Add HackTheBox_-_Vintage.jsonl
Browse files- HackTheBox_-_Vintage.jsonl +108 -0
HackTheBox_-_Vintage.jsonl
ADDED
|
@@ -0,0 +1,108 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
{"text": "What's going on YouTube? This is IPS be doing vintage from hack the box which is a heart assumed breach active directory machine. Meaning we'll start with a set of credentials which may surprise you because normally when you get credentials to active directory it's game over. However, this box has some pretty tough to find paths that aren't easily viewable in blood hound and NLM authentication is disabled. So you have to be familiar with kobaros. To start things off, we use the credential given to us to dump a list of users and machines and discover a machine is a member of a pre200 Windows compatibility group, which means its password is going to be set to the machine name. This machine can read group manage service account passwords, which leads us to another account that has generic all to service accounts. And if we run targeted", "start": 0.08, "duration": 0.0, "meta": {"video_id": "-JM--KfVhpA", "title": "HackTheBox - Vintage", "url": "https://www.youtube.com/watch?v=-JM--KfVhpA"}}
|
| 2 |
+
{"text": "Kerros to get hashes, we'll miss one account because it's disabled. So, we have to reenable it. Then we can run our kerro attack, get a password that we spray against a domain, discover there's a domain user that also has that password. We log in as them, decrypt their DPappy credential store, and eventually get their ADM password that can be used to add users to a group that can perform a resource-based constraint delegation attacks or RBCD that lets us impersonate an administrator or the DC itself. So with that being said, let's jump in. As always, we're going to start off with an end map. So - sc for default scripts. SV enumerate versions vv for double verbose. This gives us things like the ttl oa output all formats put in the end mapap directory and call it vintage. And then the IP address which is 1010 111.45. This can take some time to run.", "start": 41.2, "duration": 0.0, "meta": {"video_id": "-JM--KfVhpA", "title": "HackTheBox - Vintage", "url": "https://www.youtube.com/watch?v=-JM--KfVhpA"}}
|
| 3 |
+
{"text": "So I've already ran it. Looking at the results, we see 11 ports are open. The first one being DNS on port 53 and the banner is simple DNS plus. And whenever I see this banner, I always look down to confirm. Yes, this is a Windows Active Directory server. And the first thing I do when I see AD is take note of the domain name which is vintage.htb. So let's add this to our host model. So pseudo v etsy host and we can add 1010 1145 vintage.htb. And then if we look um near the bottom we see the host name is dco1.", "start": 85.84, "duration": 0.0, "meta": {"video_id": "-JM--KfVhpA", "title": "HackTheBox - Vintage", "url": "https://www.youtube.com/watch?v=-JM--KfVhpA"}}
|
| 4 |
+
{"text": "So I'm also going to add that. So we'll do dco1 and also dco1 vintage htb. And we can save the host file. And then what else do we have? Um, when I look for Active Directory, I see if there's any other services running because there's a lot of ports. Um, but a lot of these are just default to AD. I'm looking for things like a web server mainly because web servers aren't native to AD unless maybe like Active Directory Certificate Services is installed. But let's just take a look, right? We have DNS 88's Keraros. These are RPC ports 135139. LDAP on 389. Then we have SMB on 445. I think this is a Kerros port. I'm not positive. Uh 593 is some generic RPC port. Uh 636, this is going to be LDAP secure. And we see it's TCP wrapped. So it's enforcing SSL to connect to this port. And since we don't have the client", "start": 118.079, "duration": 0.0, "meta": {"video_id": "-JM--KfVhpA", "title": "HackTheBox - Vintage", "url": "https://www.youtube.com/watch?v=-JM--KfVhpA"}}
|
| 5 |
+
{"text": "certificate, we can't even get a response from the server. So this is going to be LDAP secure. 3268 is another LDAP port. I don't know the difference between 3268 and 389 but um yeah there's also 3269 which I want to say again this is the SSL version of 3268 but we can't connect to it because we don't have a client certificate. So looking other things we see a clock you have 2 minutes which should be fine and that is it. So we don't really have much to go off of.", "start": 169.2, "duration": 0.0, "meta": {"video_id": "-JM--KfVhpA", "title": "HackTheBox - Vintage", "url": "https://www.youtube.com/watch?v=-JM--KfVhpA"}}
|
| 6 |
+
{"text": "This is an assumed breach box, so we do have credentials. So, we could go right away with them. But first, I just want to run net exec real quick. So, we'll do nxc 101011.45. And let's see what we get. Interesting enough, it doesn't pick up the name or the domain. Normally, net exec will just instantly tell you the host name and domain, but this leaves the IP address. And the reason for that is NLM authentication is disabled. So, we can even specify the username of p.ro. Rosa and then the password of Rosa is best one two three and it will probably say status not supported. So that's because NLM authentication disabled. If we add the -ash k then this should now let us authenticate. We get a wrong realm and that's because we don't have the domain. We could either specify the domain as vintage.htb like this and this should", "start": 202.319, "duration": 0.0, "meta": {"video_id": "-JM--KfVhpA", "title": "HackTheBox - Vintage", "url": "https://www.youtube.com/watch?v=-JM--KfVhpA"}}
|
| 7 |
+
{"text": "let us log in. Maybe not. Uh principal unknown. Did I typo something? Rosa is best one, two, three. Rosa is I think that's all correct. Um, maybe it really wants host names here. So, let's change this to dco1.vintage.htb. And if this still doesn't work, then I'll also add the domain flag back. But there we go. It works. So, when dealing with kerros, you generally don't want to use IP addresses because it's very picky about having the domain and host name and things like that. So try to avoid IP addresses when you can. Uh now that we have authentication, we can test if we have like WinRM access. So we can try this and uh fail. I don't know exactly what that is, but uh it doesn't seem to like whatever we did. I'm guessing maybe it's because Kerros authentication is a disabled or something. I I don't know.", "start": 257.68, "duration": 0.0, "meta": {"video_id": "-JM--KfVhpA", "title": "HackTheBox - Vintage", "url": "https://www.youtube.com/watch?v=-JM--KfVhpA"}}
|
| 8 |
+
{"text": "Um so we could do SMB. Uh, we could probably also run blood hound. Uh, we could do other enumeration like d- users will list all the users in the domain, but I really don't like doing a lot of enumeration from net exec just because blood hound will give us all this data and it does a really good job at it, right? Um, interesting enough, I can see last password set from this and we see there are a few users that have the password set at the same time. So this indicates maybe like the help desk created these accounts or something because it's very rare for four users of different names to have all the same passwords that time. But let's now run blood hound. So I'm going to do Python 3 and I have blood hound installed in op bloodhound and gestures. Bloodhound.py bloodhound.py. There we go. I'm going to run all collections.", "start": 315.4, "duration": 0.0, "meta": {"video_id": "-JM--KfVhpA", "title": "HackTheBox - Vintage", "url": "https://www.youtube.com/watch?v=-JM--KfVhpA"}}
|
| 9 |
+
{"text": "Specify the domain of vintage.htb. The user is P Rosa and then Rosa is best 123. And then we'll specify the name server of 101011.45. And this should get us the users. There we go. And while that goes, let's start up Blood Hound. So I'm going to go to op bloodhound server and then we're going to do Blood Hound port 8088 and um start this container up. And we should be able to go to 127001 um 8088. That should be Blood Hound. And I accidentally just closed my Firefox. Let's start this back up. Here we go. And it looks like I'm already logged in. So, let's just go ahead and upload the data. So, I'm going to upload files.", "start": 364.96, "duration": 0.0, "meta": {"video_id": "-JM--KfVhpA", "title": "HackTheBox - Vintage", "url": "https://www.youtube.com/watch?v=-JM--KfVhpA"}}
|
| 10 |
+
{"text": "And then we will go to HTB vintage. And then we'll upload all these JSON files. Upload. Upload. Close. And it normally takes 2 to 3 minutes to ingest. So I'm going to pause the video here and we'll resume when this is done.", "start": 422.319, "duration": 0.0, "meta": {"video_id": "-JM--KfVhpA", "title": "HackTheBox - Vintage", "url": "https://www.youtube.com/watch?v=-JM--KfVhpA"}}
|
| 11 |
+
{"text": "Okay. So now that it's ingested, let's go over to explore and we can search for what our user can do, which is P Rosa.", "start": 441.199, "duration": 0.0, "meta": {"video_id": "-JM--KfVhpA", "title": "HackTheBox - Vintage", "url": "https://www.youtube.com/watch?v=-JM--KfVhpA"}}
