Authority

Recon

nmap_scan.log

SMB

We have access to SMB with non authorized user. There's Development share we have read access to so let's dump that.

Writeup-1.png

Creds: T0mc@tAdm1n:T0mc@tR00t

Defaults contain some kind of ansible credentials.

Writeup-3.png

Creds: !@#$%^&*:!@#$%^&*

https://www.bengrewell.com/cracking-ansible-vault-secrets-with-hashcat/arrow-up-right

Creds: svc_pwm:pWm_@dm!N_!23

Password: DevT3st@123

HTTPs (8443)

Writeup.png

PWMarrow-up-right is an open source password self-service application for LDAP directories.

From dropdown arrow we see version is PWM v2.0.3 bc96802e, it's few versions behind at the moment https://github.com/pwm-project/pwm/releasesarrow-up-right

Credentials from SMB doesn't work.

Writeup-2.png

Second ansible credentials is also incorrect.

Password pWm_@dm!N_!23 logs us in.

Writeup-4.png

We can download the configuration file which contains some kind of password.

Writeup-5.png

There's additional username, but can't login with found credentials.

Hash is not going to crack any time soon so Im giving up on that.

There are too many settings and it's overwhelming to explore, more down you go the less you understand and most of it is left to defaults AFAIK. Connection contains LDAP Proxy Password, but it's protected. We are able to add LDAP URLs, so we could try adding ourselves and see what we get.

Writeup-6.png

Add ldap://10.10.14.113:636 to urls and then test, wait for callback:

New credentials.. but looks like password starts after DC TLD.

Creds: svc_ldap:lDaP_1n_th3_cle4r!

WinRM

User.txt

Privilege Escalation

We could try the default enumeration with winpeas + bloodhound, but considering the name we are 110% dealing with misconfigured certificates.

https://github.com/ly4k/Certipy?tab=readme-ov-file#esc1arrow-up-righthttps://www.thehacker.recipes/ad/movement/adcs/certificate-templates#esc1-template-allows-sanarrow-up-righthttps://ppn.snovvcrash.rocks/pentest/infrastructure/ad/ad-cs-abuse/esc1arrow-up-right

'AUTHORITY.HTB\Domain Computers' can enroll, enrollee supplies subject and template allows client authentication

To abuse this we need a computer on a network and we should be able to create one.

https://www.thehacker.recipes/ad/movement/builtins/machineaccountquota#create-a-computer-accountarrow-up-right

Verify that it was created:

Perform the ESC1 attack

https://www.thehacker.recipes/ad/movement/schannel/passthecertarrow-up-right

Path 1

One option is to add yourself to domain and add yourself to and groups. or add existing pwned users to any groups.

Note: We could have added ourself to Administrators and then used psexec from impacket

Path 2

We can also abuse the delegations

Now we can request the Silver Ticket

Root.txt

Last updated