Bruno

This is not a writeup, just my notes about the machine.

Operating System: Microsoft Windows Server 2022 Datacenter

Chain: False

Credentials

Username
Password
Method
Scope

svc_scan

Sunshine1

Asreproast

Domain User

svc_net

Sunshine1

Kerberoast

Domain User

✅ Valid Usernames (RID-Brute Forcing)

🔑 Passwords list

Information Gathering

Nmap Scan

Service Enumeration

FTP

Anonymous FTP login Allowed

Possible User: svc_scan

DNS

  • Not vulnerable to DNS Zone Transfer AXFR

SMB (enum4linux-ng)

Domain SID: S-1-5-21-1536375944-4286418366-3447278137

DNS domain: bruno.vl

FQDN: brunodc.bruno.vl

  • Server allows null session

HTTP

  • FFUF | VHost Enumeration | subdomains-top1million-110000.txt | 0 Results

  • FFUF | Web Fuzzing | directory-list-2.3-medium.txt | root | 0 results

Kerberos enumeration

Performing Asreproasting Attack

Previously Found User: svc_scan

Performing Kerberoasting with valid credentials

Discovering a read and write directory

Foothold via DLL hijacking

During the enumeration of SampleScanner.dll, the tester discovered that when SampleScanner.exe is running, it looks for .zip files within C:\samples\queue\. If any are found, it unzips the content and deletes the original .zip file.

Additionally, the application attempts to load hostfxr.dll from the current directory. This behavior can be abused for DLL Hijacking.

Procmon.exe Sysinternals

Attack Path

  • A zip file containing a malicious hostfxr.dll named as ../app/hostfxr.dll.

  • Upload the zip file into queue directory.

  • When the application runs again it will try to load hostfxr.dll that subsequently send the reverse shell.

Crafting the malicious DLL

Abusing ZIP Path Traversal

EvilArcarrow-up-right - Alternative: python2.7 evilarc.py -p ../app hostfxr.dll -d 0

Double Checking for the name:

Uploading the file

Obtaining a reverse shell through DLL Hijacking

Domain Compromise via Kerberos Relay Attack

Requirements:

  1. LDAP signing not required on Domain Controller.

  1. Ability to add computer into the domain controller.

Checking Available Port

Tool: KrbRelayarrow-up-right

Kerberos Relay Attack using KrbRelay

Adding a new malicious computer

Obtaining the malicious computer SID

Performing KrbRelay attack to compromise domain

Kerberos Relay Attack using KrbRelayUp (Linux path)

Performing Kerberos Relay attack with KrbRelayUp tool to compromise domain

Requesting the Service Ticket with s4u using impacket

Performing DCSync Attack to dump NTDS.dit

Kerberos Relay Attack using KrbRelayUp (Windows path)

Performing Kerberos Relay attack with KrbRelayUp tool to compromise domain

Requesting Ticket Granting Ticket for KRBRELAYUP$ user

Requesting Ticket Granting Service using S4U

Trying to perform DCSync attack using mimikatz

I tried to perform a DCSync attack within Windows using Mimikatz, but it didn’t work, even though the tickets were valid. On Windows, UAC (User Account Control) filters admin privileges for network operations (e.g., SMB, LDAP), causing Access Denied and Mimikatz failed because SeDebugPrivilege wasn’t enabled due to insufficient local privileges or restrictions. Additionally, tickets injected into the session via /ptt are subject to UAC and local ACLs, limiting their use. Then I decided to move to my Linux machine and perform the DCSync attack using Impacket. In Linux, it worked because Impacket uses the .ccache ticket directly against the DC, bypassing UAC and local privilege issues, and applies the ticket’s permissions cleanly over the network without session constraints.

Downloading the files and perform DCSync Attack

CLSIDS working for Windows 2019/2022

Last updated