Vault
Information Gathering
NMAP - Ports and Services
PORT STATE SERVICE VERSION
53/tcp open domain Simple DNS Plus
88/tcp open kerberos-sec Microsoft Windows Kerberos (server time: 2025-02-11 14:24:22Z)
135/tcp open msrpc Microsoft Windows RPC
139/tcp open netbios-ssn Microsoft Windows netbios-ssn
389/tcp open ldap Microsoft Windows Active Directory LDAP (Domain: vault.offsec0., Site: Default-First-Site-Name)
445/tcp open microsoft-ds?
464/tcp open kpasswd5?
593/tcp open ncacn_http Microsoft Windows RPC over HTTP 1.0
636/tcp open tcpwrapped
3268/tcp open ldap Microsoft Windows Active Directory LDAP (Domain: vault.offsec0., Site: Default-First-Site-Name)
3269/tcp open tcpwrapped
3389/tcp open ms-wbt-server Microsoft Terminal Services
|_ssl-date: 2025-02-11T14:26:09+00:00; -2h46m21s from scanner time.
| ssl-cert: Subject: commonName=DC.vault.offsec
| Not valid before: 2025-02-10T14:19:17
|_Not valid after: 2025-08-12T14:19:17
| rdp-ntlm-info:
| Target_Name: VAULT
| NetBIOS_Domain_Name: VAULT
| NetBIOS_Computer_Name: DC
| DNS_Domain_Name: vault.offsec
| DNS_Computer_Name: DC.vault.offsec
| DNS_Tree_Name: vault.offsec
| Product_Version: 10.0.17763
|_ System_Time: 2025-02-11T14:25:23+00:00
5985/tcp open http Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP)
|_http-title: Not Found
|_http-server-header: Microsoft-HTTPAPI/2.0
9389/tcp open mc-nmf .NET Message Framing
49666/tcp open msrpc Microsoft Windows RPC
49668/tcp open msrpc Microsoft Windows RPC
49673/tcp open ncacn_http Microsoft Windows RPC over HTTP 1.0
49674/tcp open msrpc Microsoft Windows RPC
49679/tcp open msrpc Microsoft Windows RPC
49703/tcp open msrpc Microsoft Windows RPC
Service Info: Host: DC; OS: Windows; CPE: cpe:/o:microsoft:windows
Host script results:
| smb2-security-mode:
| 3:1:1:
|_ Message signing enabled and required
|_clock-skew: mean: -2h46m24s, deviation: 2s, median: -2h46m25s
| smb2-time:
| date: 2025-02-11T14:25:24
|_ start_date: N/A
Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 120.79 seconds
Initial Access
LDAP
cant access with anonymous
SMB

DocumentsShare terlihat menarik, mari enum
tidak ada hal menarik disini, tapi kita coba cek privielegenya
we can write in DocumentsShare, so kita coba impacket-psexec
pake psexec ga ketrigger, mari coba cara lain dengan membuat shortcut url
save ke exploit.url, jalanin responder, dan upload ke server

dapat ntlmv2 anirudh, sekarang kita crack pake hashcat
creds : anirudh:SecureHM
Privilege Escalation
SeRestorePrivilege
GPO ABuse
get GPO
get gpo id
check GPO Permission for current user
anirudh can edit, delete, modify
next, use SharpGPOAbuse.exe
last, update group policy
Machine Recap
port and service scan
smb null session
upload malicious file to capture NTLM Hash
got anirudh Hash and crack with Hashcat
abusing
SeRestorePrivilege
Last updated