CTF write ups and other sundries.
Here I go again on my own! Gonna nmap
this from my office in my home!
Okay, looking at the resutls, let’s enumerate SMB.
The Replication
share has anonymous access. Let’s access it with smbclient
.
Let’s turn off prompting and enable recursive listing.
With that done, let’s list files in the directory.
Now we’ll download all the files with mget *
.
If we search the files downloaded, we can find Groups.xml
, which may contain GPP (Group Policy Preferences).
Looking at the file contents, it contains the domain Ticket Granting Service account (active.htb\SVC_TGS
) and the cPassword
.
We can now use gpp-decrypt
to decrypt the cPassword
.
Now to verify the credentials are working when passed with crackmapexec
.
That looks good, now let’s get SPNs with GetUserSPNs.py
We’ll now copy the entire hash into hashcat
and crack the hash.
Let’s now use psexec.py
to spawn a shell using our newly acquired credentials.
With our shell, let’s collect the flags.
And we’re done!
Findings
Operating System: Windows Server 2008 R2 Standard
IP Address: 10.10.10.100
Open Ports:
Services Responding:
Vulnerabilities Exploited:
Configuration Insecurities:
General Findings: