Sekhmet - HTB [Discussion]
by - Thursday, January 1, 1970 at 12:00 AM
(September 24, 2022, 01:02 AM)meowmeowattack Wrote:
(September 24, 2022, 12:43 AM)onl1_f4ns Wrote: Any ideas from bob.wood to admin ? I tried GPO, ACLs, some exploits... winpeas... and nothing yet. Anything?

I think that is a final step. Also interesting
 Computer Name           :   HOPE
   User Name               :   Bob.Wood
   User Id                 :   2761
   Is Enabled              :   True
   User Type               :   User
   Comment                 :
   Last Logon              :   9/23/2022 3:20:18 AM
   Logons Count            :   93
   Password Last Set       :   5/2/2022 12:42:15 PM


   Computer Name           :   HOPE
   User Name               :   bob.woodadm
   User Id                 :   5101
   Is Enabled              :   True
   User Type               :   Administrator
   Comment                 :
   Last Logon              :   1/1/1970 12:00:00 AM
   Logons Count            :   0
   Password Last Set       :   5/4/2022 7:43:11 PM

Computer Name           :   HOPE
   User Name               :   luis.jacksonADM
   User Id                 :   5102
   Is Enabled              :   True
   User Type               :   Administrator
   Comment                 :
   Last Logon              :   1/1/1970 12:00:00 AM
   Logons Count            :   0
   Password Last Set       :   5/4/2022 7:44:09 PM

but how to get it..


same here. after going through the journey so far, i feel this box doesn't really involve any technically difficult barrier, but a lot of things are customised in a unfriendly manner. so i bet it would take some time to find out what what's the next customisation.


yeah...also windefender is acting on the box and prevents a lot of stuff. That sucks..
I'm now running winpspy to collect some more intell -> https://github.com/xct/winpspy

and i wanna take s screenshot on the box. You're right about customizations and we might not expect something strange again.
Reply
noice!
Reply
Can you verify please that this Getscreen.me is also onyou box instance? Though can't get anything from it.. still digging.
Listing: C:\ProgramData
=======================

Mode              Size    Type  Last modified              Name
----              ----    ----  -------------              ----
040777/rwxrwxrwx  0      dir  2022-04-28 13:59:43 -0600  Application Data
040777/rwxrwxrwx  0      dir  2022-04-28 13:59:43 -0600  Desktop
040777/rwxrwxrwx  0      dir  2022-04-26 03:29:06 -0600  DockerDesktop
040777/rwxrwxrwx  0      dir  2022-04-28 13:59:43 -0600  Documents
040777/rwxrwxrwx  0      dir  2022-05-01 08:59:17 -0600  Getscreen.me
040777/rwxrwxrwx  8192    dir  2022-08-18 08:49:47 -0600  Microsoft
040777/rwxrwxrwx  4096    dir  2022-08-24 04:12:54 -0600  Package Cache
040777/rwxrwxrwx  0      dir  2021-05-08 02:20:24 -0600  SoftwareDistribution
040777/rwxrwxrwx  0      dir  2022-04-28 13:59:43 -0600  Start Menu
040777/rwxrwxrwx  0      dir  2022-04-28 13:59:43 -0600  Templates
040777/rwxrwxrwx  0      dir  2022-04-28 14:56:28 -0600  USOPrivate
040777/rwxrwxrwx  0      dir  2021-05-08 02:20:24 -0600  USOShared
040777/rwxrwxrwx  4096    dir  2021-08-30 13:49:28 -0600  VMware
100444/r--r--r--  279366  fil  2022-09-20 16:12:01 -0600  ntuser.pol
040777/rwxrwxrwx  0      dir  2022-09-24 14:51:17 -0600  regid.1991-06.com.microsoft
040777/rwxrwxrwx  0      dir  2021-05-08 03:35:49 -0600  ssh

meterpreter > ls Getscreen.me\\logs\\
Listing: Getscreen.me\logs\
===========================

Mode              Size  Type  Last modified              Name
----              ----  ----  -------------              ----
100666/rw-rw-rw-  14902  fil  2022-05-01 09:13:03 -0600  20220501.log

migrated to several processes and don't have access to the desktop to make a screenshot.

There's also docker auxiliary utils and not so much yet.
Reply
Perhaps there's something with the WINDCORP\Adminusers and WINDCORP\IT group memberships.
Reply
(September 25, 2022, 06:02 AM)Exa Wrote: Perhaps there's something with the WINDCORP\Adminusers and WINDCORP\IT group memberships.


Try to dig in browsers.. Smth there :)
Reply
i would like to know what is next step....

i got the smb ... with the .lnk and ps1 but i know that cifs/hope isn't writebale ..
Reply
in IT@WINDCORP there's also some extra policies set. if you know how to baypass protection, then you may execute an attack against DC to dump hashes.
Reply
(September 14, 2022, 10:17 AM)meowmeowattack Wrote: in the cve-2019-19886 article, you can find a cookie bypass introduced.

structure your payload this way:

app=$cookie_app;profile=$(echo 'node_js_rce_payload'|base64 -w0)=<original-profile-content>


anyone able to confirm if the next step after getting a shell to webster is to crack the backup.zip file or not?

by browsing the contents of the backup.zip (password protected but paths/names are visible), it seems the contents can be further used for kerberos related attacks and from the login history of webster, the last login was from hope.windcorp.htb

yet, i'm not certain if the immediate next step after receiving a shell is to crack the backup.zip or not. cause many wordlists didn't work. also tried mangling some leet forms of potential keywords. 

i also found cracklib used for preventing the user to use common words as password. but this is considered a deny list, not an allow list that can be used for mangling password lists. 

thanks in advance

bro how you got the shell i still searching but i got only for dos attack
Reply
(September 25, 2022, 06:55 PM)Mr_Unkn0wn Wrote:
(September 25, 2022, 06:02 AM)Exa Wrote: Perhaps there's something with the WINDCORP\Adminusers and WINDCORP\IT group memberships.


Try to dig in browsers.. Smth there :)


Thanks for the hint.

I see there is a saved login (Edge) for bob.woodADM. Trying to decrypt that database entry now.


(September 26, 2022, 07:13 AM)lamehacker Wrote:
(September 14, 2022, 10:17 AM)meowmeowattack Wrote: in the cve-2019-19886 article, you can find a cookie bypass introduced.

structure your payload this way:

app=$cookie_app;profile=$(echo 'node_js_rce_payload'|base64 -w0)=<original-profile-content>


anyone able to confirm if the next step after getting a shell to webster is to crack the backup.zip file or not?

by browsing the contents of the backup.zip (password protected but paths/names are visible), it seems the contents can be further used for kerberos related attacks and from the login history of webster, the last login was from hope.windcorp.htb

yet, i'm not certain if the immediate next step after receiving a shell is to crack the backup.zip or not. cause many wordlists didn't work. also tried mangling some leet forms of potential keywords. 

i also found cracklib used for preventing the user to use common words as password. but this is considered a deny list, not an allow list that can be used for mangling password lists. 

thanks in advance

bro how you got the shell i still searching but i got only for dos attack


In another reply someone posted this link:

https://opsecx.com/index.php/2017/02/08/exploiting-node-js-deserialization-bug-for-remote-code-execution/
Reply
(September 26, 2022, 07:20 AM)Exa Wrote: I see there is a saved login (Edge) for bob.woodADM. Trying to decrypt that database entry now.



You are in good way.
Just decrypt it then you can connect with bob.woodADM using evil-winrm then get the root flag.
Reply


 Users viewing this thread: Sekhmet - HTB [Discussion]: No users currently viewing.