Intercept
You will learn about a technique that allows to takeover domain joined workstations on default configurations & exploiting ADCS
Last updated
Was this helpful?
You will learn about a technique that allows to takeover domain joined workstations on default configurations & exploiting ADCS
Last updated
Was this helpful?
Enumerating shares we find a dev
writable share
Inside we find a readme.txt
and autologon64.exe
, this probably means that an autologon password is stored somewhere
The readme says to check the share regularly
We have write perms on the share so we can try to steal a NTLMv2 hash
This time instead of using ntlm_theft
i wanted to try a NetExec module
And we get a hit
To clean the .lnk
file add CLEANUP=True
to the previous NetExec command
We cracked the password
This user does not have any interesting privileges
But from the Nmap scan we can see that the DC is a CA
This means that ADCS is probably installed
We can try to run certipy
but it does not find anything vulnerable
After looking at the hints ;) i checked if ldap channel binding was enabled
If WS01 is running the WebClient
service we can make the workstation connect back to us and abuse Resource Based Constrained Delegation
We checked the MachineAccountQuota and it's 10, the default
This means that we can add computer accounts to the domain
First we need to add a DNS entry that points to the attacker machine
If you get a DNS error add the DC IP to /etc/resolv.conf
Now we add a computer account
Now we can start ntlmrelayx
Now we force authentication from WS01$
And it worked
I should have specified the machine account to use for ntlmrelayx
but it's whatever
Now we can request a ticket to impersonate Administrator on WS01
Now if we use secretsdump
we can also see the autologon credential from before
Now that we have new creds i wanted to look at certipy again in bloodhound
Here we can see that Simon has GenericAll
on CA-Managers
It's a bit of a messy attack path but if you click on ESC7
we can see that the certificate is vulnerable since now we are a CA-Manager
To abuse this first we need to add Simon.Bowen
to the CA-Managers
group
Now we can use certipy
After issuing the certificate we can request it and authenticate to get the Administrator's NT hash