|
| 12 |
+
{"text": "So, if we go to P Rosa, we can click on the account and then I always like looking at outbound object control and we don't see anything. So, it doesn't look like this user has any um special privileges. I'm going to mark them as owned anyways. And then let's just go take a look at what cipher queries we have. And I did a lot of just clicking around all of these and nothing really became that useful for me. We can look at the shortest paths here. We can do shortest paths to tier zero highv value targets. run this and then kind of see what this is trying to show us. Let's see. Um, don't see all that much. We have domain controllers. There are some users here. We have Cer admin and Elbiance admin at hack the box and they can add themselves over to this delegated admin group. I don't know what this is. Uh pre-migration. Okay. But delegated admins. So this is probably going to be", "start": 448.88, "duration": 0.0, "meta": {"video_id": "-JM--KfVhpA", "title": "HackTheBox - Vintage", "url": "https://www.youtube.com/watch?v=-JM--KfVhpA"}}
|
| 13 |
+
{"text": "used for some type of resourcebased con um constrain delegation attack. It's RBCD. I think I'm going to set this as the starting point. And then I'm just going to set the DC as the final point to see exactly what delegated admins can do. And it looks like they're allowed to act. So we want to get over to um one of those users, right? And whenever I see like ADM accounts, um, one of the things that's a big issue is like password reuse from their low privilege accounts. So what I want to do is look at all the password set times for these accounts, see if they match their low privilege accounts, and then also set their low privilege as um high value, right? Like if we look at this LBE at uh Elbiance admin, let's see, do they have a low proof? They do. So, I'm just going to also mark this as high value. Confirm. Because we know this is", "start": 514.0, "duration": 0.0, "meta": {"video_id": "-JM--KfVhpA", "title": "HackTheBox - Vintage", "url": "https://www.youtube.com/watch?v=-JM--KfVhpA"}}
|
| 14 |
+
{"text": "an administrator, right? This account itself may not be high value, but if we get access to the account, it's probably going to um lead us towards their ADM account. So, I always like marking the low privilege to high value when I really don't have much to go on, right? So, now I want to look at the password set time. And the easiest way to query this, I guess we did show you can do it through net exec earlier, but the way I normally do it is through the blood hound data. So if I do a ls, we can see we have um the users. So if I just cat this and then we can go over to jq. And if we look at the top, we want to go down data and properties. So, I'm going to do jq and we can say dot um data properties and then do a less. And now we're just seeing the properties. I'm also going to do a um select on a field that is unique to users, which is going", "start": 570.48, "duration": 0.0, "meta": {"video_id": "-JM--KfVhpA", "title": "HackTheBox - Vintage", "url": "https://www.youtube.com/watch?v=-JM--KfVhpA"}}
|
| 15 |
+
{"text": "to be SAM account name because that's going to get us even um less lines, right? We can do a wc-l. We see we're at 518 lines because this is going to get things like extra data that we don't care about. Um, so if we do this and then we pipe that over to a select then same account name like this. Uh, we got rid of six lines. So it doesn't really get that much. I'm guessing it takes out like the metadata and things like that. But um the next thing we want to do is look at uh SAM account name and the password change. So we can do password last set. So I'm going to now pipe this over. And then we're going to extract the pwd last set. And then we also want to extract the SAM account name like this. Do we backspace all of them? The JQ syntax is really weird.", "start": 630.0, "duration": 0.0, "meta": {"video_id": "-JM--KfVhpA", "title": "HackTheBox - Vintage", "url": "https://www.youtube.com/watch?v=-JM--KfVhpA"}}
|
| 16 |
+
{"text": "Let's see. I think I only escaped the first one. I think I forgot the double quote. So, let's get rid of the escape on the closing parenthesy. There we go. So, we're going to do dash r for raw. And this is going to give us the password change time and a user. So, I'm going to do a sort dash n and then see if anything matches up. Right. We see what we saw in net exec. These users have all the same um cenary cary admin.", "start": 695.519, "duration": 0.0, "meta": {"video_id": "-JM--KfVhpA", "title": "HackTheBox - Vintage", "url": "https://www.youtube.com/watch?v=-JM--KfVhpA"}}
|
| 17 |
+
{"text": "Those are different. These service accounts are the same. We also have a service account down here that is more recent. So doesn't mean the passwords are the same. It just means they were set at the same exact time which um gives a good chance of these being the same passwords. So I mean service SQL could also be the same password even though it's set at a different time. It's just statistically speaking, I would bet money that um if any were the same password be those and then these. And whenever I see these passwords, I would probably try like spamming welcome one summer 2022 thinking of passwords the help desk may set for like new users, right? Because um all these users didn't set the password at the same exact time someone else did. So there was some script setting the password. If the script's not randomizing it per user, then these will all be the same", "start": 725.519, "duration": 0.0, "meta": {"video_id": "-JM--KfVhpA", "title": "HackTheBox - Vintage", "url": "https://www.youtube.com/watch?v=-JM--KfVhpA"}}
|
| 18 |
+
{"text": "and it's probably going to be something easier to write. But the thing that really sticks out to me is we have this um group manage service account. So I just want to take a look at GMSA over in Blood Hound. So we can do GMSA01 and let's look at how we can get to it. U if we look at outbound object control, this is going to be what it can do. So this GMSA account can add themsel to service manager. But if we look at what can talk to the GMSA account, let's see, we have admin, don't care, don't care. Uh domain computers, account operators, administrators. So the thing that really sticks out to me is this domain computer has the read GMSA password over this.", "start": 776.399, "duration": 0.0, "meta": {"video_id": "-JM--KfVhpA", "title": "HackTheBox - Vintage", "url": "https://www.youtube.com/watch?v=-JM--KfVhpA"}}
|
| 19 |
+
{"text": "And we see FS01 is a member of it. So, if we look at FS01, then I go down. We can look at inbound object control to see if there's anything odd here. And everything kind of looks standard. So, let's look at member of. And we see this account is a member of this pre Windows 2000 compatible access group. And what that flag does is it will set the password of this account to be the account name and lowercase. And I found out about this a long time from a trusted sec article. If you just Google now um the pre Windows 2000 compatibility group, other things will come out, but this is when I first saw about this attack. So that's why I'm adding trusted sec to it. So we do trusted sec precreated computers. And there we go. This is a really good blog post to read and it's talking about it. It goes in how to detect it. But right here um there's a", "start": 822.24, "duration": 0.0, "meta": {"video_id": "-JM--KfVhpA", "title": "HackTheBox - Vintage", "url": "https://www.youtube.com/watch?v=-JM--KfVhpA"}}
|
| 20 |
+
{"text": "KB article that you have to use the way back machine to see it. But um the password of this computer account becomes the same as the computer account in lowercase. And I also think I saw um my user is a member of that. Hold on. I just want to check something real quick.", "start": 883.76, "duration": 0.0, "meta": {"video_id": "-JM--KfVhpA", "title": "HackTheBox - Vintage", "url": "https://www.youtube.com/watch?v=-JM--KfVhpA"}}
|
| 21 |
+
{"text": "We check P Rosa member of pre Windows 2000. I'm also going to try it with this account. I don't think this is going to work, but um I always like playing with things as we do them on Hack the Box. So, let's do NXC. So, this authentication obviously works because that's the password, right? Let's just double check. Yes, we're saying now because they're a member of this group. Is this going to work? Nope, it does not. Okay. Um just get rid of special characters to be positive. Okay. So, let's try FS01 and then put FS01 as the username. And computer accounts or special accounts end in a um dollar sign and we can log in. If we had a invalid password, so I just add some things to the end of this. I'm going to get a pre-author failure. So, this account because it was a member of this pre Windows 2000 compatible access and it was a computer account um meant the", "start": 904.0, "duration": 0.0, "meta": {"video_id": "-JM--KfVhpA", "title": "HackTheBox - Vintage", "url": "https://www.youtube.com/watch?v=-JM--KfVhpA"}}
