Flight
Active Directory Machine that requires good enumeration techniques to find the vulnerabilities.
Active Directory Machine that requires good enumeration techniques to find the vulnerabilities.
As usual, we begin with our enumeration process.
Loads of ports open as per a normal AD machine. Nothing about the SMB shares was found.
When viewing the website, we can see the bottom of the page to get a possible domain.
With this, we could fuzz out some hidden vhosts on the machine with gobuster. Turns out there is a school.flight.htb
present. We can add both of these into our hosts file and proceed to enumerate the school website.
When clicking the about us page, we can see the URL and find that it might contain a LFI or RFI. This is because a .php page that has a ?view parameter has generally always been suspicious in HTB.
We can set up a quick Python server and check this URL to find that we can receive a hit from the server.
Since this is a AD machine, perhaps we can get some shares and intercept the response using Responder.
We can crack this easily using John.
With these credentials, we can view the shares that are present on this machine.
The ones to investigate are Users, Web and Shared.
In users, we can find that there is C.Bum user.
We can't do anything with that directory, though. The rest of the directories contain nothing of interest at all. Web only contains source code for the websites that also have nothing, while Shared was empty.
At this point, I was stuck for quite a while. Went back to enumeration of possible SMB server version vulnerablities. The credentials cannot be used to login as well, so there has to be anotehr set of credentials elsewhere.
I was thinking if it was possible to intercept some kind of reponse to retrieve more credentials, when I remembered about cetain expliots using the Desktop.ini file. What this file does is essentially contain the information regarding the icons used on the desktop, and we seem to be able to download and replace this for this machine.
As such, the next step was to replace this file with our own malicious file to make it query our responder share to intercept another hash.
Based on that, we can create our own malicious .ini file and replace the one that is in the Shared share.
However, I cannot put this file on the directory using svc_apache, so we would need to enumerate some other users first.
Crackmapexec can enumerate users using the credentials we found.
Then we can gather these users into a file and brute force, checking for any password re-use. We can find that the S.Moon user seems to work.
Now, we can upload our file as S.Moon and proceed to retrieve the hash.
Cracking, the hash, we get C.Bum's password.
We still cannot evil-winrm in, so we need to find another way. In the meantime, one can capture the flag using the c.bum credentials to access his desktop.
Since we do have another share called Web, perhaps we can upload a simple web shell as C.bum onto it to achieve some form of RCE.
I tried this method using a cmd.php basic web shell.
This works in getting me a shell as svc_apache.
I guess we can just get a reverse shell as svc_apache. Use whatever method you'd like, I decided for the lazy nc.exe method.
As this user, because we have credentials for another user, we can use the runas.exe binary to gain RCE as C.Bum and proceed from there.
We would receive a shell as c.bum on whatever port we are on.
Now that we are c.bum, we can look around this machine.
Within the C:\inetpub directory, there's an interesting folder called development.
This was interesting as it suggested that perhaps there was another port listening on the localhost. Sure enough, there was a service listening on port 8000 that was not detected by nmap earlier.
When curled, it reveals a webpage tha matches the index.html file in the development server. For now, we can do some port forwarding to access it.
For this machine, I used chisel to tunnel and we can access the website on 127.0.0.1:8000.
When viewing the web service, we can see that there are errors because there is no default configuration for this IIS server.
Since this is an IIS server, we can actually generate a aspx reverse shell using MSFVenom and upload it to that directory to gain another reverse shell.
Then, upload this to the website through wget and put it within the C:\inetpub\development directory which can be accessed through the chisel server.
Afterwards, we would receive a shell as another service account.
A quick check on the privileges of this user reveals we have the SeImpersonatePrivilege.
There are no printers on this machine, so we have to go with JuicyPotato to impersonate the administrator and finish this machine. The usage of PrintSpoofer does not work on this machine.
For this machine, I used JuicyPotatoNG, which is sort of a faster version of the default JuicyPotato exploit.
Then, we can easily become the administrator!
This machine was really long, but really interesting as well. Simple exploits that required a bit more enumeration and time then the average.