🚔Intercept
You will learn about a technique that allows to takeover domain joined workstations on default configurations & exploiting ADCS
Enumeration
Enumerating shares we find a dev
writable share

Inside we find a readme.txt
and autologon64.exe
, this probably means that an autologon password is stored somewhere

The readme says to check the share regularly

We have write perms on the share so we can try to steal a NTLMv2 hash
This time instead of using ntlm_theft
i wanted to try a NetExec module

And we get a hit

To clean the .lnk
file add CLEANUP=True
to the previous NetExec command

We cracked the password

This user does not have any interesting privileges
But from the Nmap scan we can see that the DC is a CA

This means that ADCS is probably installed
We can try to run certipy
but it does not find anything vulnerable

After looking at the hints ;) i checked if ldap channel binding was enabled

If WS01 is running the WebClient
service we can make the workstation connect back to us and abuse Resource Based Constrained Delegation
RBCD
We checked the MachineAccountQuota and it's 10, the default
This means that we can add computer accounts to the domain
First we need to add a DNS entry that points to the attacker machine

If you get a DNS error add the DC IP to /etc/resolv.conf
Now we add a computer account

Now we can start ntlmrelayx

Now we force authentication from WS01$

And it worked

I should have specified the machine account to use for ntlmrelayx
but it's whatever
Now we can request a ticket to impersonate Administrator on WS01

Now if we use secretsdump
we can also see the autologon credential from before

ADCS
Now that we have new creds i wanted to look at certipy again in bloodhound

Here we can see that Simon has GenericAll
on CA-Managers
It's a bit of a messy attack path but if you click on ESC7
we can see that the certificate is vulnerable since now we are a CA-Manager


To abuse this first we need to add Simon.Bowen
to the CA-Managers
group

Now we can use certipy

After issuing the certificate we can request it and authenticate to get the Administrator's NT hash

Last updated
Was this helpful?