|
| 22 |
+
{"text": "password was set as um the name of it. So, this should be able to read GMSA password. So, I'm going to do LDAP and then we can do the GMSA flag. And we see it's trying to connect to LDAP S and then getting a connection reset which in our endmap scan we did note that um LDAP S was TCP wrapped and we couldn't connect to it. We can run another tool in order to dump this. Um the most popular one is probably Bloody AD. So, if we do bloody advantage.htb HTTP as the domain. Username is going to be FS01. The password is also FS01. We got to specify the host which is dc1.vintage.htb. Specify kerros. And then what you want to do is do a get object and then gmsa01. I don't know if this will get all objects. Um, it does get all objects. We could also specify the attribute.", "start": 971.68, "duration": 0.0, "meta": {"video_id": "-JM--KfVhpA", "title": "HackTheBox - Vintage", "url": "https://www.youtube.com/watch?v=-JM--KfVhpA"}}
|
| 23 |
+
{"text": "Right? So if we look at this we can see um the manage password ID this B 64 string let's see do we have the actual password manage password B 64 I'm not sure if it does it if you don't specify password last set um let's just specify the attribute so I'm going to do d-atr mds managed password. And I thought that would get me the laps. Maybe I typed it.", "start": 1031.72, "duration": 0.0, "meta": {"video_id": "-JM--KfVhpA", "title": "HackTheBox - Vintage", "url": "https://www.youtube.com/watch?v=-JM--KfVhpA"}}
|
| 24 |
+
{"text": "Um, let's see. Oh, MSDS. And I just did MDS. There we go. And it has NLM and B 64 encoded. So, I want to search to see if this existed before. So, I'm going to run the previous command where I'm not specifying the attribute. We'll grip for the NLM hash and we don't see it. Um, so it looks like you have to um specify the attribute for this to do it. Um, this B 64 string, there's a tool that can decrypt it because I think it's just a static decryption password or something, a decryptting decryption key, I should say. But if you just B 64 it, it's not there. you have to um decrypt it which um you can easily do with another script but this makes it really easy. Uh the thing that I was confused about though is why can I get this working with bloody AD but my net exec command failed right? So to troubleshoot", "start": 1072.84, "duration": 0.0, "meta": {"video_id": "-JM--KfVhpA", "title": "HackTheBox - Vintage", "url": "https://www.youtube.com/watch?v=-JM--KfVhpA"}}
|
| 25 |
+
{"text": "this, how I started was a pseudo wire shark and I just wanted to confirm that bloody ad was not talking to um LDAPS, right? So I'm going to set this on ton zero. Uh let's run the net exec first.", "start": 1132.24, "duration": 0.0, "meta": {"video_id": "-JM--KfVhpA", "title": "HackTheBox - Vintage", "url": "https://www.youtube.com/watch?v=-JM--KfVhpA"}}
|
| 26 |
+
{"text": "So we can run this and we see we start the TCP and we immediately talk to 636 and it dies. So we could look see if there's a port command. So, let's search. Uh, there should be a port. Uh, server port. That's not it. Uh, d-port.", "start": 1146.64, "duration": 0.0, "meta": {"video_id": "-JM--KfVhpA", "title": "HackTheBox - Vintage", "url": "https://www.youtube.com/watch?v=-JM--KfVhpA"}}
|
| 27 |
+
{"text": "So, 389. Uh, 636. I don't even see it talking to 389 first.", "start": 1167.36, "duration": 0.0, "meta": {"video_id": "-JM--KfVhpA", "title": "HackTheBox - Vintage", "url": "https://www.youtube.com/watch?v=-JM--KfVhpA"}}
|
| 28 |
+
{"text": "Weird. So, let's do port 389. And let's see. Do we have anything here? I wonder if I specify the port earlier.", "start": 1174.679, "duration": 0.0, "meta": {"video_id": "-JM--KfVhpA", "title": "HackTheBox - Vintage", "url": "https://www.youtube.com/watch?v=-JM--KfVhpA"}}
|
| 29 |
+
{"text": "Let's do d-port 389.", "start": 1188.96, "duration": 0.0, "meta": {"video_id": "-JM--KfVhpA", "title": "HackTheBox - Vintage", "url": "https://www.youtube.com/watch?v=-JM--KfVhpA"}}
|
| 30 |
+
{"text": "Uh, I'm either blind or it's not even going to 389. It's not even going to 389. It's just hardcoded to 636 every time. So, if I now switch over to uh bloody AD, we're going to run the same thing. And we see a lot more traffic and it is talking to uh 389. So what I did from here is I went into my net exec directory. So we'll do local pipex whoops uh local pipex and then it's vms net exec lib I think uh python site packages uh net exec is it net exec that's not Okay, this is where net exec is and I just did a gp-- r gmssa if I can type and we saw where gmsa is used here and looking through this uh let's see can I find it there we go I spotted this line which was odd it's setting the protocol to LDAPS if we have the gmsa argument set or the port is 36 uh 636 so what I did was go into this file and", "start": 1195.72, "duration": 0.0, "meta": {"video_id": "-JM--KfVhpA", "title": "HackTheBox - Vintage", "url": "https://www.youtube.com/watch?v=-JM--KfVhpA"}}
|
| 31 |
+
{"text": "then removed this line or this like condition. So let's do that real quick.", "start": 1280.0, "duration": 0.0, "meta": {"video_id": "-JM--KfVhpA", "title": "HackTheBox - Vintage", "url": "https://www.youtube.com/watch?v=-JM--KfVhpA"}}
|
| 32 |
+
{"text": "So let's do v protocols lap.py and then what is it?", "start": 1286.0, "duration": 0.0, "meta": {"video_id": "-JM--KfVhpA", "title": "HackTheBox - Vintage", "url": "https://www.youtube.com/watch?v=-JM--KfVhpA"}}
|
| 33 |
+
{"text": "GMSA and it's set multiple places. So we'll have to do it in a lot. So I'm just going to do a regular expression. So do percent s. And then I'm going to paste self.orgs gmsa or to erase this part. replace it with nothing G and we did 10 substitutions. So now wherever you saw that we just see if selfport is 636. So I'm going to save this and then let's go back to my HTB uh vintage directory. Run this net net exec again. Uh nxe. There we go.", "start": 1293.32, "duration": 0.0, "meta": {"video_id": "-JM--KfVhpA", "title": "HackTheBox - Vintage", "url": "https://www.youtube.com/watch?v=-JM--KfVhpA"}}
|
| 34 |
+
{"text": "And I don't think I need this port anymore because I think it defaults to LDAP unless GMSA is set. So now we run this and there we go. It works. So I'm not exactly sure why um Net Exec requires LDAPS s for group managed service accounts. I'm guessing there's some policy in Windows that will um prevent you from reading this LDAP attribute if it's not secure communication, but that's definitely not the case here. So, we can get the NLM hash of GMSA with either bloody AD or Net Exec. As long as you hardcode Net Exec to not use um GMSA. And since a lot of those developers um watch these videos, I'm sure that this will be fixed in Net Exec very shortly. But let's now get on to with what we can do with this GMSA account. So, going back to search, we can do GMSA01. And looking at what this user can do, if we go to outbound control, we", "start": 1334.88, "duration": 0.0, "meta": {"video_id": "-JM--KfVhpA", "title": "HackTheBox - Vintage", "url": "https://www.youtube.com/watch?v=-JM--KfVhpA"}}
|
| 35 |
+
{"text": "can see they can add themsel over to this service managers group. So let's see what service managers can do. So I'm going to go back to outbound control and we have generic all against the service accounts. So service, service LDAP, and service arc.", "start": 1391.36, "duration": 0.0, "meta": {"video_id": "-JM--KfVhpA", "title": "HackTheBox - Vintage", "url": "https://www.youtube.com/watch?v=-JM--KfVhpA"}}
|
| 36 |
+
{"text": "And if we look at each of these, um there's no outbound access. Uh, let's go to service LDAP. Uh, no outbound access service. And I just saw something interesting. We have enabled set to false. So, this account is disabled currently. And no outbound access. Are all these disabled? I don't think so. I think that's the only one. Uh, enabled true. Enabled true. So this service account is enabled false and this was also the one that had a different password set time. The LDAP and ARC account had um different password sets. If we do that jQ command, we can see ARC and LDAP was set at this time and then service equals set this. So they probably changed the password and then um disabled the account which is somewhat a standard policy to do when you disable service accounts. So we can always reenable this account because we", "start": 1409.6, "duration": 0.0, "meta": {"video_id": "-JM--KfVhpA", "title": "HackTheBox - Vintage", "url": "https://www.youtube.com/watch?v=-JM--KfVhpA"}}
|
| 37 |
+
