Operation Nitro Winter, Chapter 4

Discussion in 'Missions Center' started by hakr14, Feb 3, 2019.

Tags:
  1. hakr14

    hakr14 Active Agent

    After finding FingrTip, Agent Dylan gives us the AccessBio XKeyScore entity. He then says something about finding a connection between it and... something else. F.A.Y. filtering only gives me the AccessBio entity, and I have no idea what the game expects me to do.
     
  2. Dalamus

    Dalamus Active Agent

    I'm also at the same point. I have the XKEYSCORE entity but I'm not too sure what to do with it. I've tried looking for anything remotely similar to fingrtip online but found nothing.
     
  3. hakr14

    hakr14 Active Agent

    I found the answer, there's a new file in the localhost folder, viewing it gives you another XKeyScore entity. I dont remember Dylan saying anything about localhost, which would explain our confusion.
     
    Dalamus likes this.
  4. Dalamus

    Dalamus Active Agent

    I also don't remember him saying anything about that but thanks a lot!! Checking it out now! ^^
     
  5. andrea

    andrea Active Agent

    i am at the point "find bastek client list"
    /spoiler i am in the system.nexxit.com server. with wmi scanner i find 4 options, the ERP server is vulnerable with Verboten but i cant find a connection..
    No MITM, No wifi, no active directory, im stuck .. :(
     
  6. alphabravo

    alphabravo New Agent

    I can't find a way into the level 4 target's network I've tried osint, sfuzzer, Social engineering but nothing is giving me a foot in the door. Any help?
     
  7. Dgray

    Dgray Active Agent

    Alphabravo. You're trying t access bast___? I think you need to fingerprint them a bit more thoroughly.
    One of the agents will notice the tech being used and recommend another approach
     
  8. alphabravo

    alphabravo New Agent

    I have tried fingerprinting the domain name as osint didn't give any results.
     
  9. Dgray

    Dgray Active Agent

    In my notes I have that after you fingerprint the various urls, you see they're all secure
    But then agent Dylan points out that he may have a way to break into systems running FingrTip
    If you're not finding any urls with osintscan, maybe sfuzzer? (honeslty don't remember)
     
  10. jay_0ne0ll

    jay_0ne0ll New Agent

    Hey guys, I know this thread is some time old but I am stuck on this chapter at the same stage mentioned above. The problem I am having is trying to access Bastek's employee directory
    via sara's phone
    .

    Can someone point me in the right direction????
     
  11. Dgray

    Dgray Active Agent

    Go into the phone's settings and activate the personal hotspot.
    Pretend that's a turbine card.
    Hope that helps.
     
  12. jay_0ne0ll

    jay_0ne0ll New Agent

    Thanks for the reply Dgray.

    Sorry, its the step after that I am trying to complete.
    The hotspot
    is activated so I can access that as a turbine card. Its finding a way into the employee's directory I am stuck on.

    I have found an additional
    sub-doamin via sfuzzer (mecache.bastek)
    but this is up-to-date.

    I have
    completed a wmi scan on the internal network when connected to the phone
    and dug the pathways. When trying to exploit the them, no luck with that. Can connect to one pathway via file browser
    along with mecache.bastek
    but have no usernames to carry out password crack.

    Also tried social eng and MITM but nothing found.

    Any other pointers would be great. Thanks,

    Jay.
     
  13. Dgray

    Dgray Active Agent

    one of the netscan paths is
    active directory
    Just copy and paste the path into that tool.
     
  14. jay_0ne0ll

    jay_0ne0ll New Agent

    Thanks. That was too obvioius I couldn't see it! haha!

    Completed the chapter now :)
     
  15. Dgray

    Dgray Active Agent

    good job!. happy hunting agent.
     
    jay_0ne0ll likes this.

Share This Page