Sweep

This is not a writeup, just my notes about the machine.

Operating System: Windows Server 2022 Standard

Chain: False

Credentials

Username
Password
Method
Scope

intern

intern

Password Spraying

Domain Account + Lansweeper

svc_inventory_lnx

0|5m-U6?/uAX

SSH Sniffing

Domain Account + Lansweeper

✅ Valid Usernames

🔑 Passwords list

Information Gathering

Nmap scan

Service enumeration

DNS

  • Not vulnerable to DNS Zone Transfer AXFR

SMB (enum4linux-ng)

Domain SID: S-1-5-21-4292653625-3348997472-4156797480

  • Server allows null session authentication

  • Server allows guest session authentication

    • RID-Bruteforce returned a list of valid usernames.

LDAP

  • Not kerberoastable users.

  • Not Asreproastable users.

Username as password bruteforce

Bloodhound enumeration

Possible users with privilege escalation

  • svc_inventory_lnx

  • JGRE808

  • svc_inventory_win

HTTP

LANSWEEPER v. 11.1.6.0

Lansweeper is an IT Asset Management (ITAM) platform that helps organizations discover, manage, and optimize their technology assets, providing visibility into IT, OT, and IoT assets, and enabling centralized IT inventory and management.

Valid Creeds: intern:intern

Exploitation

Capturing SSH credentials

Discovering SSH credentials stored in lansweeper

circle-info

Lansweeper can scan more asset details with scanning credentials.

Mapping the SSH credentials to the Scan

The tester configured a Scanning Target and append the Linux credentials.

Setting up a Fake SSH service.

The tester run a fake ssh service to capture the svc_inventory_win plaintext credentials.

Abusing the DACL to obtain Remote Access

Domain Compromise

Adding a new Map Credentials

The tester utilized the new credentials to log into the application and configured a new set of credentials.

Creating a new package deployment to obtain reverse shell.

The tester accessed the Package deployment section and initiated the creation of a new package. Utilizing revshells.comarrow-up-right, the tester generated a reverse shell, which was then triggered and sent to compromise the server as NT Authority System.

Last updated