Lustrous2

This is not a writeup, just my notes about the machine.

Operating System: Windows Server 2022 Standard

Chain: False

Credentials

Username
Password
Method
Scope

Emma.Bell

Summer2024!

Brute forcing

Domain User

Terence.Jordan

Lustrous2!

Brute forcing

Domain User

Thomas.Myers

Lustrous2024

Brute forcing

Domain User

SHARESVC

#1Service

LLMNR NTBNS poisoning

Domain Service Account

✅ Valid Usernames

🔑 Passwords list

Information Gathering

Service Enumeration

FTP

FTP anonymous login enabled.

Valid usernames found inside the FTP service

  • Look at the valid username section.

File leaked the audit findings

DNS

  • Not vulnerable to DNS Zone Transfer

HTTP

The website use some type of authentication.

Initial Foothold

Abusing Weak Credentials

Brute forcing Kerberos

NTLM authentication is disabled (STATUS_NOT_SUPPORTED )and Kerberos authentication was used.

Setting up Kerberos in my local computer

Requesting Ticket Granting Ticket to authenticate into Web application

The tester previously got 401 Unauthorized due was not authenticated with Kerberos.

Using valid credentials to request TGT.

Attempting to request the website with curl using Kerberos authentication.

Setting up Firefox to use Kerberos authentication

Navigate to: about:config

Key
Value

network.negotiate-auth.trusted-uris

.lustrous2.vl

network.negotiate-auth.delegation-uris

.lustrous2.vl

network.negotiate-auth.using-native-gsslib

true

Discovering Path Traversal vulnerability

Vulnerable parameter: fileName

Abusing Path Traversal to download web.config file.

Capturing ShareSvc's NTLMv2 Hash

Brute forcing NTLMv2 Hash and retrieving the plain text credential.

Analyzing data with Bloodhound

Script: kozmerarrow-up-right

The tester was not able to execute the BloodHound ingestor. Instead, they used ldapsearch together with ldapsearch_parser.py to collect and convert LDAP data into a format compatible with BloodHound.

The group belongs to the Protected Users group, which enforces strict security restrictions. As a result, it is not possible to use techniques such as crafting Silver Tickets, NTLM authentication, or Kerberos delegation to impersonate the user. These protections are specifically designed to mitigate credential theft and abuse scenarios. However, in some specific cases, the S4U2Self Kerberos extension may allow a service account configured with appropriate delegation permissions to request a service ticket to itself on behalf of the protected user, potentially bypassing some of these restrictions under very controlled conditions.

Authenticating into the application as Share Admin user

Analyzing LuShare.dll

Linux DLL decompiler: CodemerxDecompilearrow-up-right

The application has a functionality in /file/debug that allows to execute commands if the right PIN is passed.

Executing curl command to confirm Remote Command Execution

Sending Reverse shell using rcat tool

Tool: rcatarrow-up-right

Privilege Escalation

Discovering Velociraptor software

Creating an API client configuration as Administrator

Sending Reverse shell using rcat tool to gain access as NT Authority System

Last updated