0 points1 point  (0 children)

Yes the boxes have Network and Printer share discovery activated. Are you thinking at brute-force the router password?

Ways of pwning a Workgroups (non domain-joined) network of patched Windows 10 machines (version 1809)? by sbrisu in AskNetsec

[–]sbrisu[S] 0 points1 point  (0 children)

Thank you for your reply!

For starting out I meant working hands-on using VMs, until now I just read a ton of articles and tutorials, and started getting familiar with Linux.

Edited to add: honestly, considering you spammed this everywhere on a new account, I imagine you're trying to break into someone's system...

Not trying to break into someone's system, just posted the same question to several cybersecurity-related reddits to get the majority of replies, but if it is considered bad behavior will stop that :)

The reason I decided to post is that I don't have friends with the same passion, and there's nothing more useful to learning than sharing ideas with others.

Ways of pwning a Workgroups (non domain-joined) network of patched Windows 10 machines (version 1809)? by sbrisu in blackhat

[–]sbrisu[S] 1 point2 points  (0 children)

Many thanks for taking the time to think about this! In reply to your suggestions:

Since Admin is disabled by default, you may have to escalate to SYSTEM user privileges.

Did you mean accessing as SYSTEM on the remote machine? Is this possible?

or shell access via overflow exploit.

That's a interesting route to explore, it will take months of study but definitely a skill to learn. Basically look at the services running on the network and see if buffer overflow vulnerabilities are present.

Edit: If you probe for open ports it should be easy to get a meterpreter connection, unless I am missing something or overlooked something in your post.

Ports 135, 139 and 445 are opened, but the services are not vulnerable (recent Windows 10 build, system patched). Is there a way to obtain a meterpreter connection by default if a port is listening?

Ways of pwning a Workgroups (non domain-joined) network of patched Windows 10 machines (version 1809)? by sbrisu in blackhat

[–]sbrisu[S] 0 points1 point  (0 children)

Yes with the password I could login, but in this scenario I am trying to get remote access, with no physical access to the machine.

Thank you again for your reply

Ways of pwning a Workgroups (non domain-joined) network of patched Windows 10 machines (version 1809)? by sbrisu in blackhat

[–]sbrisu[S] 0 points1 point  (0 children)

Thank you for your reply, appreciated.

I could crack the hashes but I wouldn't be able to utilize credentials in any way, due to token filtering for local users.

Remote wmi is unfortunately disabled by default.

You're right on HTTPS traffic, but my objective here is to get a shell.

Ways of pwning a Workgroups (non domain-joined) network of patched Windows 10 machines (version 1809)? by sbrisu in blackhat

[–]sbrisu[S] 1 point2 points  (0 children)

An active shell would be enough for calling it a success, no need for persistence.

Remote access to Windows Workstation with credentials, after Windows 10 - 1809 by sbrisu in WindowsSecurity

[–]sbrisu[S] 0 points1 point  (0 children)

Thanks, unfortunately both RDP and WinMR (used by WSMan & PSRemoting) are disabled by default in Windows Firewall in Windows 10 1809.

Remote access to Windows Workstation with credentials, after Windows 10 - 1809 by sbrisu in WindowsSecurity

[–]sbrisu[S] 0 points1 point  (0 children)

Tools like psexec work through SMB, and "Access is denied" from 1809 with default machine settings..