HTB - Rebound
by HerVelizy - Saturday September 9, 2023 at 07:09 PM
#21
(Sep 11, 2023, 12:22 AM)killinginthenameof Wrote:
(Sep 11, 2023, 12:02 AM)zer0 Wrote:
(Sep 10, 2023, 10:20 PM)Whatever911 Wrote: Well yes, you need to find that users' hash and crack it, then use its credentials.

But the question remains, what after that? How to proceed towards foothold?

1. Check which user has permissions on a group called ServiceMgmt
Example

2. Check which permissions that group has on another domain object (OU)
3. Abuse permissions on said object to reset the password of some account that can access the server.
4. Foothold secured.

Maybe use a windows vm for those tasks. Powersploit, Powerview are nice to have.

are the hashese crackable? i've tried the ones retrieved with asreproasting and no success so far

Hash for user ldap_monitor is crackable using rockyou. 
Can be obtained using this method:
https://www.thehacker.recipes/ad/movemen...entication
Reply
#22
(Sep 11, 2023, 01:05 AM)zer0 Wrote:
(Sep 11, 2023, 12:22 AM)killinginthenameof Wrote:
(Sep 11, 2023, 12:02 AM)zer0 Wrote:
(Sep 10, 2023, 10:20 PM)Whatever911 Wrote: Well yes, you need to find that users' hash and crack it, then use its credentials.

But the question remains, what after that? How to proceed towards foothold?

1. Check which user has permissions on a group called ServiceMgmt
Example

2. Check which permissions that group has on another domain object (OU)
3. Abuse permissions on said object to reset the password of some account that can access the server.
4. Foothold secured.

Maybe use a windows vm for those tasks. Powersploit, Powerview are nice to have.

are the hashese crackable? i've tried the ones retrieved with asreproasting and no success so far

Hash for user ldap_monitor is crackable using rockyou. 
Can be obtained using this method:
https://www.thehacker.recipes/ad/movemen...entication

does it take longer than usual or? i've tried running all the hashes retrieved with that command and they were taking more than 1h30
Reply
#23
(Sep 11, 2023, 01:15 AM)killinginthenameof Wrote:
(Sep 11, 2023, 01:05 AM)zer0 Wrote:
(Sep 11, 2023, 12:22 AM)killinginthenameof Wrote:
(Sep 11, 2023, 12:02 AM)zer0 Wrote:
(Sep 10, 2023, 10:20 PM)Whatever911 Wrote: Well yes, you need to find that users' hash and crack it, then use its credentials.

But the question remains, what after that? How to proceed towards foothold?

1. Check which user has permissions on a group called ServiceMgmt
Example

2. Check which permissions that group has on another domain object (OU)
3. Abuse permissions on said object to reset the password of some account that can access the server.
4. Foothold secured.

Maybe use a windows vm for those tasks. Powersploit, Powerview are nice to have.

are the hashese crackable? i've tried the ones retrieved with asreproasting and no success so far

Hash for user ldap_monitor is crackable using rockyou. 
Can be obtained using this method:
https://www.thehacker.recipes/ad/movemen...entication

does it take longer than usual or? i've tried running all the hashes retrieved with that command and they were taking more than 1h30

It is quick. Are you sure you don't have carriage return at the end of each line ?
Reply
#24
any nudge after json dump?
Reply
#25
anyone get bloodhound working? tried it on linux and windows over ldaps but seems ldap signing is preventing it. wondering if anyone got round it?
Reply
#26
(Sep 11, 2023, 08:13 AM)IXNovaticula Wrote:
(Sep 10, 2023, 10:08 PM)pollero Wrote:
(Sep 10, 2023, 07:28 PM)lucius222 Wrote:
(Sep 10, 2023, 07:20 PM)Whatever911 Wrote:
(Sep 10, 2023, 06:40 PM)lucius222 Wrote: i'm getting auth errors with this, wtf
can you use crackmapexec ldap with ldap_monitor pass?
Did you install all requirements for LDAPmonitor? Does your command work?

└─$ sudo apt-get install build-essential python-dev-is-python3 python3-dev python2.7-dev libldap2-dev libsasl2-dev slapd ldap-utils tox lcov valgrind

└─$ pip install python-ldap   

when i run it with -k i'm getting
ldap3.core.exceptions.LDAPSocketOpenError: invalid server address

without -k
ldap3.core.exceptions.LDAPBindError: automatic bind not successful - invalidCredentials

Also: i tried a password spray and i got another user, but still can't access anything

Perhaps you need credentials.

I cracked the hash for ldap_monitor using hashcat and i'm trying to use those creds but still getting the same error.

