Cicada

This is not a writeup, just my notes about the machine.

Operating System: Windows Server 2022 Standard

Chain: False

Credentials

Username
Password
Method
Scope

Rosie.Powell

Cicada123

Password Spraying + Kerberos

Domain User

✅ Valid Usernames

🔑 Passwords list

Information Gathering

Nmap Scan

Initial enumeration

DNS

  • Not vulnerable to DNS Zone Transfer.

SMB (enum4linux-ng)

  • Domain: cicada.vl

  • FQDN: DC-JPQ225.cicada.vl

NFS

Inside the profiles directory there a folders with possible usernames and two images one containing a possible password

User brute forcing

STATUS_NOT_SUPPORTED: NTLM authentication is disabled; instead, Kerberos authentication is used.

circle-info

When NTLM is disabled and Kerberos is enable you must specify FQDN not IP Address

Bruforcing with Kerberos authentication

Requesting a TGT ticket

Discovering Vulnerable Certificate Templates (ESC8)

Compromise Domain Controller from Linux

Adding Malicious DNS Record

Setting Up krbrelayx Environment

Launching krbrelayx Attack

Format: HOSTNAME1UWhRCAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAYBAAAA

Triggering Coercion via DFS

Path: Certipy-ad tool

Retrieving domain controller NT Hash

Requesting domain controller Ticket Granting Ticket

Performing DCSync Attack against domain controller

Path: PKINITtools tools

Requesting TGT Using PKINIT and PFX Certificate

Use a python environment and install the requirements

Dumping Domain Secrets with secretsdump

Compromise Domain Controller from Windows

Setting up DNS

Joining to the domain controller.

Launching RemoteKrbRelay attack

Writting the base64 string into a file.

Obtaining Domain Controller NT Hash

Performing DCSync Attack against Domain Controller.

Last updated