Retro2

This is not a writeup, just my notes about the machine.

Machine information

Operating System: Windows Server 2008 R2 Datacenter 7601 Service Pack 1

Chain: False (standalone compromise)

Credentials

Username
Password
Method
Scope

Public_DB_staff.accdb

class08

Bruteforce attack

Microsoft Access Database

ldapreader

ppYaVcB5R

Inside the Microsoft Access Database file

Domain User

✅ Valid Usernames

🔑 Passwords list

Information Gathering

Service enumeration

DNS

  • Not vulnerable to DNS AXFR

SMB (enum4linux-ng)

  • Server allows null session

  • Server allows guest session

  • RID Bruteforce attack retrieved a list of valid users

  • Windows Server 2008 R2 Datacenter 7601 Service Pack 1 (Obsolete)

  • Vulnerable to Zerologon

Initial Enumeration

Discovering a Microsoft Access Database protected with password

Brute-forcing the database hash and obtaining the plain text credentials

Moving the file to my machine and viewered the content

Exploitation

Path: Zerologon

Abusing the zerologon vulnerability

Performing DCSync attack

Obtaining a shell as Administrator

Path: DACLs

Visualizing the attack path

Discovering a pre-Windows 2000 computer account

circle-info

​In Active Directory, when administrators create computer accounts with the "Assign this computer account as a pre-Windows 2000 computer" option enabled, the system sets the account's password to the computer's name in lowercase. For example, a computer account named "Workstation1$" would have a default password of "workstation1"

Changing the default password

Abusing GenericWrite over ADMWS01$

Adding ldapreader user to Remote Desktop Users

Privilege Escalation

RpcEptMapper exploit

Last updated