{"text": "have um we can add ourel to service manager then we have generic goal and then once we enable the account we can do a targeted keraros to get the password hash and then try crack it. So um we can get this password hash to LDAP and arc right away just because they're enabled but might as well get it to all three. So let's also enable service but the first step is adding um ourself into the service managers group. So, we're going to use bloody ad again. So, we'll do bloody ad vintage HTB. User is going to be GMSA01 bang. The password is going to be this ntlm. So, we'll copy that. Paste that. And then when we use passwords in um bloody ad, it's really odd or at least use hashes. So we have this password field and it says password or lm nth hash. And this threw me for a loop a little while because if we enable the kerros then it's going to change", "start": 1474.559, "duration": 0.0, "meta": {"video_id": "-JM--KfVhpA", "title": "HackTheBox - Vintage", "url": "https://www.youtube.com/watch?v=-JM--KfVhpA"}}
|
| 38 |
+
{"text": "this password to also be um aes it's expecting and we want to specify rc4.", "start": 1539.2, "duration": 0.0, "meta": {"video_id": "-JM--KfVhpA", "title": "HackTheBox - Vintage", "url": "https://www.youtube.com/watch?v=-JM--KfVhpA"}}
|
| 39 |
+
{"text": "And when you do rc4 you don't do the colon. So, I'm going to make the mistake first and I'm going to walk through it just because I think this is an easy mistake to make and I think one a lot of people did because many people just end up using get pgt and then passing the kerros ticket to bloody ad instead of just letting it handle the authentication for you. So, let's do d-host d1 vintage.htb. Um, let's do k. Uh, I was hoping it would just authenticate, but I guess we have to use a command. So, we'll do add group member. We're going to add ourselves to the service managers group. And the user we want added is GMSA01 bang. And we could add other things. We could add like the FS01 user as well if we wanted to and then do the attack from that. But let's just do it with this, right? And we get this", "start": 1545.279, "duration": 0.0, "meta": {"video_id": "-JM--KfVhpA", "title": "HackTheBox - Vintage", "url": "https://www.youtube.com/watch?v=-JM--KfVhpA"}}
|
| 40 |
+
{"text": "pre-auth failure. So, that just means the password was invalid. If we tried putting a colon first, we're going to get also pre-auth failure. Let's see. I'm just going to put this in quotes like this. And then I looked at the help. I was like, oh, it's trying to use it as AES. So, I'm going to set the format to um RC4, which is NLM. And then we get incorrect RC4 NT key. But if we didn't put the colon It works. So if you get that error message, it's probably just because you have the password format wrong. I know this tool very finicky with how you specify things. If we try adding yourself again, we'll see it's failing because we're already a member of that group. So now that we're a member of this, we have generic all against these accounts. So we can um do a targeted curb roast attack. And", "start": 1597.039, "duration": 0.0, "meta": {"video_id": "-JM--KfVhpA", "title": "HackTheBox - Vintage", "url": "https://www.youtube.com/watch?v=-JM--KfVhpA"}}
|
| 41 |
+
{"text": "what targeted curb roast is going to do, it's going to set the SPN for the account and then um curb roast it, right? Because curb roasting for it to work, the account needs an SPN. When it does, then you can do um retrieve the password hash and crack it. Um none of these I don't think have SPN enabled. Can we easily see that? Um SAM account name. Let's see. SPN. Uh principal. I'm not sure it's going to show it if it did not have one. I know FS01 does. See what does that look like in this? Yeah, it would have service principal name if it had one. Right. So, we want to go back to service managers then outbound. Uh, that is that where I was. Huh? Let's just follow the chain again.", "start": 1655.44, "duration": 0.0, "meta": {"video_id": "-JM--KfVhpA", "title": "HackTheBox - Vintage", "url": "https://www.youtube.com/watch?v=-JM--KfVhpA"}}
|
| 42 |
+
{"text": "I'm not sure exactly what I did, but outbound here, genetic right to here, outbound. There we go. So, none of these accounts have SPN. So, target Kerros is going to add it for us and then remove it. We're going to do that and then we're going to um go back and uh do it through bloody ID adding it. So, you can see it done two ways. So, hopefully this video is easy to follow because I know I'm all over the place right now. So, let's go ahead and enable service and then do targeted curb roast.", "start": 1719.84, "duration": 0.0, "meta": {"video_id": "-JM--KfVhpA", "title": "HackTheBox - Vintage", "url": "https://www.youtube.com/watch?v=-JM--KfVhpA"}}
|
| 43 |
+
{"text": "Um, let's get target curb roast up and running first. So, we just Google this. We should go to a repo. And we also use this in the administrator machine. So, you can always go to that video if you're confused. But we can go in targeted Kerarost. And what is the command? So, we're going to do Python 3 uh targeted Kerarost. We got to specify the domain vintage.htb htb uh dash k no pass DChost. It's gonna be dc1.vage.htb. And what we're going to have to do is get a uh TGT. So let's do get TGT. Um U is going to be GMSA01 dollar and then at what is it?", "start": 1761.559, "duration": 0.0, "meta": {"video_id": "-JM--KfVhpA", "title": "HackTheBox - Vintage", "url": "https://www.youtube.com/watch?v=-JM--KfVhpA"}}
|
| 44 |
+
{"text": "Vintage.htb DCIP 1010 114 45 uh hashes. Do I still have I don't have the nm on my clipboard. Was B8 I think. Nope. Where is the password hash? Here it is.", "start": 1818.2, "duration": 0.0, "meta": {"video_id": "-JM--KfVhpA", "title": "HackTheBox - Vintage", "url": "https://www.youtube.com/watch?v=-JM--KfVhpA"}}
|
| 45 |
+
{"text": "unrecognized argument. Uh let's see domain vintage http. What if I do it this way? There we go. We got the ticket. So if I go back to targeted kerarost we can say kab 5cc name equmsa1 cache like that and we didn't get any which is a bit odd. I expected to um let's see dash h is there a way to specify a user use let's do request user and was it svc_arch arc was one was that a user yes it this and we don't have it. Okay, I'm guessing what happened was um some cleanup script came on and removed herself from the group. So, I'm going to add herself request a new ticket. And then now let's run the targeted curb roast again.", "start": 1840.399, "duration": 0.0, "meta": {"video_id": "-JM--KfVhpA", "title": "HackTheBox - Vintage", "url": "https://www.youtube.com/watch?v=-JM--KfVhpA"}}
|
| 46 |
+
{"text": "See, I don't have to specify request user fetching users. There we go. So, we got two hashes, service arc and service LDAP. But, let's go ahead and use bloody AD and we're going to um reenable the um service LDAP account. So, we'll go back to our bloody AD command and then we're going to do um remove UAC for user access control service. The field is account disabled. So, the property flag has been removed from that account. And now if we run this targeted coast again, we should also get the uh password hash for LDAP. Right, there we go. So, we see that password hash. Uh, we can grap now for KB5TGS. And then I'm just going to put this to hashes cat hashes. There we go. So, if we wanted to, we could also add the service principle name to the accounts and manly do it. So before I do that, let's run net exec to um confirm it will not dump", "start": 1939.36, "duration": 0.0, "meta": {"video_id": "-JM--KfVhpA", "title": "HackTheBox - Vintage", "url": "https://www.youtube.com/watch?v=-JM--KfVhpA"}}
|
| 47 |
+
{"text": "the uh kerros hashes and then we're going to add it and then run net exec again. So let's do nxc ldap dco1.vintage.hcb. The user is gsa01 bang. Then capital h for a password hash. Put in the ntlm hash. Do- k. And then we can do kerber roasting. And I'm going to call this nxc.hashes hashes because the other one I just did hashes and I'm kind of curious if it requests the same format and we see there are zero records returned and that's because there's no um service principle names.", "start": 2017.279, "duration": 0.0, "meta": {"video_id": "-JM--KfVhpA", "title": "HackTheBox - Vintage", "url": "https://www.youtube.com/watch?v=-JM--KfVhpA"}}
|
| 48 |
+
{"text": "So let's go back to bloody ad and where we did add group member. I'm just going to run this again to make sure we're still inside this group. Okay, it looks like we are. So what we can do here is add a service principle name. So let's do a set object and if you want you can always do dash h and you can see what function you have. You have add get remove set. So we're going to do a set object and we're going to do serviceql. I'm going to set the service if I can type service principle name to let's do httpsql. This doesn't matter. Right? So now we have a SPN there. There was arc, right? That was service ARK. We can add that and the other one was LDAP. So we can just have SPNs for all these. And now when I go back and run this net exec command, hopefully it's going to dump all their hashes. There we go. We got all three.", "start": 2051.52, "duration": 0.0, "meta": {"video_id": "-JM--KfVhpA", "title": "HackTheBox - Vintage", "url": "https://www.youtube.com/watch?v=-JM--KfVhpA"}}
