Redelegate

This is not a writeup, just my notes about the machine.

Operating System: Windows Server 2022 Standard

Chain: False

Credentials

Username
Password
Method
Scope

Keepass

Fall2024!

Brute forcing

Payroll

cVkqz4bCM7kJRSNlgx2G

Extracted from Keepass DB

Timesheet

hMFS4I0Kj8Rcd62vqi5X

Extracted from Keepass DB

KeyFob

22331144

Extracted from Keepass DB

Administrator

Spdv41gg4BlBgSYIW1gF

Extracted from Keepass DB

FTPUser

SguPZBKdRyxWzvXRWy6U

Extracted from Keepass DB

FTP

SQLGuest

zDPBpaF4FywlqIv11vii

Extracted from Keepass DB

MSSQL

WordPress Panel

cn4KOEgsHqvKXPjEnSD9

Extracted from Keepass DB

Wordpress

marie.curie

Fall2024!

Brute forcing

Domain User

✅ Valid Usernames

🔑 Passwords list

Information Gathering

Nmap Scan

Service Enumeration

FTP

Anonymous FTP login allowed

Keepass Database (Not Success with rockyou)

DNS

  • Not vulnerable to DNS Zone Transfer

HTTP

  • IIS Default Website

Kerberos

Nomenclature name: name.lastname@redelegate.vl

Two Valid User obtained: ryan.cooper & marie.curie

SMB (enum4linux-ng)

Domain SID: S-1-5-21-4024337825-2033394866-2055507597

  • Server allows null session

Initial Foothold

Bruteforcing Keepass database

According with TrainingAgenda.txt file found on FTP there was a hint looks like password SeasonYear!.

The tester created a file as follows:

The tester created a hashcat rules file as follows:

Finally performed the mutation procedure to create the final wordlist.

Enumerating database

The tester was able to retrieve a list of valis credentials stored into the keepass database. (Check Passwords list)

Brute forcing domain users.

Finding kerberoastable and asreproastable users

Abusing DACL misconfiguration

Taking Over domain users

Constrained Delegation

Constrained Delegation from Linux

Changing the user account password

Helen.frost is member of Remote Management Users that allowed to authenticate remotely.

Changing the computer account password

Adding TRUSTED_TO_AUTH_FOR_DELEGATION property

Setting msDS-AllowedToDelegateTo to LDAP

Requesting TGT using S4u

Performing DCSync Attack

Constrained Delegation from Windows

Changing computer Account password

Adding TRUSTED_TO_AUTH_FOR_DELEGATION property

Setting msDS-AllowedToDelegateTo to LDAP

Requesting ticket granting ticket using S4U2Self and S4U2Proxy

Performing DCSync Attack using mimikatz (Not Working)

If someone knows why this is happend, please contact to me. I really appreciate a lot understand why this is not working as expected.

Performing DCSync attack using impacket toolkit

Last updated