Vault

Information Gathering

NMAP - Ports and Services

PORT      STATE SERVICE       VERSION
53/tcp    open  domain        Simple DNS Plus
88/tcp    open  kerberos-sec  Microsoft Windows Kerberos (server time: 2025-02-11 14:24:22Z)
135/tcp   open  msrpc         Microsoft Windows RPC
139/tcp   open  netbios-ssn   Microsoft Windows netbios-ssn
389/tcp   open  ldap          Microsoft Windows Active Directory LDAP (Domain: vault.offsec0., Site: Default-First-Site-Name)
445/tcp   open  microsoft-ds?
464/tcp   open  kpasswd5?
593/tcp   open  ncacn_http    Microsoft Windows RPC over HTTP 1.0
636/tcp   open  tcpwrapped
3268/tcp  open  ldap          Microsoft Windows Active Directory LDAP (Domain: vault.offsec0., Site: Default-First-Site-Name)
3269/tcp  open  tcpwrapped
3389/tcp  open  ms-wbt-server Microsoft Terminal Services
|_ssl-date: 2025-02-11T14:26:09+00:00; -2h46m21s from scanner time.
| ssl-cert: Subject: commonName=DC.vault.offsec
| Not valid before: 2025-02-10T14:19:17
|_Not valid after:  2025-08-12T14:19:17
| rdp-ntlm-info: 
|   Target_Name: VAULT
|   NetBIOS_Domain_Name: VAULT
|   NetBIOS_Computer_Name: DC
|   DNS_Domain_Name: vault.offsec
|   DNS_Computer_Name: DC.vault.offsec
|   DNS_Tree_Name: vault.offsec
|   Product_Version: 10.0.17763
|_  System_Time: 2025-02-11T14:25:23+00:00
5985/tcp  open  http          Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP)
|_http-title: Not Found
|_http-server-header: Microsoft-HTTPAPI/2.0
9389/tcp  open  mc-nmf        .NET Message Framing
49666/tcp open  msrpc         Microsoft Windows RPC
49668/tcp open  msrpc         Microsoft Windows RPC
49673/tcp open  ncacn_http    Microsoft Windows RPC over HTTP 1.0
49674/tcp open  msrpc         Microsoft Windows RPC
49679/tcp open  msrpc         Microsoft Windows RPC
49703/tcp open  msrpc         Microsoft Windows RPC
Service Info: Host: DC; OS: Windows; CPE: cpe:/o:microsoft:windows

Host script results:
| smb2-security-mode: 
|   3:1:1: 
|_    Message signing enabled and required
|_clock-skew: mean: -2h46m24s, deviation: 2s, median: -2h46m25s
| smb2-time: 
|   date: 2025-02-11T14:25:24
|_  start_date: N/A

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 120.79 seconds

Initial Access

LDAP

cant access with anonymous

SMB

DocumentsShare terlihat menarik, mari enum

tidak ada hal menarik disini, tapi kita coba cek privielegenya

we can write in DocumentsShare, so kita coba impacket-psexec

pake psexec ga ketrigger, mari coba cara lain dengan membuat shortcut url

save ke exploit.url, jalanin responder, dan upload ke server

dapat ntlmv2 anirudh, sekarang kita crack pake hashcat

creds : anirudh:SecureHM

Privilege Escalation

SeRestorePrivilege

GPO ABuse

get GPO

get gpo id

check GPO Permission for current user

anirudh can edit, delete, modify

next, use SharpGPOAbuse.exe

last, update group policy

Machine Recap

  1. port and service scan

  2. smb null session

    1. upload malicious file to capture NTLM Hash

  3. got anirudh Hash and crack with Hashcat

  4. abusing SeRestorePrivilege

Last updated