Cascade
https://app.hackthebox.com/machines/235
Last updated
https://app.hackthebox.com/machines/235
Last updated
Password: PentestEverything
Add "10.10.10.182 cascade.local" to /etc/hosts.
Starting out on this machine we run a simple nmap
script scan against LDAP
with null credentials.
Seeing as we are able to pull some information with the above command, we can try ldapseacher
with NULL
credentials know that we know the required domain information.
We find this spits out a serious amount of information. Ideally, we will run this against and identify some user accounts.
Now, with a list of users we can start trying to find ways into the accounts. First up, checking the target domain for users with 'Do not require Kerberos preauthentication'.
Unfortunately we get no results here...
I also attempted password spraying the accounts for quite some time. Again, nothing.
As LDAP
has spewed so much data with NULL
credentials I decided to look again, this time using a graphical explorer.
Where we can login using the following settings:
After some time of pouring through the results manually we come across an interesting attribute for the user r.thompson.
Decoding the Base64
value gives us a valid credential.
We now have the following credentials
We can see from the LDAP
results above r.thompson is not a member of the Remote Management Users group so WinRM
will not work here.
As the credentials are valid we can then try download the contents of selected shares.
Under /IT/Temp/s.smith/
we have a file called "VNC Install.reg"
.
We can see from the above image we have the above HEX value in the password field.
After a little bit of research on Google we find the value can be decrypted using the following command.
For the credentials:
We know from enumeration earlier that s.smith is a member of the AD group "Audit Share".
Knowing this, we can take a guess that they have access to the AUDIT$
SMB
share.
Opening the database from Audit.db
database file from the DB folder shows a Base64
encoded value for the ArkSvc user.
Of which, when, decoded appears to be encrypted.
To read the exe
and DLL
files included in the SMB
share we need to jump onto a Windows host and use dnSpy
.
Github: https://github.com/dnSpy/dnSpy/releases
Opening both CaseCrypto.dll
and CaseAudit.exe
in dnSpy we can obtain valuable information from both files when carefully reading the code.
This information can be plugged into the following website to reveal the encrypted string.
URL: https://www.devglan.com/online-tools/aes-encryption-decryption
For the credentials:
Where we can log in over WinRM
with Evil-WinRM
.
Looking at our group memberships we see we are a member of the group "AD Recycle Bin".
We can use the PowerShell
AD module to listed deleted users.
Credentials:
From enumerating the SMB
shares earlier we came across the following file from the Data share:
Meeting_Notes_June_2018.html
With this information we can then log in as the administrator account and grab the root flag.