Retro

This is not a writeup, just my notes about the machine.

Machine information

Operating System: Windows

Chain: False (standalone compromise)

Credentials

Username
Password
Method
Scope

trainee

trainee

Username as Password (Bruteforce userlist)

Domain User

✅ Valid Usernames

🔑 Passwords list

Information Gathering

Service Enumeration

DNS

  • Not vulnerable to AXFR

SMB (enum4linux-ng)

  • Server allows null session

  • Server allows guest user

  • Not Group.xml (gpp file).

SMB Shares enumeration

Enumerating domains users via rid-bruteforce

Username as password brute-forcing

Enumerating the SMB shares with valid credentials

Discovering a vulnerable template to ESC1

Discovering a pre-Windows 2000 computer account

circle-info

​In Active Directory, when administrators create computer accounts with the "Assign this computer account as a pre-Windows 2000 computer" option enabled, the system sets the account's password to the computer's name in lowercase. For example, a computer account named "Workstation1$" would have a default password of "workstation1"

Compromise Domain Controller

Last updated