Keypoints :
- Introduction of a new Active Directory machine challenge with vulnerabilities such as DACL abuse and SQL interactions.
- Initial scanning of the host using Nmap to identify open ports and services.
- Finding sensitive files through anonymous FTP access.
- Using the `.kdbx` file to extract passwords and explore its contents.
- Implementing password spraying techniques against Active Directory users.
- Demonstrating NTLM relay attacks to capture user credentials.
- Using BloodHound to analyze Active Directory relationships and permissions.
- Exploiting user permissions to escalate privileges and exploit machine accounts for delegation configurations.
- Final steps involving DCSync to dump hashes and a pass-the-hash attack for full access.
- Maverick encourages continuous learning and engagement in the hacking community.
MITRE Techniques :
- T1078 – Valid Accounts: Exploited valid user accounts for authentication.
- T1059 – Command and Scripting Interpreter: Used command line tools for interaction with services (impacket, Nmap).
- T1071 – Application Layer Protocol: Exploited FTP for file transfers and credential harvesting.
- T1086 – PowerShell: Used PowerShell Remoting for access to systems after privilege escalation.
- T1132 – Data Encoding: Encoded credentials and data for secure transfer and usage across different services.
- T1203 – Exploitation for Client Execution: Exploited identified vulnerabilities across services determined through Nmap reconnaissance.
Indicator of Compromise :
- [IP Address] 10.10.87.74
- [Domain] redelegate.vl
- [Domain] dc.redelegate.vl
- [File] Shared.kdbx
- [Hash] $keepass$*2*600000*0*ce7395f413946b0cd279501e510cf8a988f39baca623dd86beaee651025662e6*e4f9d51a5df3e5f9ca1019cd57e10d60f85f48228da3f3b4cf1ffee940e20e01
Full Story: https://infosecwriteups.com/redelegate-vulnlab-forcechangepassword-genericall-and-constrained-delegation-aa48b6d89931?source=rss—-7b722bfd1b8d—4 :’Fall2024!’
Impacket v0.12.0 – Copyright Fortra, LLC and its affiliated companies
[*] Impersonating ryan.cooper
[*] Requesting S4U2self
[*] Requesting S4U2Proxy
[*] Saving ticket in ryan.cooper@cifs_dc.redelegate.vl@REDELEGATE.VL.ccache
Now, you can export your ticket and either log in using psexec or go straight for DCSync to dump all the hashes. Once you have the Administrator hash, just pass-the-hash and… PWNED!
Final words:
I hope this walkthrough was clear and that you learned something new along the way. This write-up was made with love by Mohamed Eletrepy aka Maverick. Keep hacking, stay curious, and never stop learning. Until next time — happy hacking!
Attack Path Overview
Wanna Keep in Touch with Maverick?
Don’t forget to follow me on LinkedIn and Twitter, and give me some respect on Hack The Box! i love chatting with like-minded people, sharing knowledge, and learning from everyone. Happy hacking!
[/hidden_content]