Sauna

Gaining Access

Nmap scan:

$ nmap -p- --min-rate 5000 10.129.95.180
Starting Nmap 7.93 ( https://nmap.org ) at 2023-05-06 07:23 EDT
Nmap scan report for 10.129.95.180
Host is up (0.0067s latency).
Not shown: 65515 filtered tcp ports (no-response)
PORT      STATE SERVICE
53/tcp    open  domain
80/tcp    open  http
88/tcp    open  kerberos-sec
135/tcp   open  msrpc
139/tcp   open  netbios-ssn
389/tcp   open  ldap
445/tcp   open  microsoft-ds
464/tcp   open  kpasswd5
593/tcp   open  http-rpc-epmap
636/tcp   open  ldapssl
3268/tcp  open  globalcatLDAP
3269/tcp  open  globalcatLDAPssl
5985/tcp  open  wsman
9389/tcp  open  adws
49667/tcp open  unknown
49673/tcp open  unknown
49674/tcp open  unknown
49676/tcp open  unknown
49685/tcp open  unknown
49692/tcp open  unknown

Let's investigate port 80.

SMB + LDAP Enum

enum4linux reveals nothing. However, an nmap scan to enumerate LDAP does reveal the domain to us.

It seems the domain is EGOTISTICAL-BANK.LOCAL.

Bank Usernames -> ASREP-Roast

This was a bank company website:

At the bottom, we can 'Meet The Team':

Using these names, we can make use of usernamer.py to generate possible usernames for the machine:

We can use getNPUsers.py with our possible usernames and see if we get a hash.

We can crack this hash easily.

Afterwards, we can get a shell using evil-winrm.

Grab the user flag.

Privilege Escalation

AutoLogon Creds

I ran a WinPEAS scan to enumerate for me. There, I found some AutoLogon credentials for the user.

We can login as this user using evil-winrm, but there's not much there for us.

BloodHound

I enumerated the system using BloodHound using FSmith credentials.

After uploading the data, we can see what privileges this user has, and find out that he has DCSync privileges over the DC.

This means we can use secretsdump.py to read the hashes of the entire machine.

Then, just pass the hash using evil-winrm to get an administrator shell.

Last updated