Mythical (Chain)

This is not a writeup, just my notes about the machine.

Credentials

Username
Password
Method
Scope

mythic_admin

wG4jmjNcEcfmzv3QbEcJdSVTDEjCnX

Provided by Client

Mythical Server

domjoin

hKvhexY5BtAgtWAY

Found on Keepass

domain user

Keepass Database

741852

Cracked from keepass database

Keepass database

svc_ldap

osaRXWkDf2y5SGh5

Disassembly binary

Domain User

✅ Valid Usernames

🔑 Passwords list

Information Gathering

Nmap Scan

Compromise DC01 Server

Initial Access

Situational Awareness

  • OS Name: Microsoft Windows Server 2022 Standard

  • System Type: x64-based PC

  • Current User: momo.ayase

    • MYTHICAL-US\Backup Admins

    • SeMachineAccountPrivilege (Create Computers)

  • Domain: mythical-us.vl

  • FQDN: dc01.mythical-us.vl

  • Not kerberoastable and asreproastable users

Checking the ARP table.

Scanning the internal network

Tool: PortScannerarrow-up-right

Enumerating Rsync service and retrieving a keepass database

Worth file: it.kdbx

Cracking keepass database

Attempting to retrieve the database hash using keepass2john returned File version '40000' is currently not supported! which means the format is not supported.

The tester used keepass4brute.sharrow-up-right instead.

Privilege escalation on DC01 via ESC4

Discovering the user domjoin can use ADSC

During the enumeration using bloodhound the tester found the user domjoins belongs to Certificate Service DCOM Access which members of this group are allowed to connect to Certification Authorities in the enterprise.

Discovering a vulnerable template to ESC4

The users Momo.Ayase and domjoin possesses the SeMachineAccountPrivilege, which allows the creation of computer accounts. This privilege, combined with the configuration of a vulnerable certificate template, fulfills all the necessary requirements to carry out an ESC4 attack. Specifically, the certificate template allows members of the MYTHICAL-US\Domain Computers group to enroll for certificates.

Creating a computer account

The tester proceeded to create a computer account with possess full permission over Machine template.

Abusing of template ESC4

Once the machine is created, the tester proceeded to impersonate the machine account for subsequently modify the machine template and make it vulnerable to ESC1.

Abusing of template ESC1

Once the template is modified from ESC4 to ESC1 the tester proceeded to request a certificate template in behalf of Administrator account.

Request TGT using administrator certificate

Obtain a shell as Administrator using pass the hash.

Compromising DC02

Initial Access

Discovering a Outbound trust relationship

The tester identified that the domain mythical-us.vl has an outbound trust to mythical-eu.vl, meaning it accepts authentication from users in the mythical-eu.vl domain.

Obtaining the trust hash accounts

Using mimikatz, the tester dumped the trust relationship secrets and recovered the NTLM hash of the trust account MYTHICAL-US$, stored within mythical-eu.vl.

With this hash, the tester used Rubeus to request a Kerberos TGT on behalf of mythical-us$ from the mythical-eu.vl domain controller:

Privilege escalation on DC02

Discovering a svc_ldap's plaintext credentials

The tester downloaded getusers.exe and proceeded to disassembly to analyze it.

The tester found svc_ldap's plain text credentials within getusers.exe .

Credentials found: svc_ldap:osaRXWkDf2y5SGh5

Abusing Trustworthy Database

Initial foothold on DC02

Privilege escalation on DC02 via SeImpersonatePrivilege

Last updated