Fusion Corp
https://tryhackme.com/room/fusioncorp
Nmap
Starting off I attempted basic SMB
enumeration and was unable to enumerate any meaningful information. From here I moved to LDAP
and used the Nmap
script shown below to pull domain information.
From this we ascertain the domain name is 'Fusion.Corp'. From this we can start enumerating Kerbeos.
Kerberos
Install Kerbrute: https://github.com/ropnop/kerbrute
Storing the discovered users in a file called 'asrep-hashes'. I then run GetNPUsers from Impacket against both the discovered usernames in order to retrieve Kerberos hashes.
Viewing the contents of asrep-hashes we see we have a hash for the user lparker.
Running this against Hashcat shows we soon crack the password.
We are then able to utilize the credentials against port 5985 with Evil-WinRM.
After grabbing the user flag on the Desktop I started working through basic enumeration. First checking local user accounts we see some interesting information for the user jmurphy.
We are then able to login with Evil-WinRM using the new credentials.
Again, the user flag can be grabbed from the Desktop. From here and as per the above image we see we have the privilege 'SeBackupPrivilege'.
This privilege grants us the ability to create backups of files on the system. Knowing this a high value file would be the ntds.dit file which is a database of hashes for domain objects / users. As the ntds.dit file is in constant use we will be unable to create a backup using normal methods as the system will lock the file.
What we can do instead is create a Distributed Shell File (DSH). This file will contain the appropriate commands for us to run the diskshadow utility against the C: drive and ultimately the ntds.dit file.
First created a file called viper.dsh
on the attacking machine. Then insert the following contents:
Once completed use the command unix2dos
to convert the file to DOS format.
Then on the target system create a directory called 'temp' in c:\temp.
After this upload the viper.dsh
file.
From here run the following commands:
From here we need to extract the SYSTEM hive which will be required for extracting the hashes with Impacket later.
From here we can use the download command to download the ntds.dit and system hive file.
Back on the attacking machine use the following command with Impacket to extract the hashes from ntds.dit.
From here we have the Administrator hash which can be used to login to the target system with Evil-WinRM.
We are now Administrator on the Domain Controller and can grab the final flag from the Desktop.
Last updated