Reflection (Chain)

This is not a writeup, just my notes about the machine.

Operating System: Microsoft Windows Server 2022 Standard

Chain: True (3 Machines)

Credentials

Username
Password
Method
Scope

web_staging

Washroom510

Leaked on SMB Folder

Domain User/MSSQL on MS01

dev01

Initial123

MSSQL

User on MS01

dev02

Initial123

MSSQL

User on MS01

web_prod

Tribesman201

NTLM Relay

MSSQL user on DC01

abbie.smith

CMe1x+nlRaaWEw

MSSQL

Domain User

dorothy.rose

hC_fny3OK9glSJ

MSSQL

Domain User

Rhys.Garner

knh1gJ8Xmeq+uP

LSA

Domain User

✅ Valid Usernames

🔑 Passwords list

Information Gathering

Nmap scan

Service enumeration

10.10.241.133

SMB

  • Domain SID: S-1-5-21-3375389138-1770791787-1490854311

  • Netbios: DC01

  • FQDN: dc01.reflection.vl

  • Domain: reflection.vl

  • Parent Domain

  • Allows null session authentication

  • signing: False

DNS

  • Not vulnerable to AXFR

10.10.241.134

SMB (enum4linux-ng)

  • Server allows null session authentication

  • Server allows guest session authentication

  • FQDN: ms01.reflection.vl

  • signing: False

10.10.241.135

SMB

  • FQDN: ws01.reflection.vl

  • signing: False

Compromising MS01

Discovering a valid credentials

Connecting to MSSQL and discovering a valid user credentiales

NTLM Relay Attack via socks proxy

The previous enumeration indicated that some servers did not have SMB signing disabled, making them vulnerable to NTLM Relay attacks.

Setting up the ntlmrelayx tool to initiate a interactive shell.

Triggering the authentication to perform the relay

Output from impacket-ntlmrelayx tool.

Downloading the database production user.

Discovering users credentiales on MSSQL table

Using a valid credentials the tester proceeded to enumerate the domain controler by using bloodhound.

Reading LAPS password on MS01

The user abbie.smith possesses GenericAll over MS01 which means the user can abuse of this machine using RBCD or reading the LDAP password. (RBCD was not possible due the MachineAccountQuota is 0)

Dumping DPAPI and LSA credentials on MS01

Compromising WS01

Abusing Resource Based Constrained Delegation

Requesting Ticket Granting Ticket via S4U

Authenticating into WS01 as NT Authority System

Dumping SAM and LSA Secrets

Compromising Domain Controller (DC01)

During the enumeration, the tester discovered a user named DOM_RGARNER, which looked similar to the previously obtained username, Rhys.Garner. The tester then proceeded to use NetExec to check the credentials.

Performing DCSync attack to compromise reflection.vl

Last updated