Retro
User's password in the comment section - RDP Access - Manipulating UAC's certificate
Last updated
User's password in the comment section - RDP Access - Manipulating UAC's certificate
Last updated
Starting off with the nmap scan
Let's start with the dirsearch scan
Seems like it's running wordpress? - Let's first crawl /retro
directory manually !
We find various blogs in the webpage related to old school retro games and nothing special in source code
We also find that the target is using Wordpress in /retro/wp-content
Clicking on the User Wade, we were redirected to the author section that has the collection of blog posts by Wade
We checked them out but there didn’t seem any hints or secrets
This is when our attention was shifted from blogs to comments
We found that Wade has commented on the blog post regarding Ready Player One
Browsing the Ready Player One blog post we saw that Wade has commented a word to remember parzival
This seems an interesting word, there may exist a user by the name of Wade
and password parzival
So why not try logging into the RDP service ? - and we were able to connect to the RDP service with the credentials we suspected
We can see that there exist some files inside the Recycle Bin