|
| 49 |
+
{"text": "So if we do catnx.hashes, uh, we see that's KB5TGS23. If I just cat hashes K5TGS23. So it dumped them in the same exact format. Let's go ahead now and um, attempt to crack these. And it should be noted if either of these accounts had like outbound access, I could have just changed their password and then attempted to um log in, right? But because none of them had outbound access, I just assumed there wasn't really anything special about these accounts. So that's why I wanted to crack the password instead of taking over the account. Um let's go in hashcat v hashes. This box is vintage. We will eventually use the right clipboard. Paste those all in. Now we can do dot slash hashcat hashes vintage opt word list rocku.ext and it should autodetect the hash and start cracking it. Yep, it does. And already went through the rocku word list. If we do", "start": 2125.52, "duration": 0.0, "meta": {"video_id": "-JM--KfVhpA", "title": "HackTheBox - Vintage", "url": "https://www.youtube.com/watch?v=-JM--KfVhpA"}}
|
| 50 |
+
{"text": "d-show, we can see serviceql was cracked to be zero the one. So we have a password here for the um service. What I want to do now is build a word list of all the users on the box and then we can spray. Right. So if I went back to that jq command I did earlier, I'm just going to grab the same account name of every account. I may want to like change my select to only get um enabled accounts, but I'm a bit lazy.", "start": 2201.8, "duration": 0.0, "meta": {"video_id": "-JM--KfVhpA", "title": "HackTheBox - Vintage", "url": "https://www.youtube.com/watch?v=-JM--KfVhpA"}}
|
| 51 |
+
{"text": "We'll just do it this way. And I call it users.ext. And we can go back to nxc. We'll do dash u as users.txt. And then p for password. We're going to put zero the one and see if we get any hits. Uh, pre-auth failure. Okay, we got one c.nary. I also like doing continue on success because maybe there's going to be multiple ones, but we already have um scenary. We don't have the ADM account for that yet. Um, and of course uh the SQL account. So, if we go to Blood Hound, we look at C.NER, Ner, we can see what they have. Clicking on the account. Um, outbound control 3. So, they're a member of service manager, which we already were. So, that doesn't really get us anything. Um, if we look at what members they are, we have remote user. So, C.NA can most likely win rm into the box. So, let's try that. I'm going to do um copy this here. So, I", "start": 2235.28, "duration": 0.0, "meta": {"video_id": "-JM--KfVhpA", "title": "HackTheBox - Vintage", "url": "https://www.youtube.com/watch?v=-JM--KfVhpA"}}
|
| 52 |
+
{"text": "have the password. Then we can do evil winrm i. Uh, let's do 10 10 11. Was that 45? U c.n p 0 the one. Uh, let's see. It's probably going to be something kerros, right? Is it just dash k to do kerros? Let's see.", "start": 2312.96, "duration": 0.0, "meta": {"video_id": "-JM--KfVhpA", "title": "HackTheBox - Vintage", "url": "https://www.youtube.com/watch?v=-JM--KfVhpA"}}
|
| 53 |
+
{"text": "over here to specify the box name DC01 vintage HTB. We may have to use get TGT.", "start": 2342.8, "duration": 0.0, "meta": {"video_id": "-JM--KfVhpA", "title": "HackTheBox - Vintage", "url": "https://www.youtube.com/watch?v=-JM--KfVhpA"}}
|
| 54 |
+
{"text": "Um did that. Let's just try that. So going to go back to my get tgt command. We'll do c.n Canary see the other the one stole my clipboard. Put this password in and go back to evil winrm. And we can say kb 5cc name is equal to what is the file? It saved this.", "start": 2354.599, "duration": 0.0, "meta": {"video_id": "-JM--KfVhpA", "title": "HackTheBox - Vintage", "url": "https://www.youtube.com/watch?v=-JM--KfVhpA"}}
|
| 55 |
+
{"text": "See? K. Oh, we probably needed Realm Vintage HTB. That did not work. Oh, I think it wants It needs to be set in Kobe B5.com. Let's see. I think that's going to be what we have to do. I'm just making sure there's no other options I'm missing. It doesn't look like there is.", "start": 2395.359, "duration": 0.0, "meta": {"video_id": "-JM--KfVhpA", "title": "HackTheBox - Vintage", "url": "https://www.youtube.com/watch?v=-JM--KfVhpA"}}
|
| 56 |
+
{"text": "So we have to update our um local curb roast config. And to do that we can use net exec and we'll do net exec smb and I'm going to do dash h. There's a generate command right generate kb file. And it's going to be very important when you generate this you have the host name here. So I'm going to do this real quick. We can say um vintage.karb5. care B5. Uh, what? Nope.", "start": 2424.0, "duration": 0.0, "meta": {"video_id": "-JM--KfVhpA", "title": "HackTheBox - Vintage", "url": "https://www.youtube.com/watch?v=-JM--KfVhpA"}}
|
| 57 |
+
{"text": "Nope. See, I don't even think we need a user, but um it was trying to spray. So, we should now have this file. And I was hoping it would not do this because this is wrong. Um, maybe we al also have to specify the domain. Let's do dash d vintage htb. Oh, I got rid of the dash k. That's probably it. Okay, we logged in. There we go. Um, you want the default realm to be correct, right? If it's an IP address, it's not going to work. And also, if this is lowercase, it's also not going to work. It's very, very picky. Um, and just to drive home the point, all I did was change the um IP there, if we c it, it now defaults back to that IP address. So, be very uh careful when doing this. Uh, let's make sure it's set. Cat vintage Kobe B5. That's good. So, we can do pseudo CP this over to Etsy. Oh, before I do", "start": 2462.599, "duration": 0.0, "meta": {"video_id": "-JM--KfVhpA", "title": "HackTheBox - Vintage", "url": "https://www.youtube.com/watch?v=-JM--KfVhpA"}}
|
| 58 |
+
{"text": "that, Etsy kobb5.com. Always good to make backup files before you just um wipe something, right? So, vintage KB Etsy kb5.com evil winrm and there we go. We get logged in.", "start": 2549.4, "duration": 0.0, "meta": {"video_id": "-JM--KfVhpA", "title": "HackTheBox - Vintage", "url": "https://www.youtube.com/watch?v=-JM--KfVhpA"}}
|
| 59 |
+
{"text": "Awesome. So, I think if we ran like winps and other tools, it would highlight things. But one of the first things I normally do when I get on a user account in Windows is look at like any type of secrets they have stored. And normally you could do like cmd keyl but because we're a um remote session or interact a non-interactive session we don't have any way to unlock the dpappy profile which is what cmd key uses but we can xfill them and do it offline which I think is the better way anyways but the first thing I norally do is a gci-force here and I just want to look for hidden uh directories. Maybe there's like a AWS directory or something like that that's hidden. And I can go and take a AWS key. I don't see anything here. So I'm going to go into the app data and I'm going to go into roaming", "start": 2570.24, "duration": 0.0, "meta": {"video_id": "-JM--KfVhpA", "title": "HackTheBox - Vintage", "url": "https://www.youtube.com/watch?v=-JM--KfVhpA"}}
|
| 60 |
+
{"text": "Microsoft credentials and see if we have anything stored here. If I do a diir, there's nothing. If I do a gci-force, we can see there is a file.", "start": 2621.599, "duration": 0.0, "meta": {"video_id": "-JM--KfVhpA", "title": "HackTheBox - Vintage", "url": "https://www.youtube.com/watch?v=-JM--KfVhpA"}}
|
| 61 |
+
{"text": "So this is going to be a encrypted blob of some stored credentials. If we try to use evil winterm to download it, I don't know exactly why it fails, but it failed and then crashed. So, what I'm going to do is go back into it. Then, we're going to cd to the directory. And then, let's use PowerShell to just B 64 encode it. So, we're going to do a uh convert to base 64 string and we're going to do IO.file. file. I don't think it's case sensitive. So, uh, read all bytes and then specify the file we want, which is going to be this. And let's see at line it's missing. Did I miss a parenthesy? we get a file not found and it's trying to go into C col Windows system 32. So let's tell it to go into um the pwd. So we'll do pwd like that. And I think we can just do backslash. And there we go. We have the base 64 string. So I'm going to copy this. Then let's do um", "start": 2632.48, "duration": 0.0, "meta": {"video_id": "-JM--KfVhpA", "title": "HackTheBox - Vintage", "url": "https://www.youtube.com/watch?v=-JM--KfVhpA"}}
|
| 62 |
+
{"text": "v credential blob. And I'm actually going to call it umBB64. Paste this in. Okay. And in order to decrypt this, we have to get the um master key out. And that is going to be in the protect folder. So we go into protect. Then we go to the SID of our user. And I don't know why evil winter keeps crashing.", "start": 2713.319, "duration": 0.0, "meta": {"video_id": "-JM--KfVhpA", "title": "HackTheBox - Vintage", "url": "https://www.youtube.com/watch?v=-JM--KfVhpA"}}
