MidwintersTomb

CTF write ups and other sundries.


Project maintained by MidwintersTomb Hosted on GitHub Pages — Theme by mattgraham

Active

Here I go again on my own! Gonna nmap this from my office in my home!

Okay, looking at the resutls, let’s enumerate SMB.

The Replication share has anonymous access. Let’s access it with smbclient.

Let’s turn off prompting and enable recursive listing.

With that done, let’s list files in the directory.

Now we’ll download all the files with mget *.

If we search the files downloaded, we can find Groups.xml, which may contain GPP (Group Policy Preferences).

Looking at the file contents, it contains the domain Ticket Granting Service account (active.htb\SVC_TGS) and the cPassword.

We can now use gpp-decrypt to decrypt the cPassword.

Now to verify the credentials are working when passed with crackmapexec.

That looks good, now let’s get SPNs with GetUserSPNs.py

We’ll now copy the entire hash into hashcat and crack the hash.

Let’s now use psexec.py to spawn a shell using our newly acquired credentials.

With our shell, let’s collect the flags.

And we’re done!


Findings


Operating System: Windows Server 2008 R2 Standard

IP Address: 10.10.10.100

Open Ports:

Services Responding:

Vulnerabilities Exploited:

Configuration Insecurities:

General Findings:


Back