Nmap scan:
Lots of ports as per normal DC scanning.
Using enum4linux
with no credentials, we find that it accepts null credentials and we can enumerate some users.
With a user list, we can attempt to do AS-REP Roasting before moving on, and we would find a hash for the svc-alfresco
user.
Then, we can use john
to crack the hash easily.
Afterwards, we can evil-winrm
in as this user.
I ran SharpHound on the machine to do collection and enumeration of the domain for me. After loading up Bloodhound and uploading the data, this is what we find:
The user we have control over seems to have GenericAll permissions over the Exchange Windows Permissions group, which has WriteDacl permissions over the DC.
The attack is as follows:
Add a user to the domain and into the Exchange Windows Permissions user group
Add DCSync permissions for that user
This can be achieved using some Windows commands and Powerview:
Afterwards, we would basically have a new user to dump the administrator hash using secretsdump.py
thanks to DCSync permissions.
Then, we can Pass The Hash easily to gain access as the Administrator.