Install Steam
login
|
language
简体中文 (Simplified Chinese)
繁體中文 (Traditional Chinese)
日本語 (Japanese)
한국어 (Korean)
ไทย (Thai)
Български (Bulgarian)
Čeština (Czech)
Dansk (Danish)
Deutsch (German)
Español - España (Spanish - Spain)
Español - Latinoamérica (Spanish - Latin America)
Ελληνικά (Greek)
Français (French)
Italiano (Italian)
Bahasa Indonesia (Indonesian)
Magyar (Hungarian)
Nederlands (Dutch)
Norsk (Norwegian)
Polski (Polish)
Português (Portuguese - Portugal)
Português - Brasil (Portuguese - Brazil)
Română (Romanian)
Русский (Russian)
Suomi (Finnish)
Svenska (Swedish)
Türkçe (Turkish)
Tiếng Việt (Vietnamese)
Українська (Ukrainian)
Report a translation problem
The syntax on that one screwed me up a bit.
It's roughly [from memory]
userid:hashhashhash
you need to include the userid part too.
Pay attention to what he says which directory to attack! It's not the AD! If you've already closed the WMI module with your former netscan... then you can't see it. ;)
No. It said you are supposed to run a "low-level dictionary attack using John The Ripper on the IT Mainframe" If you did this correctly, correct path and username, you will hear the distinctive sound that you completed a task. You don't have to do anything further with this password - after the attack you see the password and hear the distinctive sound that the objective was completed. That's all there's to it. Going back to the training module will grant you the certification.
Dunno what else you see there with hashs and stuff and how you did that, but it's definitely not what you are supposed to be doing. Also there's no need to copy anything else other than the path into the password attack module and have it cracking it. That's it. Do not think too much, keep it simple. I'm sure you had already cracked a password in another training before. I've just replayed the training for you to recall how it worked... and completed it without any difficulties, in the blink of an eye. It's really not that hard. Even trial and error would work, because everything that you did wrongly will just produce an "error", a dead end. There are no other different ways to solve a task in this game than the only one the devs wanted you to use. It's a shame, but that's how this game works. CoD is a sandbox game compared to this one. So try everything till it clicks and use the method of elimination if you're stuck. This works just as well. It's as simple as that.
Edit: In an attempt to reproduce what you said you see... neither the wrong target nor the wrong username would give me anything like that but an error. As I said. Hence the correct target and username and the correct attack variant as said in the objectives will get you the password. Are we really talking about the same training: Network Intrusion/Active Directory?
After all. :) Keep in mind: if you type sth. wrong it produces an instant error. It will not try cracking anything at all. The module miraculously knows which users and paths exist and which don't. The output will always be an "error - either target host or username doesn't exist".
So, once you passed this step and you're inside the module's menu to choose the attack type from (SYSTEM.config) you did something correctly, otherwise you would've been stuck already before. But from now on it can behave differently. E.g trying to crack the password but ending up with kinda "couldn't be resolved", which means, you did something right, otherwise you wouldn't have come thus far in the first place, but then you messed it up e.g. when choosing the password attack type (John The Ripper is mostly sufficient, later you might want to try more thorough methods) or, pay attention to this one, in case of hashs: when you try to decyphre such hashs, then you have to additionally check which elements the hash is composed of on the very right side of the attack module (PRINCE.config): first name, second name, age or sth. like that... If you forgot to check the correct variables the module will still try to solve it but not be able to and give you an according error as mentioned above. But at least you knew that you're on the right path (literally) and just had to alter something inside the attack config menu. Trial and error will help here too in case you're stuck. ;) Hope, that helps for further trainings or missions. GL & HF!
I am stuck with the hostname. I tried the domain but it's not letting me through. :(
It is requiring the task of "Low-level Dictionary Password Attack using John the Ripper on the IT Mainframe" . There is no IT Mainframe domain from sfuzzer or osintscan. The WMI Scanner only gives the Port# For the IT Mainframe of 8080 to a IBMWatson.. There is no Domain address therefore I can not continue with the Password attack against the username BCHAMBERS .
So as the others, I am stuck aswell. The game has not provided a method of gaining a domain from other soruces and all I have is the sub domains of "mail" "m" "login" for sunshade-corp.com which none will allow the password attack as it states it has the wrong domain.
- Open Information Gathering > WMI Scanner
- run "netscan"
- There you find the "/erp/it_mainframe" path
- Now open "Network Intrusion" > "Password Attack"
- Enter HOST: "/erp/it_mainframe" with user "bchambers"
- Check "John the Ripper" and click START
Too many egos make for a poor community experience guys. Thanks to those that tried to help! Hope this helps someone.
NewbNinja