|
| 63 |
+
{"text": "cd gci-force. We can see two different blobs here. I think one of these is the domain master key and one of these is um the user. Um if you have full domain access, you can get the master key to decrypt all the papy blobs in the domain. And I think that's what one of these is. And then of course, one is just for the user. Since we don't know what is what, let's go ahead download them both. And let's go and grab our PowerShell command. So, let's grab this so I can paste it. Oh, what the hell? I'll just copy up to there. Paste. Convert. Read all bytes.", "start": 2750.92, "duration": 0.0, "meta": {"video_id": "-JM--KfVhpA", "title": "HackTheBox - Vintage", "url": "https://www.youtube.com/watch?v=-JM--KfVhpA"}}
|
| 64 |
+
{"text": "Okay. pwd. Copy this. There we go. And I'll call this v dpappy blob 1.b64. Paste that in. And then let's go ahead and grab the other one. So delete this. Copy paste and this would be the second blob. Okay. So now let's just um unbase 64 all these. So we'll do cat credential blob B64 B64-d and this will be credential blob and then cat dappy blob one base 64-dappy blob one and we'll do the same thing with two. Okay. So now that we have all of those um we can use um pi pyats. So let's do pi pycats-h. Let's add dpappy and look at the help. Okay. So these are all the things we can do. We'll have to use prekey generation to create the prekey. That'll enable us to unlock the master key. And then we'll probably use uh the credential file to decrypt. So let's go ahead and do that. So we do pi pi cats dpappy prekey. And does this have its", "start": 2799.359, "duration": 0.0, "meta": {"video_id": "-JM--KfVhpA", "title": "HackTheBox - Vintage", "url": "https://www.youtube.com/watch?v=-JM--KfVhpA"}}
|
| 65 |
+
{"text": "own help? It does. We can say u password. Then we need the um SID. So we can specify this. So, copy put the SID and then the password which was zero the one. I hope I typed that right. And what this will do is output the prekey file that's used to unlock.", "start": 2911.68, "duration": 0.0, "meta": {"video_id": "-JM--KfVhpA", "title": "HackTheBox - Vintage", "url": "https://www.youtube.com/watch?v=-JM--KfVhpA"}}
|
| 66 |
+
{"text": "So, I'm just going to run TP PKF and that outputs it to the file as well.", "start": 2939.68, "duration": 0.0, "meta": {"video_id": "-JM--KfVhpA", "title": "HackTheBox - Vintage", "url": "https://www.youtube.com/watch?v=-JM--KfVhpA"}}
|
| 67 |
+
{"text": "Right. So, now let's go ahead and start creating the master key file. So I'm going to do pi pi cats dpappy master key dpappy blob one d- o mkf1 uh we need the prekey file as well. So we do pkf there okay and then we can do two. And if we look at these files MKF2 and MKF1 I'm pretty sure we can put multiple master keys. So that's what I'm going to do. Um going to CP MKF1 to just MKF and then we'll copy this master key. So we'll go V MKF specify a second credential. There we go. And I think now um we'll be able to decrypt this credential blob. We could have just uh tried both of them and I'll show that after this. But I think um doing both the master keys is the better approach. Right? So we can do dpappy specify credential and then it wants the master key file and then the credential file. And there we go. It's decrypted. So if we did MKF1,", "start": 2945.48, "duration": 0.0, "meta": {"video_id": "-JM--KfVhpA", "title": "HackTheBox - Vintage", "url": "https://www.youtube.com/watch?v=-JM--KfVhpA"}}
|
| 68 |
+
{"text": "uh no master key was found. MKF2, we get it right. And there's probably a describe command to show what key goes to what um credential blob, but I like just having a um MKF of a bunch of master keys. And then that way when you try to decrypt things, you have to figure out which key goes where. You just uh decrypt, right? So um we run that. It is in a weird format. This is because Windows likes doing things in um UTF-16 little Indian which we can see that's how it's formatted. We start with the U. Then we have N C R probably A C K A B L. So it's uncrackable. Um but I'm just going to go Python 3 do data is equal to that string. And then we can do data decode utf16 little Indian. And there we go. We get cer admin's password is uncrackable password uh 0312. So I'm going to go back in my credentials.ext. And we probably should put cary in there as well, but um oh", "start": 3030.64, "duration": 0.0, "meta": {"video_id": "-JM--KfVhpA", "title": "HackTheBox - Vintage", "url": "https://www.youtube.com/watch?v=-JM--KfVhpA"}}
|
| 69 |
+
{"text": "well. Was it ADM or admin? scenary think that there we go. Save. Uh we can get rid of this um winterm session and let's just go back to net exec SMB dco1 vintage htb c nadm password.", "start": 3106.28, "duration": 0.0, "meta": {"video_id": "-JM--KfVhpA", "title": "HackTheBox - Vintage", "url": "https://www.youtube.com/watch?v=-JM--KfVhpA"}}
|
| 70 |
+
{"text": "Okay, hopefully this works. There we go. We are now logged in as Cer admin. So let's close these out and then we'll go back over to Blood Hound and see exactly what this user can do. So let's change our query. I'm actually going to go to pathf finding real quick. We can say cerm and find a path here. Uh let's go to um administrator. Maybe this be a better path.", "start": 3134.359, "duration": 0.0, "meta": {"video_id": "-JM--KfVhpA", "title": "HackTheBox - Vintage", "url": "https://www.youtube.com/watch?v=-JM--KfVhpA"}}
|
| 71 |
+
{"text": "Okay, so we can see scenery has genetic right member of and add self to this delegated admin group. Delegated admins allowed to act as DC1. So this is going to enable the RBCD that's resourcebased constraint delegation. So essentially we'll be able to create a kerros ticket that says we are um whoever we want and whoever I say with some clauses because members of like the protected user group which by default is going to be administrator you can't um impersonate.", "start": 3169.559, "duration": 0.0, "meta": {"video_id": "-JM--KfVhpA", "title": "HackTheBox - Vintage", "url": "https://www.youtube.com/watch?v=-JM--KfVhpA"}}
|
| 72 |
+
{"text": "So there's probably going to be two paths we can impersonate. We can either just impersonate DC01 itself and then do a DC sync because um if we impersonate the domain controller then we'll have access to do DC syncs. We can also probably go under the other administrator, right? If we look at the members of this, let's see member of where is domain administrator users remote desktop. I could have swore there was a um admin group. Let's see. Was it L something? There we go. This user's ADM. Let's see. Of course, scenery admin is not a member of domain administrator because if they were, we could just instantly pop it, right? But we could also impersonate this LBON admin user because um they're not a member of protected users and also they're a member of administrator. So, they could do a DC sync. Is there a", "start": 3200.559, "duration": 0.0, "meta": {"video_id": "-JM--KfVhpA", "title": "HackTheBox - Vintage", "url": "https://www.youtube.com/watch?v=-JM--KfVhpA"}}
|
| 73 |
+
{"text": "protected flag here? There is a way to enumerate protected user. I don't see it here. Tier zero. Okay. ACL will never expire. Huh? Got to check administrator real quick. Mark sensitive false. What if I don't know exactly what that field is? Maybe administrator you just can't do it by default. Is there a mark sensitive for this?", "start": 3262.88, "duration": 0.0, "meta": {"video_id": "-JM--KfVhpA", "title": "HackTheBox - Vintage", "url": "https://www.youtube.com/watch?v=-JM--KfVhpA"}}
|
| 74 |
+
{"text": "So yeah, mark sensitive. I think if Elbian was mark sensitive, then we would not be able to perform this attack. But um you can never do it with just default administrator just because by default that's going to be a sensitive account.", "start": 3305.44, "duration": 0.0, "meta": {"video_id": "-JM--KfVhpA", "title": "HackTheBox - Vintage", "url": "https://www.youtube.com/watch?v=-JM--KfVhpA"}}
|
| 75 |
+
{"text": "Um maybe at the end of the video we will go explore that more to make sure what I'm saying is correct. Um because I'm not an expert when it comes to this type of stuff. I'm kind of just learning as I go. So what we want to do in order to abuse this attack is we have to have a account that has an SPN and we can use that account to do the impersonation. So the CER ADM we don't have an SPN for that account. So we can't um use that account to impersonate but we could do any of the three service accounts that we add a SPN to. Or we could just use FS01 because we saw FS01 had a service principle name. Right? So if we look at this Um, let's see. Click SPN. Right. So, that's the only requirement for this. So, we're going to do bloody ad vintage. HDB u cerm then -p. Let's go ahead and get this password out.", "start": 3318.16, "duration": 0.0, "meta": {"video_id": "-JM--KfVhpA", "title": "HackTheBox - Vintage", "url": "https://www.youtube.com/watch?v=-JM--KfVhpA"}}
