Push (Chain)

This is not a writeup, just my notes about the machine.

Machine information

Credentials

Username
Password
Method
Scope

olivia.wood

DeployTrust07

Leaked on FTP Service

Domain User

kelly.hill

ShinraTensei!

Found into .git files

Domain User

sccadmin

7ujm&UJM

SCCM Relay Attack

Domain User

✅ Valid Usernames

🔑 Passwords list

Password Policy

Information Gathering

Service enumeration

DC01

DNS

  • Not vulnerable to AXFR

SMB

  • Domain SID: S-1-5-21-1451457175-172047642-1427519037

  • NetBIOS: DC01

  • Domain: push.vl

  • FQDN: DC01.push.vl

  • SMB signing: true

  • Server allows null session authentication

HTTP/S

  • Default IIS website

MS01

FTP

  • Anonymous FTP login allowed

SMB

  • SMB signing : false (Vulnerable to NTLM Relay Attacks)

HTTP

ClickOnce is a Microsoft deployment technology that allows Windows-based applications to be installed and run with minimal user interaction—often launched from a URL or shared resource. It supports sandboxing, auto-updating, and limited permission execution, but security often relies heavily on publisher configuration and system policy.

Domain

  • Not asreproastable users

  • Not kerberoastable users.

User: olivia.wood

  • wwwroot folder with Read and Write permission

  • coerce_plus

    • VULNERABLE, DFSCoerce

    • VULNERABLE, PetitPotam

    • VULNERABLE, PrinterBug

    • VULNERABLE, MSEven

  • Spooler service enabled

  • Not Webdav

  • Found PKI Enrollment Server: MS01.push.vl

  • Certificate authority - Found PKI Enrollment Server: MS01.push.vl

  • LDAP

    • LDAP Signing NOT Enforced!

    • LDAPS Channel Binding is set to "NEVER"

  • MachineAccountQuota: 10

Compromise MS01 Server

Download FTP files

Discovering excessive permission on folder

Abusing ClickOnce to gain initial Access

During the enumeration the tester found a Clickonce application running on MS01. This application in together with the previously user found gave the tester the opportunity to gain initial access into the MS01 Server.

Interesting blog: Backdooring ClickOnce .NET Apps for Initial Access: A Practical Examplearrow-up-right

Creating the malicious dll payload

To compromise the Clickonce the tester proceeded to create the next DLL as follows:

Compiling DLL on Linux

Calculating HASH and Size of DLL to manifest file

Editing SelfService.dll.manifest

Removing signature and publisherIdentity tags.

Changing the publicKeyToken to 0000000000000000

Recalculating the new edited .manifest file

Editing SelfService.application

Updating Size, dsig:DigestValue , publicKeyToken=0000000000000000 (both) and remove signature and publisherIdentity tags.

Discovering kelly.hill's plaintext credentials

Path 1: Privilege escalation on MS01 via RBCD (Windows)

Abusing Resource Base Constrained Delegation

Requesting TGS using S4U to impersonate Administrator

Dumping SAM database and LSA Secrets

Path 1: Privilege escalation on MS01 via RBCD (Linux)

Creating Computer Account

Writing msds-allowedtoactonbehalfofotheridentity attribute to MS01

Requesting Ticket TGS to impersonate Administrator

Dumping SAM database and LSA Secrets

Path 2: Privilege Escalation via SCCM NTLM Relay

Discovering the MS01 is a Certificate Authority Server

Discovering Microsoft Endpoint Configuration Manager installed on MS01

Coercing SCCM NTLM Authentication

Retrieving NTLMv2 Hashes

Cracking sccadmin's NTLMv2 hash

Credentials found: sccadmin:7ujm&UJM

Compromise Domain Controler DC01

Path: 1 Golden Certificate Attack

Last updated