i will send you a message
Does anyone else get the following error when running impacket-getUserSPNs with a Kerberos ticket?
[-] exceptions must derive from BaseException
You should lookup the git repo (issues section), Iām sure youāll find your answer there.
yes my friend
Glad to see you back Mr. VbScrub! It is my opinion that you are among the reasons HTB started to pay machine creators!
Finally got The User
Thanks @VbScrub for amazing box really learned a lot and got some clarity about AD, before it was very confusing and intimidating.
Next Step to get Administrator
Edit: Scrambled has been Pwned!
Glad to hear that Iāve made a load of videos on AD related attacks if youāve not seen them, they might help in future: https://www.youtube.com/channel/UCpoyhjwNIWZmsiKNKpsMAQQ
Still have the issue even with the additional option mention on the github ā-kā etc
You need to follow @VbScrub instructions on a quick fix heās talking about in one of his message in the issue (tip: you need to change the code a little bit). And donāt forget kerberos loves the FQDN.
Iām in his exact same position. Got the two user:pass creds but canāt think of a way forward. Anyone willing to give me a nudge? Tried cme ldap auth, but it doesnāt work for me.
I feel this is a hard machine for me. I got the creds but not sure if I need to use it to interact with this special service. Please ping me for a nudge, thanks.
I have found two users and their passwords, but have been unable to use those creds anywhere Iāve tried.
I have been knocking on a secret door, assuming this is an entry point, but havenāt found the key.
Am I on the right track? Can someone ping me for a nudge? Thanks!
Nvm. Got the foothold.
Rooted. This was an interesting box for me since Iām not too good with Windows machines. So it was a great learning experience. Iāll try to give enough tips to help out but not too much to ruin the box.
Hereās a bit of a summary. Most of this info is already in the thread here, I just organized it as was helpful for me.
Foothold
- All the clues needed are in the website. The first user and password, as well as the cause for the difficulty that youāll have using standard tools.
- Once you figure out how to overcome that difficulty, getting the second account is rather straight forward as far as Windows machines are concerned. The creatorās YouTube channel will help with the process.
- As itās been stated before, your goal is a ticket and even though it may not seem like you have all the information that you need, you do. Some of the tools, though they donāt work directly, will reveal some info when they execute as long as you run them in verbose or debug mode.
User
- Once you are into your first service, dig around a bit for some info
- Once you found some loot, get a shell. Thereās nothing hacker about this step, itās a feature of the service which really shouldnāt be a thing because of how it can be exploited.
- To pivot, and this was a bit messy for me, you can get another shell as the user from your current shell. Though PowerShell lacks an ability to switch user, you still can execute commands as a different user if you have their creds.
Root
- The website gave more info about a program that connects to the server, itās custom.
- You should now be able to find and download that program and itās dependencies. When you have them, look through them for clues about how the protocol on the server works, what you can send to it via
nc
from your machine. I did this in a messy way which I think is unintended. The best way to get what you need in this step would be ideally to run the program. Decompiling is another avenue if youāre good at that, which Iām not. This step took a lot of time and fuzzing and guessing for me as I made it harder than it should have been. - In order to perform the actual attack, the creator has a really good article of the vulnerability that youāll be exploiting, and even references the tool to use.
- I couldnāt get the tool to run on Linux, but since the target is Windows, you can just download it there and run it from there.
PM me with any questions, or hit me up on Discord: InfosecGreg#1683
Rooted. Excellent machine, thank you @VbScrub. Also thanks to @InfosecGreg on the help on foothold.
My thoughts on it: Everything needed to root the box is already described by others on this thread, just pay attention on the hints and the materials provided.
Curiously, your blog post helped me when I started to learn this vuln, even used it as a reference on my own post about it a few months ago @VbScrub, so thanks twice I guess
haha good stuff, glad to hear that
rooted! this one was kinda tricky if youāre having issues with p*****d on root stage, try running the tool on the target machine, not sure why but wasnāt working for me until i did it that way
Machine rooted,
Very funny, a very interesting attack; I got stressed a lot because I got too many errors for everything I did hahaha
Thank you @meowmeowattack @R3dHawk @InfosecGreg
Got a bit stuck due to my inexperience.
I got into the one service and pulled the doc. Need a nudge on how to get a shell out of that. Any advice would be greatly appreciated.
Hi everybody!
Cannot get a foothold. Read all the thread, but have no idea why my Impacket script (GetUserSPNs.py) doesnāt work.
Iāve made source code changes, but Iām getting ā[-] [Errno 104] Connection reset by peerā.
Would be appreciated for any help!