Support

Recon

chevron-rightnmap_scan.loghashtag
Open 10.129.124.77:53
Open 10.129.124.77:88
Open 10.129.124.77:135
Open 10.129.124.77:139
Open 10.129.124.77:389
Open 10.129.124.77:445
Open 10.129.124.77:464
Open 10.129.124.77:593
Open 10.129.124.77:3268
Open 10.129.124.77:3269
Open 10.129.124.77:5985
Open 10.129.124.77:9389
Open 10.129.124.77:49667
Open 10.129.124.77:49664
Open 10.129.124.77:49678
Open 10.129.124.77:49690
Open 10.129.124.77:49707
[~] Starting Script(s)
[>] Running script "nmap -vvv -p {{port}} {{ip}} -sV -sC -Pn" on ip 10.129.124.77

PORT      STATE SERVICE       REASON  VERSION
53/tcp    open  domain        syn-ack Simple DNS Plus
88/tcp    open  kerberos-sec  syn-ack Microsoft Windows Kerberos (server time: 2024-12-13 23:33:53Z)
135/tcp   open  msrpc         syn-ack Microsoft Windows RPC
139/tcp   open  netbios-ssn   syn-ack Microsoft Windows netbios-ssn
389/tcp   open  ldap          syn-ack Microsoft Windows Active Directory LDAP (Domain: support.htb0., Site: Default-First-Site-Name)
445/tcp   open  microsoft-ds? syn-ack
464/tcp   open  kpasswd5?     syn-ack
593/tcp   open  ncacn_http    syn-ack Microsoft Windows RPC over HTTP 1.0
3268/tcp  open  ldap          syn-ack Microsoft Windows Active Directory LDAP (Domain: support.htb0., Site: Default-First-Site-Name)
3269/tcp  open  tcpwrapped    syn-ack
5985/tcp  open  http          syn-ack Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP)
|_http-server-header: Microsoft-HTTPAPI/2.0
|_http-title: Not Found
9389/tcp  open  mc-nmf        syn-ack .NET Message Framing
49664/tcp open  msrpc         syn-ack Microsoft Windows RPC
49667/tcp open  msrpc         syn-ack Microsoft Windows RPC
49678/tcp open  ncacn_http    syn-ack Microsoft Windows RPC over HTTP 1.0
49690/tcp open  msrpc         syn-ack Microsoft Windows RPC
49707/tcp open  msrpc         syn-ack Microsoft Windows RPC
Service Info: Host: DC; OS: Windows; CPE: cpe:/o:microsoft:windows

Host script results:
| p2p-conficker: 
|   Checking for Conficker.C or higher...
|   Check 1 (port 6187/tcp): CLEAN (Timeout)
|   Check 2 (port 46929/tcp): CLEAN (Timeout)
|   Check 3 (port 10754/udp): CLEAN (Timeout)
|   Check 4 (port 24264/udp): CLEAN (Timeout)
|_  0/4 checks are positive: Host is CLEAN or ports are blocked
| smb2-security-mode: 
|   3:1:1: 
|_    Message signing enabled and required
|_clock-skew: 0s
| smb2-time: 
|   date: 2024-12-13T23:34:47
|_  start_date: N/A

SMB

└─$ netexec smb 10.129.124.77 -u 'guest' -p '' --shares
SMB         10.129.124.77   445    DC               [*] Windows Server 2022 Build 20348 x64 (name:DC) (domain:support.htb) (signing:True) (SMBv1:False)
SMB         10.129.124.77   445    DC               [+] support.htb\guest:
SMB         10.129.124.77   445    DC               [*] Enumerated shares
SMB         10.129.124.77   445    DC               Share           Permissions     Remark
SMB         10.129.124.77   445    DC               -----           -----------     ------
SMB         10.129.124.77   445    DC               ADMIN$                          Remote Admin
SMB         10.129.124.77   445    DC               C$                              Default share
SMB         10.129.124.77   445    DC               IPC$            READ            Remote IPC
SMB         10.129.124.77   445    DC               NETLOGON                        Logon server share
SMB         10.129.124.77   445    DC               support-tools   READ            support staff tools
SMB         10.129.124.77   445    DC               SYSVOL                          Logon server share

For some reason spider_plus module didn't want to download the files...

Decompile: https://www.decompiler.com/jar/6f637a8b6b6d41509e4eb8f2e013227a/UserInfo.exearrow-up-right

Password is hardcoded into *.exe

Decrypt using online runner:

Credentials are valid.

User support seems to be the entrypoint into the DC, but nothing valuable from ldapdomaindump

Writeup.png

WinRM

info field looks like password

User.txt

Privilege Escalation

Enumerate with bloodhound

Writeup-1.png

Shadow Credentials attack was the first thing I tried, but it failed.

Let's abuse delegations then. A Practical Guide To RBCD Exploitationarrow-up-right

Login 1

Login 2

Root.txt

Last updated