Nagoya [soon]

Information Gathering

NMAP - Ports and Services

PORT      STATE SERVICE           VERSION
53/tcp    open  domain            Simple DNS Plus
80/tcp    open  http              Microsoft IIS httpd 10.0
|_http-title: Nagoya Industries - Nagoya
|_http-server-header: Microsoft-IIS/10.0
88/tcp    open  kerberos-sec      Microsoft Windows Kerberos (server time: 2025-02-11 16:14:25Z)
135/tcp   open  msrpc             Microsoft Windows RPC
139/tcp   open  netbios-ssn       Microsoft Windows netbios-ssn
389/tcp   open  ldap              Microsoft Windows Active Directory LDAP (Domain: nagoya-industries.com0., Site: Default-First-Site-Name)
445/tcp   open  microsoft-ds?
464/tcp   open  kpasswd5?
593/tcp   open  ncacn_http        Microsoft Windows RPC over HTTP 1.0
636/tcp   open  ldapssl?
3268/tcp  open  ldap              Microsoft Windows Active Directory LDAP (Domain: nagoya-industries.com0., Site: Default-First-Site-Name)
3269/tcp  open  globalcatLDAPssl?
3389/tcp  open  ms-wbt-server     Microsoft Terminal Services
|_ssl-date: 2025-02-11T16:16:13+00:00; -2h35m20s from scanner time.
| ssl-cert: Subject: commonName=nagoya.nagoya-industries.com
| Not valid before: 2025-02-10T16:09:22
|_Not valid after:  2025-08-12T16:09:22
| rdp-ntlm-info: 
|   Target_Name: NAGOYA-IND
|   NetBIOS_Domain_Name: NAGOYA-IND
|   NetBIOS_Computer_Name: NAGOYA
|   DNS_Domain_Name: nagoya-industries.com
|   DNS_Computer_Name: nagoya.nagoya-industries.com
|   DNS_Tree_Name: nagoya-industries.com
|   Product_Version: 10.0.17763
|_  System_Time: 2025-02-11T16:15:29+00:00
5985/tcp  open  http              Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP)
|_http-title: Not Found
|_http-server-header: Microsoft-HTTPAPI/2.0
9389/tcp  open  mc-nmf            .NET Message Framing
49666/tcp open  msrpc             Microsoft Windows RPC
49668/tcp open  msrpc             Microsoft Windows RPC
49676/tcp open  ncacn_http        Microsoft Windows RPC over HTTP 1.0
49678/tcp open  msrpc             Microsoft Windows RPC
49679/tcp open  msrpc             Microsoft Windows RPC
49693/tcp open  msrpc             Microsoft Windows RPC
49708/tcp open  msrpc             Microsoft Windows RPC
49802/tcp open  msrpc             Microsoft Windows RPC
Service Info: Host: NAGOYA; OS: Windows; CPE: cpe:/o:microsoft:windows

Host script results:
| smb2-time: 
|   date: 2025-02-11T16:15:29
|_  start_date: N/A
|_clock-skew: mean: -2h35m23s, deviation: 2s, median: -2h35m25s
| smb2-security-mode: 
|   3:1:1: 
|_    Message signing enabled and required

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 125.21 seconds

Initial Access

80 - WEB

Manual Inspection

terdapat list team, isinya first name dan last name. mari kita save sebagai wordlist user enum, as-reproast dengan format

wordlist

Kerbrute

AS-REPROAST

Brute Force

karena udah mentok akhirnya pake brute force

ada beberapa skenario:

  • di footer ada tahun 2023

  • nama perusahaannya Nagoya

  • mesinnya realise tanggal 16 juni 2023

  • musim realisenya adalah summer

untuk membuat wordlistnya bisa menggunakan wordlist generator

Priv Esc

Bloodhound

fiona.clark merupakan member dari employees group

Employees group memiliki degre object control terhadap 4 user dengan genericAll privilege

  • BETHAN.WEBSTER

  • IAIN.WHITE

  • JOANNA.WOOD

  • SVC_HELPDESK

selain itu terdapat 2 user dengan service principal

  • SVC_MSSQL

  • SVC_HELPDESK

selanjutnya saya akan melakukan kerberoasting

Sebetulnya bisa saja takeover setiap akun, karena dengan privilege GenericAll bisa melakukan forceChange password user, tetapi sangat disayangkan jika melakukan forceChangepassword yang dimana kita tidak bisa memperluas foodhold dengan spray password

selanjutnya crack dengan hashcat

creds : svc_mssql:Service1

karena ga bisa ngapa-ngapain jidi terpaksa change password user, disini user yang akan di change password adalah joanna.wood katena joana member dari Helpdesk group yg punya genericAll priv ke christopher.lewis yang dimana dia punya privilege CanPSRemote ke Nagoya.nagoya-industries.com (intinya biar bisa rce)

selanjutnya evil-winrm

Last updated