|
| 76 |
+
{"text": "So copy paste uh host DC1 vintage HTB. We can do add group member delegated admins FSO1. And now FS1 has been added. So let's do a get service ticket. Uh the SPN for this is going to just be CIFS. This is just like SMB on dco1.vintage.htb. Who are we going to impersonate? We'll impersonate DC1. And then we will specify uh let's do DCIP. I don't think we actually need this. Uh that'll be 10 10 114 and vintage.htb htb fs1 dollar fs1 is this right? There we go. And we save the ticket to this weird name. But let's copy this. We can say kibb 5cc name is equal to this uh secrets dump.py. And let's see how do we specify this uh dash k-target IP 10145. Uh we probably just need to specify the target DC01 dot vintage HTB. What am I doing wrong? Let's try adding the debug flag. Maybe that'll give us better output. And oh, no such follow directory. Let's", "start": 3384.799, "duration": 0.0, "meta": {"video_id": "-JM--KfVhpA", "title": "HackTheBox - Vintage", "url": "https://www.youtube.com/watch?v=-JM--KfVhpA"}}
|
| 77 |
+
{"text": "put the CC name in quotes. And there we go. That looks better. Um, it dumped everything. We're in debug mode, so it's a bit annoying. Take it out of debug mode. We should get exactly what we want. Right. There we go. So, we have a bunch of accounts. And the thing I wanted to see, do we have multiple hashes? Let's see. Is everyone random? What were the accounts? We can do the jq command. Uh, let's see. Was password uh pwd. There we go. Let's see. We want to look at viola and biani. Just curious. Viola 1D. Bianci. So they are random. So the script was setting everything random.", "start": 3492.0, "duration": 0.0, "meta": {"video_id": "-JM--KfVhpA", "title": "HackTheBox - Vintage", "url": "https://www.youtube.com/watch?v=-JM--KfVhpA"}}
|
| 78 |
+
{"text": "The other thing we were curious about was service accounts. So we can see SQL CC and ARC is 1D1. So everything has unique passwords. There's no like password duplication between this. Um so that's good. So let's go ahead and try the impersonation except we're going to um impersonate the ADM account which will just let us in. I guess before we do that, let's just prove we can shell the box, right? Um, where's the administrator hash? Uh, right here.", "start": 3547.04, "duration": 0.0, "meta": {"video_id": "-JM--KfVhpA", "title": "HackTheBox - Vintage", "url": "https://www.youtube.com/watch?v=-JM--KfVhpA"}}
|
| 79 |
+
{"text": "Awesome. And then we can do get TGT um, dash hashes. Paste that. And then administrator at uh, vintage.htb HTB empty domain vintage HTB like that. Okay. Then we can do KB5 CC name. Let's put this in quotes. evil winrm i 1010 10 11 45 and then realm is going to be uh vintage.htb HTB. How do we do this? Grab evil winner. Let's see. We did KB5 CC name DC1 vintage HTB. Uh, invalid token was applied.", "start": 3582.04, "duration": 0.0, "meta": {"video_id": "-JM--KfVhpA", "title": "HackTheBox - Vintage", "url": "https://www.youtube.com/watch?v=-JM--KfVhpA"}}
|
| 80 |
+
{"text": "That's not what I expected. Administrator at vintage. Let's see. Uh if we just do wi exec d01 vintage htv.", "start": 3658.48, "duration": 0.0, "meta": {"video_id": "-JM--KfVhpA", "title": "HackTheBox - Vintage", "url": "https://www.youtube.com/watch?v=-JM--KfVhpA"}}
|
| 81 |
+
{"text": "Log and type not granted. Let's try the domain admin. Maybe administrator doesn't have remote login and that's what screwing me up. We can try impersonating this user. Let's try this. Okay.", "start": 3685.839, "duration": 0.0, "meta": {"video_id": "-JM--KfVhpA", "title": "HackTheBox - Vintage", "url": "https://www.youtube.com/watch?v=-JM--KfVhpA"}}
|
| 82 |
+
{"text": "DGT vintage HTB L do is that it get rid of hashes. Nope. I need hashes. I don't have her password yet.", "start": 3710.52, "duration": 0.0, "meta": {"video_id": "-JM--KfVhpA", "title": "HackTheBox - Vintage", "url": "https://www.youtube.com/watch?v=-JM--KfVhpA"}}
|
| 83 |
+
{"text": "Okay. Does this user have remote access? Let's Where is it saved? Here it is. Copy.", "start": 3745.48, "duration": 0.0, "meta": {"video_id": "-JM--KfVhpA", "title": "HackTheBox - Vintage", "url": "https://www.youtube.com/watch?v=-JM--KfVhpA"}}
|
| 84 |
+
{"text": "Paste. This is looking better. Awesome. Who am I?", "start": 3759.4, "duration": 0.0, "meta": {"video_id": "-JM--KfVhpA", "title": "HackTheBox - Vintage", "url": "https://www.youtube.com/watch?v=-JM--KfVhpA"}}
|
| 85 |
+
{"text": "di users administrator desktop. There we go. Awesome. So now we have um rooted the box. I want to set the protected flag to true or the sensitive flag to true and then see if we can still do this impersonation. So, what I'm going to do is move this ticket so it's easier to remember. So, we'll do CP this to um ADM.cc cache. There we go. Because whenever we change the permissions, the ticket doesn't reflect that. So, if we mark this account as sensitive, it's very possible that this old ticket would just still magically work. So that's why I copy it out so we can test that as well. So let's figure out how we can mark this account as sensitive with bloody AD. But before we do that, let's just impersonate the Obiance user to make sure it's working before we set the flag. So let's go back to our add SPN", "start": 3765.24, "duration": 0.0, "meta": {"video_id": "-JM--KfVhpA", "title": "HackTheBox - Vintage", "url": "https://www.youtube.com/watch?v=-JM--KfVhpA"}}
|
| 86 |
+
{"text": "command. Uh that's not it. Add SPN. Uh SPN. There we go. And I'm going to change dco1 to just be um lb biani adm like that. And there we go. We save this ticket. So we should be able to get back to our Wii exec. Let's just try it with this ticket. It's going to take a second, but looks like everything's working. Okay, so that's good.", "start": 3834.28, "duration": 0.0, "meta": {"video_id": "-JM--KfVhpA", "title": "HackTheBox - Vintage", "url": "https://www.youtube.com/watch?v=-JM--KfVhpA"}}
|
| 87 |
+
{"text": "So if we now go Google, let's see guidance protected user. So this is going to be what allows us to set to true or like set the sensitive flag I think. So it's saying the built-in administrator account is always exempt from authentication policies. Is this it? How the protected user group works?", "start": 3870.559, "duration": 0.0, "meta": {"video_id": "-JM--KfVhpA", "title": "HackTheBox - Vintage", "url": "https://www.youtube.com/watch?v=-JM--KfVhpA"}}
|
| 88 |
+
{"text": "So, this isn't the article I was looking for, but I think this is saying we can just add them to the protected users group. There's also a way you can just set the ACL um specifically. Um, let's see. Blood Hound sensitive flag maybe. I'm not sure. Um, let's just try adding them to the um sensitive user group. So, let's see. We can say um well, this could actually be a little bit tough. Let's see. K5 CC name. Maybe Bloody AD will work like this. Let's do add So I can spec copy this then bloody ad. I don't think I need the domain user password should just need this. And then we can say add group member protected users and specify this account. Is this going to work? Okay, we have been successfully added. So I'm going to go back to my w my exact command and see if it works.", "start": 3905.68, "duration": 0.0, "meta": {"video_id": "-JM--KfVhpA", "title": "HackTheBox - Vintage", "url": "https://www.youtube.com/watch?v=-JM--KfVhpA"}}
|
| 89 |
+
{"text": "I'm guessing it does because we already have this ticket, right? But I'm hoping once I generate another um thing. Let's see. Is this it? Yep. I'm hoping this fails now. Uh there we go. KDC bad option cannot accommodate request. So now we have marked our account as sensitive and that now um blocks the ability. Uh to prove that we can just go run bloodhound.py again. See, is that running? I think it is. And it should work. Um, I think I misspoke earlier when I was talking about administrator. Um, I think because it's not marked as sensitive, maybe we could impersonate and this user just doesn't have um remote access privileges. We saw like um one of those errors saying remote access denied. So maybe that's why this is being prevented. But it looks like since it's not mark sensitive, we could potentially impersonate them. Um cuz if", "start": 3996.559, "duration": 0.0, "meta": {"video_id": "-JM--KfVhpA", "title": "HackTheBox - Vintage", "url": "https://www.youtube.com/watch?v=-JM--KfVhpA"}}
|
| 90 |
+
{"text": "I do this impersonate, let's just see. Will it work still? Yeah, cuz we get a ticket. So we can impersonate administrator. They just don't have remote access. So that's what blocked us. Um but let's upload the new Blood Hound files. So, I'm going to go administration, upload files, and let's see. We only have to upload the new users. And I think that's going to be this one.", "start": 4061.839, "duration": 0.0, "meta": {"video_id": "-JM--KfVhpA", "title": "HackTheBox - Vintage", "url": "https://www.youtube.com/watch?v=-JM--KfVhpA"}}
