Manager

This is my Walkthrough on Manager - The Hack The Box Seasonal Machine

Initial Scan

sudo nmap -T4 -Pn -sV -sC -v 10.129.74.218 -oA Manager

**Had to shutdown to IP changed to 10.129.74.218 for some later things

Findings

HTTP

Not a lot to the website, no logon forms or any hidden directories

Dirbuster/Gobuster

SMB

Directories are empty, C$ and ADMIN$ we don't have access by default.

BUT we were able to find the users with CrackMapExec and trying various passwords(username as pass but upper and lower), we find a valid user/password combination: Operator:operator

RPC

Not much found here but we did find the SID of the Administrator account

SQL

Impacket-mssqlclient

Were able to log in with Operator:operator

Using xp_dirtree to look around in various directories we eventually found:

Grabbed the .zip file

.old-conf.xml

More user creds! We found [email protected]:R4v3nBe5tD3veloP3r!123

winrm

User flag was found under user.txt on Ravens desktop: 5ba4881af698a98cbf340a8861580333

Priv Esc

Looked around at what permissions Raven had

WinPEAS

Nothing of super note was found with WinPeas unfortunately

certipy

We checked with Certipy due it being Active Directory and on a DC. So we want to enumerate certificates.

We see ESC7 is vulnerable - On the certipy github on ESC7. Upgrade Ravens account to have additional permissions. These had to be done in qucik succession as the machine does reset itself every few minutes.

We now have our administrator.pfx and we can use this.

We need to sync our clock with the DC. We we can use rdate(need to install it) to get the time of the DC Server

Then use faketime to sync the clock

Re-run our certipy command and get the hash of the administrator!

Administrator NTLM hash: aad3b435b51404eeaad3b435b51404ee:ae5064c2f62317332c88629e025924ef

Rather than try to crack it, we can use CrackMapExec to pass the hash and execute commands

Root.txt: 35891a19f5ad0f5c2fced375b3c7142e

Last updated