Sauna

Explicit Privilege Escalation path via BloodHound and DSync

Summary

  • Appending the domain name EGOTISTICAL-BANK.LOCAL to /etc/hosts revealed usernames on the homepage.

  • Used username-anarchyarrow-up-right to generate common permutations.

  • Performed an AS-REP Roasting attack using Impacket’s GetNPUsers.py, dumped a hash for fsmith.

  • Cracked the hash with john, logged in via WinRM using Evil-WinRM.

  • Found plaintext credentials for svc_loanmgr via winPEAS.exe.

  • Discovered via bloodhound-python that svc_loanmgr had DCSync rights.

  • Performed DCSync using secretsdump.py to dump Administrator NTLM hash.

  • Used Evil-WinRM to get full shell as Administrator.


Enumeration

sudo nmap -sV -p- 10.10.10.175 -oA saunaNmap -T 5
  • Key Ports:

    • 80 (HTTP)

    • 88 (Kerberos)

    • 389 (LDAP)

    • 445 (SMB)

    • 5985 (WinRM)

  • Website on port 80 revealed employee names like:

    Jenny Joy, Johnson, Watson, Fergus Smith, Shaun Coins, Sophie Driver, ...
  • Domain found: EGOTISTICAL-BANK.LOCAL

  • /etc/hosts entry added:

    10.10.10.175 EGOTISTICAL-BANK.LOCAL
  • Ran Gobuster — didn’t reveal anything useful.


Initial Foothold

  1. Generated username permutations:

  2. Ran AS-REP Roasting:

  3. Cracked hash with john:

    • Found: fsmith:Thestrokes23

  4. Verified with WinRM and gained shell:

  5. Looked for interesting files:


Privilege Escalation

  1. Ran winPEAS.exe, found plaintext creds:

  2. Used bloodhound-python:

    • svc_loanmgr had DCSync rights.

  3. Ran DCSync using secretsdump:

  4. Got NTLM hash:

  5. Verified and gained shell:

Last updated