Breach

This is not a writeup, just my notes about the machine.

Operating System: Microsoft Windows Server 2022 Datacenter

Chain: False

Credentials

Username
Password
Method
Scope

JULIA.WON

Computer1

LLMNR & NBT-NS Poisoning

domain User

svc_mssql

Trustno1

Kerberoasting

Service Account

✅ Valid Usernames

🔑 Passwords list

Information Gathering

Nmap Scan

Service Enumeration

DNS

  • Not vulnerable to AXFR Zone Transfer

SMB (enum4linux-ng)

  • Allows null session authentication

  • Allows guest session authentication (random username)

  • OS:

    • Windows 10

    • Windows Server 2019

    • Windows Server 2016

  • RID bruteforce is allowed retrieving usernames

    • Not users with UF_DONT_REQUIRE_PREAUTH set (asreproast)

  • Not users using username as password

  • share folder has WRITEand READ permission.

Exploitation

LLMNR & NBT-NS Poisoning attack

The tester used the ntlm_theft arrow-up-rightpython tool to generate a malicious file to allowed to capture NTLMv2

Once the file was generated the tester proceeded to upload the file to the SMB public share. Capturing successfully the Julia.Wong's NTLMv2 hash.

Finally, the tester use hashcat tool to retrieve JULIA.WONG's plaintext credential

Retrieving svc_mssql's Ticket Granting Service

Once the ticket was retrieved the tester proceeded to cracking using hashcat.

Post Exploitation

Crafting Silver ticket to impersonate Administrator account

Using HOAXShell to bypass the AV and gain foothold on the system

Compromise Domain Controller

Since the obtained shell is running under a service account, the SeImpersonatePrivilege token is active.

To compromise the domain, the tester performed the following steps:

  1. Uploaded the GodPotato arrow-up-rightbinary to the target machine.

  2. Disabled Windows Defender’s real-time protection using the following command:

Then, executed a reverse shell by invoking a Base64-encoded PowerShell payload:

Last updated