From iDRAC to domain administrator.
by rumprump111 - Friday March 14, 2025 at 03:06 PM
#1
Well, the other day I participated in an interesting penetration test and implemented an interesting way to escalate privileges to Domain Administrator. So I decided to replicate the scenario on my own bench to share this interesting way with fellow pentesters who can replicate this path.

Let's start by defining what is iDRAC? Let's use an artificial intelligence-generated clue: “The Dell Integrated Remote Access Controller (iDRAC) is a tool that allows IT administrators to remotely or locally manage, monitor, and upgrade Dell PowerEdge servers. The iDRAC is a mainboard management controller built into Dell servers that includes both hardware and software.” Essentially, with it, you have the ability to control your virtual machine!

Typically, these interfaces are login and password protected, but pentests can reveal that default credentials are being used or there are vulnerable IPMI v2.0 password hashes. So, let's say you found the default credentials, which are usually root:calvin, or let's say you cracked a hash obtained through a vulnerability in IPMI. What's next? For reference, once you have successfully logged into iDRAC, you will see the following:
https://habrastorage.org/r/w1560/getpro/...526467.png

When you look at the screen above, what do you think your options are? How about waiting for the administrator to click on the virtual console screen in the lower right corner and log in so you can take advantage of this? Acceptable method, but we want to achieve the highest level of privileges in Active Directory. So let's make it happen!

If you have any experience with back-end infrastructure, you know that you can reset the built-in Windows Server administrator account using utilman. Now let's go back to the screenshot above. We can see that this is a Windows Server 2016 operating system, with the same Windows architecture, just on a different platform. So, if we apply the utilman reset method to it, then in theory, it should work, right? Let's get started!

The iDRAC architecture requires that we plug in virtual media to perform this reset. Let's download an ISO image of Windows Server 2016, and then plug it into our operating system in iDRAC. I've added a few marks to the screenshot so you can see the steps to take after successfully downloading the ISO.

1) Load.

2) We mark it up.

3) Then we close the dialog.

https://habrastorage.org/r/w1560/getpro/...d4c029.png

Now that we've done that, let's click on “Boot Сontrols” and select the highlighted option below. This tells iDRAC to boot from the ISO we just added:
https://habrastorage.org/r/w1560/getpro/...939f8c.png

Shutting down the system:

https://habrastorage.org/r/w1560/getpro/...df9eaa.png

Reboot and you will encounter a screen like the screenshot below, where we will click the highlighted option:
https://habrastorage.org/r/w1560/getpro/...b20726.png

We will then be presented with another screen, we will click on the highlighted option below:
https://habrastorage.org/r/w1560/getpro/...b0086a.png

We should end up here (make sure you're in the right directory):
https://habrastorage.org/r/w1560/getpro/...df0c31.png

Now let's go to the system32 directory and run some commands. Please take a look at the screenshot below:
https://habrastorage.org/r/w1560/getpro/...f27fb8.png

Let me tell you about what we do:
ren utilman.exe utilman.123

We're renaming our utilman.exe to utilman.123, essentially we're backing it up so we can bring it back once we complete our task.

copy cmd.exe utilman.exe

Now we take and replace utilman.exe with the command line (cmd.exe).

When this is done, type “exit” and boot Windows normally. Once this is done, you should end up here:

https://habrastorage.org/r/w1560/getpro/...f03406.png

Click on the highlighted option, and now your Special Features option should bring up a command prompt where we will reset the built-in administrator account:

https://habrastorage.org/r/w1560/getpro/...bbb188.png

If you are facing a domain controller, just add /domain to the end of the command we entered. Now let's enter the new password and see if we log in:

https://habrastorage.org/r/w1560/getpro/...fcd7d8.png

If you were lucky and it was a domain controller, you are now a domain administrator and can continue to enjoy the pentest. Honestly, for obvious reasons, you shouldn't be doing this on a domain controller during a pentest.

I wasn't so lucky. In my case, it was a domain-joined machine. With the hope that domain admins sometimes interact with it, I downloaded mimikatz and tried to get the domain admin hash:
https://habrastorage.org/r/w1560/getpro/...7b0c25.png

Take that hash and log in to the domain controller, congratulations, you are a domain administrator:

https://habrastorage.org/r/w1560/getpro/...074ade.png

Keep in mind that there are other options (like DCSync). It's entirely up to you.

I have omitted some steps. For example, as we know, during testing we may encounter security tools that can hinder us. You will have to use your skills to bypass them and run the necessary tools (such as mimikatz) to get to the target. This was one of the problems I encountered. Also, to keep the blog from getting too long, I eliminated the step of undoing the changes I made.

Have a great hack!
Reply
#2
Nice attack chain
Reply


Possibly Related Threads…
Thread Author Replies Views Last Post
  Payloads Collection. rumprump111 23 1,655 5 hours ago
Last Post: soso0102
  Decrypt Argon format? dai5 0 250 May 04, 2026, 04:02 PM
Last Post: dai5
  Making $100K+ daily - Crypto Drainers Bleuxy 233 17,068 May 03, 2026, 09:04 PM
Last Post: lordrings10
  I NEED SOMEONE GOOD WITH REVERSING otizimlicocukk 0 271 May 01, 2026, 07:18 PM
Last Post: otizimlicocukk
  Tools for debugging mobile API's jahy 116 23,806 Feb 09, 2026, 04:23 PM
Last Post: k3ithW

Forum Jump:


 Users browsing this forum: 1 Guest(s)