|
| 91 |
+
{"text": "Upload. And this should only take a minute, but hopefully once it does, we'll see um that user is now merc sensitive, which would be a good way to know in recon before actually attempting to do the um delegation attack, right? See, it is now complete. Let's refresh. Cary ad. Uh no, it's not Cary.", "start": 4094.039, "duration": 0.0, "meta": {"video_id": "-JM--KfVhpA", "title": "HackTheBox - Vintage", "url": "https://www.youtube.com/watch?v=-JM--KfVhpA"}}
|
| 92 |
+
{"text": "It is L biani. Come on, please say mark sensitive. False. Uh, protected user Elbiani member of I wonder if I didn't upload the groups. That's why I didn't do it. Um, let's do it. Add the groups as well.", "start": 4117.839, "duration": 0.0, "meta": {"video_id": "-JM--KfVhpA", "title": "HackTheBox - Vintage", "url": "https://www.youtube.com/watch?v=-JM--KfVhpA"}}
|
| 93 |
+
{"text": "Administration. Uh, let's see. Where is domain groups? We'll do Let's just do them all. Uh there. It won't take that much longer to do them all. But I'm guessing maybe Blood Hound will look at the group and if it's a member of protected users, then it says I'm too sensitive. Or maybe it just doesn't look at it at all. But I find that hard to believe. I'm pretty sure that now that it's done ingesting. Um, do we have to click to refresh? Mark sensitive.", "start": 4145.4, "duration": 0.0, "meta": {"video_id": "-JM--KfVhpA", "title": "HackTheBox - Vintage", "url": "https://www.youtube.com/watch?v=-JM--KfVhpA"}}
|
| 94 |
+
{"text": "False. Mark sensitive is still false. Do we now a member of a new group? 10 protected users, but was still marked false. Maybe I just don't know what I'm talking about. That is very possible. I'm going to delete all my data and then we're going to run it again. Um, but we confirmed adding them to the group did prevent us from um being able to do the attack. I just wish Blood Hound would make it more obvious by actually saying they are sensitive.", "start": 4183.64, "duration": 0.0, "meta": {"video_id": "-JM--KfVhpA", "title": "HackTheBox - Vintage", "url": "https://www.youtube.com/watch?v=-JM--KfVhpA"}}
|
| 95 |
+
{"text": "Okay, copy these files.", "start": 4231.679, "duration": 0.0, "meta": {"video_id": "-JM--KfVhpA", "title": "HackTheBox - Vintage", "url": "https://www.youtube.com/watch?v=-JM--KfVhpA"}}
|
| 96 |
+
{"text": "Upload. It's ingesting. Should not take long to ingest. Come on. This is why I normally pause the video because when it does take a while, it does. Uh maybe maybe that's why it wasn't it was going so quickly because um it wasn't actually updating because we had some of the data already. So maybe I should just pause the video and resume when it's done. Yeah, that's what I'm going to do. So I'm going to pause the video. We'll resume when this is ingested. Okay, the moment of truth has come. Let's see if the account now is marked sensitive. So let's do L.", "start": 4237.239, "duration": 0.0, "meta": {"video_id": "-JM--KfVhpA", "title": "HackTheBox - Vintage", "url": "https://www.youtube.com/watch?v=-JM--KfVhpA"}}
|
| 97 |
+
{"text": "Bianci. Look at this.", "start": 4276.92, "duration": 0.0, "meta": {"video_id": "-JM--KfVhpA", "title": "HackTheBox - Vintage", "url": "https://www.youtube.com/watch?v=-JM--KfVhpA"}}
|
| 98 |
+
{"text": "and we're sensitive still false. So that does not do it. Um I wonder if it's like ACL inherent. I don't know exactly um what the case is. I find that to be a bit odd looking at this. We are a member of protected users. See if we look at this. Does this say anything about sensitive? It does not. Um let's see if we can figure out exactly how to add that bit on um bloody ID real quick. So let's see. We did add group member. Um we want to look at disable.", "start": 4283.96, "duration": 0.0, "meta": {"video_id": "-JM--KfVhpA", "title": "HackTheBox - Vintage", "url": "https://www.youtube.com/watch?v=-JM--KfVhpA"}}
|
| 99 |
+
{"text": "So when we um remove the UAC bit account disable, I want to see exactly where that is defined. So we can list other bits we can remove. Um I wonder if it will have a help. Does it multiple? It does not say. So let's go. Let's see. It's probably in my VM local uh pipex VMs then bloody ad lib python site packages bloody ad g-r account disable it's probably in formatterers access control. Okay, so these are probably all the account flags we can add or remove. And we probably want not delegated. That seems to be it trusted. Yeah, let's add this bit. Okay. Uh let's go back to HTB vintage.", "start": 4330.719, "duration": 0.0, "meta": {"video_id": "-JM--KfVhpA", "title": "HackTheBox - Vintage", "url": "https://www.youtube.com/watch?v=-JM--KfVhpA"}}
|
| 100 |
+
{"text": "disable. Oh, I lost it. Um, FS01. See, UAC. There we go. So, using bloody AD. This will be UAC. We want to add add UAC.", "start": 4414.92, "duration": 0.0, "meta": {"video_id": "-JM--KfVhpA", "title": "HackTheBox - Vintage", "url": "https://www.youtube.com/watch?v=-JM--KfVhpA"}}
|
| 101 |
+
{"text": "this and we want it on LBNI ADM and we don't have a user or password because we're using a ticket. Uh we don't need format RC4. KB5 CC name equal ADM cache. Is that what we called it? The flag has been added. So, let's do blood hound yet again. And the third time is the term for getting this sensitive flag to set. Come on. Quering. Okay, just about done. We can go back into administration. And if we don't have it marked as sensitive, I'll admit I have no idea what I'm talking about, but I think I'm close. And that's what like these beyond roots are for. You just um learn much more by doing them, right? It's still ingesting. Let's see. Uh we can do this real quick. L Biani ADM uh KDC cannot accommodate. So what I also want to do, we'll remove us from the protected user group to make sure we still", "start": 4442.84, "duration": 0.0, "meta": {"video_id": "-JM--KfVhpA", "title": "HackTheBox - Vintage", "url": "https://www.youtube.com/watch?v=-JM--KfVhpA"}}
|
| 102 |
+
{"text": "um can't do this. So we can say Dell group member protected users biani adm 5cc name it's not dell it's remove okay and impersonate. We still can't. And now that is ingested. Am I going to lose my mind here? Select account mark sensitive true. So that is why we can't generate a new ticket. But as we showed, if we already had a ticket, then um we can, right? So let's um impersonate failed. We did the was it add UAC. Let's remove that UAC. We removed it. Now we can impersonate. And still not working.", "start": 4543.8, "duration": 0.0, "meta": {"video_id": "-JM--KfVhpA", "title": "HackTheBox - Vintage", "url": "https://www.youtube.com/watch?v=-JM--KfVhpA"}}
|
| 103 |
+
{"text": "Let's see. Oh, it's probably because um some type of cleanup happened. Let's see. This was a delegated admin thing.", "start": 4641.36, "duration": 0.0, "meta": {"video_id": "-JM--KfVhpA", "title": "HackTheBox - Vintage", "url": "https://www.youtube.com/watch?v=-JM--KfVhpA"}}
|
| 104 |
+
{"text": "Okay, FS01 has been added to delegated admins. Impersonation works. Awesome.", "start": 4662.719, "duration": 0.0, "meta": {"video_id": "-JM--KfVhpA", "title": "HackTheBox - Vintage", "url": "https://www.youtube.com/watch?v=-JM--KfVhpA"}}
|
| 105 |
+
{"text": "That is exactly what we expected. Let's now UAC add. We added that back. Impressation's broken. Right.", "start": 4670.239, "duration": 0.0, "meta": {"video_id": "-JM--KfVhpA", "title": "HackTheBox - Vintage", "url": "https://www.youtube.com/watch?v=-JM--KfVhpA"}}
|
| 106 |
+
{"text": "There we go. Let's do remove impersonation works. And let's look at add group members. And we'll add it to protected users. And the reason why I'm doing this twice is because I realized um the cleanup script removed FS01 from delegated admin which broke my ability to begin with. So that's why I'm just going back and making sure everything works as expected. Uh this is going to be L biani ADM. Uh let's just history gp protected.", "start": 4683.36, "duration": 0.0, "meta": {"video_id": "-JM--KfVhpA", "title": "HackTheBox - Vintage", "url": "https://www.youtube.com/watch?v=-JM--KfVhpA"}}
|
| 107 |
+
{"text": "It should be this one. I think that's remove. Now we can just use add. There we go. And now we want to impersonate. And still can't. So awesome. Uh so that's going to be Lux. Hope you guys enjoyed that beyond route.", "start": 4737.04, "duration": 0.0, "meta": {"video_id": "-JM--KfVhpA", "title": "HackTheBox - Vintage", "url": "https://www.youtube.com/watch?v=-JM--KfVhpA"}}
|
| 108 |
+
{"text": "But um yeah, take care and I'll see you all next", "start": 4764.719, "duration": 0.0, "meta": {"video_id": "-JM--KfVhpA", "title": "HackTheBox - Vintage", "url": "https://www.youtube.com/watch?v=-JM--KfVhpA"}}
|