The hascat mode is 19700 and the wordlist is rockyou.txt right? why am i not able to crack it
Reply
#27
hashcat -m 13100 for ldap_monitor user

This forum account is currently banned. Ban Length: Permanent (N/A Remaining)
Ban Reason: Scraping | https://breachforums.ai/Forum-Ban-Appeals if you feel this is incorrect.
Reply
#28
(Sep 11, 2023, 09:55 AM)genega Wrote: anyone get bloodhound working? tried it on linux and windows over ldaps but seems ldap signing is preventing it. wondering if anyone got round it?

https://gist.github.com/vestjoe/68b579d0...55908883cc
Reply
#29
(Sep 11, 2023, 05:42 AM)HerVelizy Wrote:
(Sep 11, 2023, 01:15 AM)killinginthenameof Wrote:
(Sep 11, 2023, 01:05 AM)zer0 Wrote:
(Sep 11, 2023, 12:22 AM)killinginthenameof Wrote:
(Sep 11, 2023, 12:02 AM)zer0 Wrote: 1. Check which user has permissions on a group called ServiceMgmt
Example

2. Check which permissions that group has on another domain object (OU)
3. Abuse permissions on said object to reset the password of some account that can access the server.
4. Foothold secured.

Maybe use a windows vm for those tasks. Powersploit, Powerview are nice to have.

are the hashese crackable? i've tried the ones retrieved with asreproasting and no success so far

Hash for user ldap_monitor is crackable using rockyou. 
Can be obtained using this method:
https://www.thehacker.recipes/ad/movemen...entication

does it take longer than usual or? i've tried running all the hashes retrieved with that command and they were taking more than 1h30

It is quick. Are you sure you don't have carriage return at the end of each line ?

I did check yes. with hashcat i used module 19700, not sure if this is the correct one, although recognized by hashcat. I've trying to crack the hashes from the asrep roast - i did get one for the use jjones but could not find any cleartext password
Reply
#30
(Sep 11, 2023, 12:14 PM)0001 Wrote:
(Sep 10, 2023, 10:50 PM)pollero Wrote: Can you explain me my error?, got an unexpected keyword argument 'service':

python ./GetUserSPNs.py -no-preauth "ldap_monitor" -usersfile "services.txt" -dc-host 10.129.x.x rebound.htb/ -request
Impacket v0.10.1.dev1+20220628.224634.5122bcf - Copyright 2022 SecureAuth Corporation

[-] Principal: dc01 - getKerberosTGT() got an unexpected keyword argument 'service'
[-] Principal: ldap/dc01.rebound.htb - getKerberosTGT() got an unexpected keyword argument 'service'
[-] Principal: ldap/dc01 - getKerberosTGT() got an unexpected keyword argument 'service'
[-] Principal: ldap_monitor/dc01 - getKerberosTGT() got an unexpected keyword argument 'service'
[-] Principal: ldap_monitor/DC01 - getKerberosTGT() got an unexpected keyword argument 'service'
[-] Principal: ldap_monitor/dc01.rebound.htb - getKerberosTGT() got an unexpected keyword argument 'service'
[-] Principal: ldap_monitor/DC01.rebound.htb - getKerberosTGT() got an unexpected keyword argument 'service'
[-] Principal: cifs/dc01.rebound.htb - getKerberosTGT() got an unexpected keyword argument 'service'
[-] Principal: cifs/dc01 - getKerberosTGT() got an unexpected keyword argument 'service'
[-] Principal: srv01 - getKerberosTGT() got an unexpected keyword argument 'service'
[-] Principal: winrm/dc01 - getKerberosTGT() got an unexpected keyword argument 'service'
[-] Principal: winrm/dc01.rebound.htb - getKerberosTGT() got an unexpected keyword argument 'service'

Did you figure out the error , I'm getting the same error and don't know why .

I got the same problem.

$ /opt/impacket-nopass/examples/GetUserSPNs.py -no-preauth jjones -usersfile ./services.txt -dc-host dc01.rebound.htb -request rebound.htb/
Impacket v0.9.24 - Copyright 2021 SecureAuth Corporation

[-] Principal: srv01 - getKerberosTGT() got an unexpected keyword argument 'service'
[-] Principal: cifs/dc01.rebound.htb - getKerberosTGT() got an unexpected keyword argument 'service'
[-] Principal: cifs/dc01 - getKerberosTGT() got an unexpected keyword argument 'service'
[-] Principal: winrm/dc01 - getKerberosTGT() got an unexpected keyword argument 'service'
[-] Principal: winrm/dc01.rebound.htb - getKerberosTGT() got an unexpected keyword argument 'service'
[-] Principal: ldap/dc01 - getKerberosTGT() got an unexpected keyword argument 'service'
[-] Principal: ldap/dc01.rebound.htb - getKerberosTGT() got an unexpected keyword argument 'service'
Reply


Possibly Related Threads…
Thread Author Replies Views Last Post
  [FREE] CPTS 12 FLAGS pulsebreaker 68 1,934 7 hours ago
Last Post: VictorPipeau
  [FREE] HackTheBox Dante - complete writeup written by Tamarisk Tamarisk 601 91,538 7 hours ago
Last Post: VictorPipeau
  [FREE] 300+ Writeups PDF HackTheBox/HTB premium retired Tamarisk 371 92,797 8 hours ago
Last Post: phannguyenbaouy1
  [FREE] HackTheBox Academy - CBBH CDSA CPTS All Modules Flags Techtom 21 2,614 11 hours ago
Last Post: popoler
  Hack the box Pro Labs, VIP, VIP+ 1 month free Method RedBlock 23 2,268 Yesterday, 02:10 PM
Last Post: kkkato

Forum Jump:


 Users browsing this forum: 1 Guest(s)