Heron (Chain)

This is not a writeup, just my notes about the machine.

Machine information

Operating System:

Chain: False (standalone compromise)pent

Credentials

Username
Password
Method
Scope

pentest

Heron123!

Provided by customer

Initial tester user

samuel.davies

l6fkiy9oN

Asreproast

Domain User

svc-web-accounting-d

H3r0n2024#!

Groups XML + Password Spraying

Domain User

_local

Deplete5DenialDealt

Password Spraying Attack

Domain User

Julian.Pratt

Deplete5DenialDealt

Re use Credentials

Domain User

adm_prju

ayDMWV929N9wAiB4

Retrieved in .ink files

Domain User

✅ Valid Usernames

🔑 Passwords list

Information Gathering

Nmap

Service Enumeration

10.10.231.37

SMB (enum4linux-ng)

  • Root/parent Domain

  • Domain SID: S-1-5-21-1568358163-2901064146-3316491674

  • Domain: heron.vl

  • FQDN: mucdc.heron.vl

  • NetBIOS: HERON

  • SMB Signing: True

  • Server Allows Null session authentication

HTTP:80

Initial foothold on Heron

Setting up a tunnel to reach the internal network

Discovering Valid users via Kerbrute user enumeration

Discoverign Asreproastable user

Cracking samuel.davies' hash

Discovering groups.xml within the sysvol share

Extracting the GPP Password using NetExec

Password Spraying attack

Remote command Execution via web.config

The tester discovered the user svc-web-accounting-d possesses Read and Write permission over Accounting$ share that is hosting the web configuration including web.config and revealed the presence of a new subdomain named accounting.

The tester proceeded to upload a web.config as follows:

And finally, trigger the execution of the reverse shell.

Discovering _local user credentials

Performing Password Spraying attack

The tester proceeded to perform a password spraying attack using the previously found password, as the account appeared to be a service account, suggesting that some users may have the bad practice of reusing credentials.

Discovering adm_prju user credentials

During the home directory enumeration the tester discovered that the user Julian.Pratt had a shortcuts files.

The files was analyzed revealing the adm_prju's password.

Compromising FRAJMP Host

Privilege escalation to root

Obtaining the NT Hash FRAJMP computer account

Compromising Domain Controller (Heron.vl)

During enumeration, the tester identified that the user ADM_PRJU@HERON.VL is a member of the group ADMINS_T1@HERON.VL, which has WriteAccountRestrictions privileges over the machine account MUCDC.HERON.VL.

This privilege enables the abuse of Resource-Based Constrained Delegation (RBCD) by modifying the msDS-AllowedToActOnBehalfOfOtherIdentity attribute. As a result, the tester successfully granted delegation rights to the computer account FRAJMP$, impersonated the MUCDC$ computer account, and compromised the domain controller via a DCSync attack.

Abusing RBCD to compromise domain controller

Requesting TGT using S4U for MUCDC$

Performing DCSync Attack

Last updated