Vault

rid ntlm SeRestorePrivilege

  • Nom machine : Vault

  • Difficulté : Difficile

  • OS : Windows

Enumération

NMAP

PORT      STATE SERVICE       REASON  VERSION
53/tcp    open  domain        syn-ack Simple DNS Plus
88/tcp    open  kerberos-sec  syn-ack Microsoft Windows Kerberos (server time: 2024-10-02 11:05:07Z)
135/tcp   open  msrpc         syn-ack Microsoft Windows RPC
139/tcp   open  netbios-ssn   syn-ack Microsoft Windows netbios-ssn
389/tcp   open  ldap          syn-ack Microsoft Windows Active Directory LDAP (Domain: vault.offsec0., Site: Default-First-Site-Name)
445/tcp   open  microsoft-ds? syn-ack
464/tcp   open  kpasswd5?     syn-ack
593/tcp   open  ncacn_http    syn-ack Microsoft Windows RPC over HTTP 1.0
636/tcp   open  tcpwrapped    syn-ack
3268/tcp  open  ldap          syn-ack Microsoft Windows Active Directory LDAP (Domain: vault.offsec0., Site: Default-First-Site-Name)
3269/tcp  open  tcpwrapped    syn-ack
3389/tcp  open  ms-wbt-server syn-ack Microsoft Terminal Services
|_ssl-date: 2024-10-02T11:06:35+00:00; +1s from scanner time.
| rdp-ntlm-info: 
|   Target_Name: VAULT
|   NetBIOS_Domain_Name: VAULT
|   NetBIOS_Computer_Name: DC
|   DNS_Domain_Name: vault.offsec
|   DNS_Computer_Name: DC.vault.offsec
|   DNS_Tree_Name: vault.offsec
|   Product_Version: 10.0.17763
|_  System_Time: 2024-10-02T11:05:55+00:00
| ssl-cert: Subject: commonName=DC.vault.offsec
| Issuer: commonName=DC.vault.offsec
| Public Key type: rsa
| Public Key bits: 2048
| Signature Algorithm: sha256WithRSAEncryption
| Not valid before: 2024-08-01T02:09:28
| Not valid after:  2025-01-31T02:09:28
| MD5:   6cb2:aab3:f717:80bf:6165:7dcc:4fca:92a3
| SHA-1: f155:3524:94c5:522d:0300:245a:53fa:7b13:e8ae:e219
| -----BEGIN CERTIFICATE-----
| MIIC4jCCAcqgAwIBAgIQIXm05T2DbrJJj6OtuSIdhTANBgkqhkiG9w0BAQsFADAa
| MRgwFgYDVQQDEw9EQy52YXVsdC5vZmZzZWMwHhcNMjQwODAxMDIwOTI4WhcNMjUw
| MTMxMDIwOTI4WjAaMRgwFgYDVQQDEw9EQy52YXVsdC5vZmZzZWMwggEiMA0GCSqG
| SIb3DQEBAQUAA4IBDwAwggEKAoIBAQDNl3Dno4YF5jgm9jJscrc+ACEhH/8eGx90
| WHSqUzg1nX+JLQ4LdY+3fSc/wgJOND7HawjdJZqpK0xlPxR90WK5OKGUV+Ccf/xo
| PWdqXRObI312SaLp48JOPIwYBVrroBGgFHjji0WBxWk4kR+gHVUvpbiEp2c2FC0x
| erWw7dwUb8OeU+HuYiSyFmAw+eNyNa/ffI4AezvokUu5kqnYyt3HgAgWTsgbl4nr
| txjfmSLdLmkIymjnKPwlOSWIK9ImXfbSj158IMbZ0IPakdkYP75qrjkLR1LZS4a1
| b1i8poGjACEIjM9rnH9nFrQb7HG+6yQIZjmnE3LH/6cKhlRwNb8RAgMBAAGjJDAi
| MBMGA1UdJQQMMAoGCCsGAQUFBwMBMAsGA1UdDwQEAwIEMDANBgkqhkiG9w0BAQsF
| AAOCAQEAVuIIDodAh0PRCBae72EgBjLwGVPovt5VwXserXpu2+h/+vSX4fz8VwsL
| DCyxXQQ8TCcZV1RIO+kPqYxjsr9/UpBl70w1/81eXQipMX455MankmFoWl6C12lE
| aOCrGKSRNcWXoTmL/Ci8vS/0YQzfbyRnhVlLCH4KTp2q5szpt0oV5PMTwLEfMsNF
| 3FCEF2QxhneFtYLUXC6z0evt/iibPMeJG92j1X2I9Ffzbyzt2HdqNRQaoELr/ieS
| 2JoSJ+latRL7ntuoDHaoMRXEN0fr6QEiK6IJs83KMo0Py2mXSNBotfINoF28w0KE
| 9hIcCfKcmNHixb3wlOA7VY4l9iy25w==
|_-----END CERTIFICATE-----
5985/tcp  open  http          syn-ack Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP)
|_http-server-header: Microsoft-HTTPAPI/2.0
|_http-title: Not Found
9389/tcp  open  mc-nmf        syn-ack .NET Message Framing
49666/tcp open  msrpc         syn-ack Microsoft Windows RPC
49668/tcp open  msrpc         syn-ack Microsoft Windows RPC
49675/tcp open  ncacn_http    syn-ack Microsoft Windows RPC over HTTP 1.0
49676/tcp open  msrpc         syn-ack Microsoft Windows RPC
49681/tcp open  msrpc         syn-ack Microsoft Windows RPC
49708/tcp open  msrpc         syn-ack Microsoft Windows RPC
Service Info: Host: DC; OS: Windows; CPE: cpe:/o:microsoft:windows

Host script results:
|_clock-skew: mean: 1s, deviation: 0s, median: 0s
| p2p-conficker: 
|   Checking for Conficker.C or higher...
|   Check 1 (port 43470/tcp): CLEAN (Timeout)
|   Check 2 (port 16135/tcp): CLEAN (Timeout)
|   Check 3 (port 47107/udp): CLEAN (Timeout)
|   Check 4 (port 8957/udp): CLEAN (Timeout)
|_  0/4 checks are positive: Host is CLEAN or ports are blocked
| smb2-security-mode: 
|   3:1:1: 
|_    Message signing enabled and required
| smb2-time: 
|   date: 2024-10-02T11:05:59
|_  start_date: N/A

/etc/hosts : vault.offsec

SMB

Nous avons accès à un partage SMB mais le dossier est vide. Nous allons bruteforce les rid.

anirudh est un username. Nous avons tenter de bruteforce son mot de passe à l'aide de kerbrute mais sans succès. Nous allons chercher à voler le hash NTLM.

Accès initial

On lance responder pour capturer le hash

Nous allons cracker le hash NTLM avec hashcat

Nous aurions plus le cracker comme dit précédemment avec kerbrute mais cela aurait pris beaucoup trop de temps.

Elévation des privilèges

SeBackupPrivilege

Nous n'arrivons pas à nous connecter avec le hash, le compte doit être désactivé. Nous allons abuser du SeRestorePrivilege

Pour appeler utilman.exe : windows + U via rdp (rdesktop)

Mis à jour