๐Ÿง Intelligence

Intelligence is a medium difficulty Windows machine that showcases a number of common attacks in an Active Directory environment.

Enumeration

We are working with a Windows AD machine We have a IIS website that let's us download two pdf files with two interesting authors

These authors are valid AD users

Now since we don't have any credentials and AS-REP roasting is not useful we cannot do much The naming pattern of the pdfs is interesting

We can try to bruteforce this pattern to uncover other documents in the website

We can use a script for this task

We got a lot of pdf files

Now we can try to extract users from the authors, just like before

The users are all valid

Inside 2020-06-04-upload.pdf we find a 'New account guide' that gives us a default password to spray

We find that Tiffany.Molina gets a hit for this password

NTLMv2 hash stealing

This user can read the IT share and the Users folder

Inside the IT share we find a PowerShell script

This script makes a request to all the DNS entries that start with web in the name to check if the webserver is down, but it's using the credentials for Ted.Graves

We can add a dns entry and run Responder to retrieve a NTLMv2 hash

If this operation does not work put the machine's IP as your default DNS server

After a few minutes we get a hash

And we cracked it

GMSA credentials dumping

Now we can use Bloodhound to identify possible attack paths

We can see that this account can read a password from a GMSA account

We can do this remotely using gMSADumper

This account can also delegate to the DC, so we can abuse the delegation later

Now we can get a ticket impersonating the Administrator user abusing the delegation

And get a shell with psexec

Last updated