Red Team Capstone Challenge

Project Registration

The Trimento government mandates that all red teamers from TryHackMe participating in the challenge must register to allow their single point of contact for the engagement to track activities. As the island's network is segregated, this will also provide the testers access to an email account for communication with the government and an approved phishing email address, should phishing be performed.

To register, you need to get in touch with the government through its e-Citizen communication portal that uses SSH for communication. Here are the SSH details provided:

SSH Username

e-citizen

SSH Password

stabilitythroughcurrency

SSH IP

X.X.X.250

Kali

ssh e-citizen@X.X.X.250
Password: stabilitythroughcurrency

Scanning

Web - Scanning

Kali

Scan all ports

No other ports found.

Kali

Web - HTTP port 80

This ran for the majority of the time I was working on the box, I found the wordpress and checked robots.txt manually and the scan didn't really find anything of interest.

Kali

Looking for php files we found the info file which can be used to find info about the server.

Kali

Manually looking around there is a meet the team page, when clicking on the images we can see the folder holding all their pictures with their names, potentially could be usernames.

Output - users.txt

Admin Panel

http://10.200.119.13/october/index.php/backend/backend/auth/signinarrow-up-right

Kali

WebMail - Scanning

Kali

Scan all ports

Kali

WebMail - HTTP port 80

Nothing found

Kali

Evolution

Kali

Bruteforce SMTP

Add domain to end of every username

Kali

Kali

Add the following to the bottom of john.conf

john.conf

Kali

Kali

Evolution - laura.wood@corp.thereserve.loc

Email sent to emily.harvey@corp.thereserve.loc

Evolution - mohammad.ahmed@corp.thereserve.loc

Email sent to mohammad.ahmed@corp.thereserve.loc

VPN - Scanning

Kali

Scan all ports

OpenVPN port potentially found

Kali

VPN - HTTP port 80

Kali

vpn folder has a .ovpn file.

Had to change the IP in the ovpn file but if I see the correct subnet.

Kali

If I type my username and password provided I get a login error but if I try with a fake account with no password set I can bypass the login and download a ovpn file

It appears to work

Kali

Kali

Kali

Reverse shell

Kali

Burp Request

Victim

LinPeas

Kali

Victim

Privlege Escalation

Kali

passwd

Victim

Victim

MySQL

Victim

mysql

Pivot

Kali

Victim

Kali

Kali

proxychains.conf

Scanning other hosts

Victim

Hosts that are up

WebMail- Scanning

Kali

Scan all ports

Kali

We now have access to our mailbox

The following email is in my inbox

10.200.119.21

Kali

Kali

Remmina

Remmina

Remmina

10.200.89.21

scanned from VPN server after rooting

Pivot

10.200.89.22

scanned from VPN server after rooting

10.200.89.31

scanned from VPN server after rooting

Secretdump

Kali

Output

Secretdump - domain controller

Kali

Output

10.200.89.32

scanned from VPN server after rooting

10.200.89.51

scanned from VPN server after rooting

All ports filtered or issue with server.

10.200.89.52

scanned from VPN server after rooting

All ports filtered or issue with server.

10.200.89.61

scanned from VPN server after rooting

All ports filtered or issue with server.

10.200.89.100

scanned from VPN server after rooting

10.200.89.102

scanned from VPN server after rooting

We are able to login because we had the hash already. This is a powershell cmd

Kali

This is just cmd

Kali

Kali

Download Mimikatz

Kali

Victim(VPN)

Turn off Windows Defender to download mimikatz

Victim(CORPDC)

Victim(mimikatz)

Output

Get SID of the domain

Victim(Powershell)

Get SID of the Administrator account

Victim(Powershell)

Victim(mimikatz)

We now have access to the rootdc

Victim(Powershell)

Download Psexec

Link: https://learn.microsoft.com/en-us/sysinternals/downloads/psexecarrow-up-right

Kali

Victim(VPN)

Turn off Windows Defender to download mimikatz

Victim(CORPDC)

RootDC

Invoke-SMBExec Script

CORPDC

For some reason I couldn't use this from the script so added manually

ROOTDC

I can now login to the ROOTDC with RDP and from ROOTDC I can login to BANKDC

ROOTDC -> BANKDC

If RDP session flashes black you can kill the sessions for BANKDC to ROOTDC

Troubleshooting

BankDC

Creds found

Last updated