Proving Ground - Windows
Vault
Initial ⇒ SMB enum , SMB Malicious file upload , Phishing Privesc ⇒ GPO abuse using sharpGPOabuse.exe
We have write access on SMB , we can create a malacious file and upload it on SMB , on responder we get hash of user
anirudh, crack it givessecureHMAfter getting shell , Bloodhound enumeration gives we have edit permission on GPO/OU
Default Domain Policy, we can use sharpGPOabuse.exe to abuse itAbusing it adds our user to local group administrator .
Nara
Initial ⇒ SMB file upload , Stealing NTLM hash , Write DACL on Group Privesc Level 1 ⇒ Decoding DPAPI file Privesc Level 2 ⇒ ADCS enumeration , exploiting ESC1
SMB server is writeable
we can use
ntlm_theft.pyto generate malacious filesUpload it on SMB server and directories inside it
On Responder we got hash for
Tracy.White, crack it givezqwj041FGX
Creds not work for evil-winrm , but do work for RPC adn we can enumerate users
Bloodhound (py) enum gives we have Generic-All rights on group
REMOTE ACCESS, usingnet rpc group addmemto add ourself , then get sessionIn
/Documentsthere is automation.txt file , which DPAPI encrypted file , decoding it gives password which on password spray attack gives userjodie.summerJodie.summer is member of
Certificate Servicegroup , Enumeration ADCSADCS gives domain is vulnerable to ESC1 , exploiting it gives hash for Administrator.
Hutch
Initial ⇒ Ldap Enumeration (user) , Password in Description , CLI - cadaver Privesc ⇒ SeImpersonatePrivilege , PrintSpoofer64.exe
Ldap enumeration gives usernames , in which we find password in description of user
freedyUsing these creds we can access WebDEV , running on 80 :- ```cadaver http://$ip```
we can upload webshell & reverse shell , and via web we can trigger our rev-shell
whoami /priv gives
SeImpersonatePrivileg, can be abuse byPrintspoofer.exe
Last updated