Blackfield - Hackthebox (OSCP Prep) TJ Nullls
YouTube Viewers YouTube Viewers
499 subscribers
1,630 views
0

 Published On Mar 19, 2024

Backfield is a hard difficulty Windows machine featuring Windows and Active Directory misconfigurations. Anonymous / Guest access to an SMB share is used to enumerate users. Once user is found to have Kerberos pre-authentication disabled, which allows us to conduct an ASREPRoasting attack. This allows us to retrieve a hash of the encrypted material contained in the AS-REP, which can be subjected to an offline brute force attack in order to recover the plaintext password. With this user we can access an SMB share containing forensics artefacts, including an lsass process dump. This contains a username and a password for a user with WinRM privileges, who is also a member of the Backup Operators group. The privileges conferred by this privileged group are used to dump the Active Directory database, and retrieve the hash of the primary domain administrator.

-------------------------
Skills Required:
- Basic Knowledge of Windows
- Basic Knowledge of Active Directory
------------------------
Skills Learned:
Leveraging Backup Operators group membership
Dumping credentials from LSASS
Anonymous / Guest Enumeration
------------------------
Tools:
- manual enumeration
- netexec
- powershell
- bloodhound
- bloodhound-python
- neo4j
- impacket-get-gpppassword
- impacket-getnpusers
- kerbrute
------------------
Certifications:
Practical Network Penetration Tester (PNPT) : TCM Security - https://certifications.tcm-sec.com/pnpt/
Practical Junior Penetration Tester (PJPT): TCM Security - https://certifications.tcm-sec.com/pjpt/
Practical Junior Web Tester (PJWT): TCM Security - https://certifications.tcm-sec.com/pjwt/
Certified Ethical Hacker (CEH): EC-Council
--------------------
Socials:
Tryhackme: https://tryhackme.com/p/NoxLumens
Hackthebox: https://app.hackthebox.com/profile/17...
Twitch:   / noxlumens  

show more

Share/Embed