Breaching Active Directory

Room Link: https://tryhackme.com/room/breachingad

Introduction to AD Breaches

Kali

systemd-resolve --interface breachad --set-dns $THMDCIP --set-domain za.tryhackme.com
nslookup thmdc.za.tryhackme.com

NTLM Authenticated Services

Kali

unzip passwordsprayer.zip 
python /root/Rooms/BreachingAD/task3/ntlm_passwordspray.py -u usernames.txt -f za.tryhackme.com -p Changeme123 -a "http://ntlmauth.za.tryhackme.com"

LDAP Bind Credentials

Kali

Hosting a Rogue LDAP Server

Kali

Kali

olcSaslSecProps.ldif

The file has the following properties:

  • olcSaslSecProps: Specifies the SASL security properties

  • noanonymous: Disables mechanisms that support anonymous login

  • minssf: Specifies the minimum acceptable security strength with 0, meaning no protection.

Now we can use the ldif file to patch our LDAP server using the following:

Kali

Before

After

Capturing LDAP Credentials

Our rogue LDAP server has now been configured. When we click the "Test Settings" at http://printer.za.tryhackme.com/settings.aspx, the authentication will occur in clear text. If you configured your rogue LDAP server correctly and it is downgrading the communication, you will receive the following error: "This distinguished name contains invalid syntax". If you receive this error, you can use a tcpdump to capture the credentials using the following command:

Kali

Authentication Relays

Kali

Kali

Microsoft Deployment Toolkit

Kali

Victim

Victim

Victim

Victim

Victim

Configuration Files

Victim

Victim

Kali

Kali

Kali

a

Last updated