TAKEOVER-2
Document Reference
Description
Hierarchy takeover via NTLM coercion and relay to SMB on remote site database
Requirements
PKI certificates are not required for client authentication (default)
SCCM database server hosted on a system that is independent of the main site server
SMB is reachable and SMB signing isn’t required on the site database server
Local Administrator if performing the attack from Windows (due to SMB port redirect)
Tools Required
divertTCPConn: https://github.com/Arno0x/DivertTCPconn
Windows
Divert SMB on port 445 to port 8445 (Requires Local Administrator)
Set up ntlmrelayx to the alternate SMB port and to point at the MSSQL database server
Perform the coercerian with SharpEFSTrigger to relay the SCCM Site Server computer account to the MSSQL database server.
Getting a full shell on Windows with Amnesiac
Amnesiac: https://github.com/Leo4j/Amnesiac
Load Amnesiac through PowerShell
Generate a global listener payload with option [2]
Use the payload within ntlmrelayx to be executed on the target system.
Once we trigger coercion again, ntlmrelayx will execute the powershell payload on the target system. Once this is done, use option [3] on Amnesiac to connect.
Defensive IDs
Last updated