Timelapse
nmap findings
nmap -p53,88,139,135,389,445,464,593,636,3268,3269,5986,9389,49667,49673,49674,49696,58232 -sV -sC -T4 -Pn -oA 10.10.11.152 10.10.11.152
Starting Nmap 7.93 ( https://nmap.org ) at 2023-08-03 07:03 +08
Nmap scan report for timelapse.htb (10.10.11.152)
Host is up (0.017s latency).
PORT STATE SERVICE VERSION
53/tcp open domain Simple DNS Plus
88/tcp open kerberos-sec Microsoft Windows Kerberos (server time: 2023-08-03 07:03:17Z)
135/tcp open msrpc Microsoft Windows RPC
139/tcp open netbios-ssn Microsoft Windows netbios-ssn
389/tcp open ldap Microsoft Windows Active Directory LDAP (Domain: timelapse.htb0., Site: Default-First-Site-Name)
445/tcp open microsoft-ds?
464/tcp open kpasswd5?
593/tcp open ncacn_http Microsoft Windows RPC over HTTP 1.0
636/tcp open tcpwrapped
3268/tcp open ldap Microsoft Windows Active Directory LDAP (Domain: timelapse.htb0., Site: Default-First-Site-Name)
3269/tcp open tcpwrapped
5986/tcp open ssl/http Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP)
|_ssl-date: 2023-08-03T07:04:46+00:00; +7h59m59s from scanner time.
|_http-server-header: Microsoft-HTTPAPI/2.0
| tls-alpn:
|_ http/1.1
|_http-title: Not Found
| ssl-cert: Subject: commonName=dc01.timelapse.htb
| Not valid before: 2021-10-25T14:05:29
|_Not valid after: 2022-10-25T14:25:29
9389/tcp open mc-nmf .NET Message Framing
49667/tcp open msrpc Microsoft Windows RPC
49673/tcp open ncacn_http Microsoft Windows RPC over HTTP 1.0
49674/tcp open msrpc Microsoft Windows RPC
49696/tcp open msrpc Microsoft Windows RPC
58232/tcp open msrpc Microsoft Windows RPC
Service Info: Host: DC01; OS: Windows; CPE: cpe:/o:microsoft:windowsSMB enum
smbclient
Using crackmap with 'fake user' and '' empty password
Accessing Shares
Zip cracking
fcrackzip
pfx2john
john
Use the passphrase to exrtract key and cert
decrypt the key using password set just now
dump the cert
Priv Esc
evil-winrm to get shell
-S- Enable SSL, because I’m connecting to 5986;-c legacyy_dev_auth.crt- provide the public key certificate-k legacyy_dev_auth.key- provide the private key-i timelapse.htb- host to connect to
Find powershell history (.bash_history in linux)
Reading its content contain password for svc_deploy
Reconnect using svc_deploy
found interesting group in whoami /all
LAPS_Readers seems to imply svc_deploy has access to read from LAPS.
With LAPS, the DC manages the local administrator passwords for computers on the domain. It is common to create a group of users and give them permissions to read these passwords, allowing the trusted administrators access to all the local admin passwords.
Read Password
To read the LAPS password, I just need to use Get-ADComputer and specifically request the ms-mcs-admpwd property:
login as administrator
finding and reading flags
Last updated