

- Cyber shadow walkthrough full#
- Cyber shadow walkthrough password#
- Cyber shadow walkthrough plus#
- Cyber shadow walkthrough crack#
The scan quickly finished and was not able to pull much information with a NULL session. I found that there were two non-default shares available here that I want enumerate more-so than the rest however, before I do that I want to run an enum4linux scan since I found that I was able to get NULL access to both services. With rpcclient, I found I was limited in the commands that I could run and with smbclient I was able to list all of the shares on the machine. I tested NULL access with rpcclient and smbclient and found that I was able to access both services.


Moving on, I attempted to perform an LDAP search without supplying any credentials. Zone transfer attempt was unsuccessful.Enumerating Services Specific to a Domain ControllerĮnumeration will begin by attempting to run a zone transfer against the DNS service. Port 5985 is hosting the WinRM service, which will be good if credentials are found.įrom the nmap scan we can see this is a Domain Controller with a hostname of DC01 and that this is the DC for domain blackfield.local.Ports 593 is open and hosting RPC services over HTTP.Ports 389 / 3268 are open and are hosting the LDAP service.Ports 135 / 445 are open and are hosting the RPC / SMB share services respectively.Port 88 is open and is hosting the kerberos service.
Cyber shadow walkthrough plus#
Port 53 is open and is hosting a DNS service over TCP – version: Simple DNS Plus (version number unknown at this time).Lots of interesting TCP ports open and it was observed this is an AD machine, and even more specifically, a Domain Controller (DC)!
Cyber shadow walkthrough full#
Nmap TCP Full - Enumeration and Initial Exploit Review of Open Ports We will then extract a copy of the NTDS.dit file from the shadow copy and then dump all the hashes in the domain.įinally, we will perform a pass-the-hash attack with the domain admin account to get an elevated shell and grab the flags. Once we have a foothold, we will find that this account has the SeBackupPrivilege enabled, which we will utilize to create a shadow copy of the C:\ drive. Inside the share we will find an LSASS.zip file that we will dump using Pypykatz, extracting the NTLM hash for a third account.Īfter obtaining the NTLM hash for a third account, we will perform a pass-the-hash attack using evil-winrm to gain a foothold on the victim.
Cyber shadow walkthrough password#
After that, we will find that the user we set the password for has access to a share that we couldn’t access earlier. With this information, we will change the account’s password using rpcclient. With a set of valid credentials, we will run Bloodhound.py to enumerate the AD rights and relations, which reveal that our current user has the ForceChangePassword rights over another account in the domain.
Cyber shadow walkthrough crack#
After we AS-REP roast the user, we will dump their NetNTLMv2 hash and crack it using hashcat. We will begin by enumerating all of the users in the domain through the profiles$ share and find that one of them is vulnerable to an AS-REP roast attack. In this Walkthrough, we will be hacking the machine Blackfield from HackTheBox.
