Attacking Common Applications - Skills Assessment III
During our penetration test our team found a Windows host running on the network and the corresponding credentials for the Administrator. It is required that we connect to the host and find the hardcoded password
for the MSSQL service.
What is the hardcoded password for the database connection in the MultimasterAPI.dll file?
So when connecting using RDP we found this DLL file in the following path: C:\inetpub\wwwroot\bin\MultimasterAPI.dll
. We need to upload it to our Linux VM, so I start an SMB server on my Kali using:
and then copy the file from Windows to Kali using:
And then I use a simple command to display any useful information
And I noticed that the DLL was developed with .NET, so to reverse it and i used dnSpy on my Windows machine. After reversing each function i found the password used when connecting to the 'Hub_DB' database.
Last updated
Was this helpful?