sitemapDC02

After we downloaded this machines and configured its network interface just like DC01, we are going to perform smb sweep to find the machine are going to hack:

Enumeration:

We will add it to the /etc/hosts:

Lets start with nmap:

Lets see if we have anonymous access to the box:

We do not have access either anonymously or as a guest user.

At this point we can go and search if we have anonymous bind on ldap, or start bruteforcing users using kerbrute:

We immediately found some users:

We will add them to a text file to do password spray or AS-REP Roasting:

Now we have valid credentials.

Move Laterally to zximena448:

We can start to dump users or to give a look to the shares:

There is no any interesting share.

Lets dump the users:

We go a lot of users, we can redirect it to a file to extract the users from it:

Since we have a list of valid users, we can try AS-REP Roasting:

Now after we obtained this users' hash, we can attempt to crack it with hashcat:

We got his password, lets see if we have administrative privileges, or we can access winrm:

We still do not have access to the system,

Privilege Escalation:

We can use bloodhound to see what path could lead to full administrative privileges or interesting groups.

I will use ldapdomaindump to dump the domain objects info:

Lets see if any of our owned users has anything useful:

As shown zximena448 is part of the Backup Operators, which can give us the ability to dump the sam database, but first we need to start share so the tool that will dump sam database can dump it to our local machine:

After it dumped that hashes, we can use secretsdump to extract the hashes from the sam databse:

Here we go.

I tried to authenticate with the local administrator ntlm hash, but I could not, maybe the password has been changed.

But we have the machine account (DC01) ntlm hash as well, which is the domain controller that it has access to dump the ntds hashes:

Here is the domain administrator ntlm hash, we can authenticate via evil-winrm:

Here is the root flag, you can get the user flag from the zximena448 desktop.

Last updated