Breaching Active Directory
Room Link: https://tryhackme.com/room/breachingad
Introduction to AD Breaches
Kali
systemd-resolve --interface breachad --set-dns $THMDCIP --set-domain za.tryhackme.com
nslookup thmdc.za.tryhackme.comNTLM Authenticated Services
Kali
unzip passwordsprayer.zip
python /root/Rooms/BreachingAD/task3/ntlm_passwordspray.py -u usernames.txt -f za.tryhackme.com -p Changeme123 -a "http://ntlmauth.za.tryhackme.com"
LDAP Bind Credentials
Kali


Hosting a Rogue LDAP Server
Kali


Kali
olcSaslSecProps.ldif
The file has the following properties:
olcSaslSecProps: Specifies the SASL security properties
noanonymous: Disables mechanisms that support anonymous login
minssf: Specifies the minimum acceptable security strength with 0, meaning no protection.
Now we can use the ldif file to patch our LDAP server using the following:
Kali
Before

After

Capturing LDAP Credentials
Our rogue LDAP server has now been configured. When we click the "Test Settings" at http://printer.za.tryhackme.com/settings.aspx, the authentication will occur in clear text. If you configured your rogue LDAP server correctly and it is downgrading the communication, you will receive the following error: "This distinguished name contains invalid syntax". If you receive this error, you can use a tcpdump to capture the credentials using the following command:

Kali


Authentication Relays
Kali



Kali

Microsoft Deployment Toolkit
Kali
Victim
Victim
Victim
Victim
Victim
Configuration Files
Victim
Victim
Kali
Kali

Kali

a
Last updated