Skip to content

Laser

Network

Given:

  • 192.168.195.0/24

Found:

  • 192.168.195.173 MS01
  • 192.168.195.174 MS02
  • 192.168.195.172 DC01

Creds

eric.wallows:EricLikesRunning800
yulia.weber:Yulia@Laser777
boris.crawford:zxcvbnm

Enumeration

Ping sweep the subnet to find four machines.

192.168.195.173 MS01

Enumeration

Using the provided credentials, we can access a shared folder called Apps in SMB.

We can see shortcuts and a task scheduler one. It seems that a user clicks those shortcuts to open the apps. So, we can capture the hash by replacing the shortcut with a UNC path.

First, create the shortcut with ntlm_theft.py

python ntlm_theft/ntlm_theft.py -g lnk -s 192.168.45.191 -f Services

Put the file into the share.

Create an SMB server and wait.

We can use it to relay to another host. Using ntlmrelay, we point to another host without SMB signing. We can check the signing with nxc.

So, we have to point to .174.

The execution of the shell doesn't work, so let's dump hashes.

We have a hit from carl.dean.

And got the hash of Administrator:15759746f66f2da88d58f0160f8ee676.

192.168.195.174 MS02

Enumeration

Initial Access

Using the hash from MS01, we can enter as administrator.

Post Exploitation

Get the flag.

In the documents folder, there is a pcapng file that we can open with Wireshark. Use "Find Packages" and select "String," and by searching for "login," we find credentials.

We have yulia.weber:Yulia@Laser777.

With nxc, we can see that Yulia can RDP to DC.

192.168.195.172 DC01

Enumeration

Initial Access

Using Yulia's credentials, we RDP into the machine.

Privilege Escalation

Read the flag on the desktop.

Using bloodhound-python, we can see that Yulia has GenericWrite to Boris, so we can make a targeted Kerberoast.

Using hashcat, we have boris.crawford:zxcvbnm.

Post Exploitation

Now we can perform a DCsync attack to get the domain admin's password.

Enter with evil-winrm and get the flag.