
NETWORK

ENUMERATION
Users enumeration
/opt/kerbrute userenum -d dictionary.csl --dc 172.31.3.4 /usr/share/seclists/Usernames/xato-net-10-million-usernames.txt

We have find a user: Izabel

ASREPRoast
If a user doesn’t have the attribute DONT_REQ_PREAUTH we can request a AS_REP message for that user that will contain some data encrypted by a derivation of the password of the user.
Let list and get TGTs for those users that have the property ‘Do not require Kerberos preauthentication’ set (UF_DONT_REQUIRE_PREAUTH).
Looks like we have found some users using rpcclient
rpcclient -U "izabel" 172.31.3.4
enumdomusers

python /opt/impacket/build/scripts-3.9/GetNPUsers.py dictionary.csl/ -usersfile users.txt -dc-ip 172.31.3.4 -outputfile hashes.asreproast

Using John The Ripper to crack the information we have found in the previous process we have retrieved the user Izabel password

FOOTHOLD
Ldap enumeration
Using the following command to dump LDAP domain data:
ldapdomaindump -u dictionary.csl\\izabel -p "June2013" -o ldapdomaindump_artifacts 172.31.3.4

we get the files below

Discovered a possible target: backup-izabel a remote management user

Access brute force
Because the password we have found earlier as a specific format (months) we can use that information and the following command to generate a custom wordlist

for i in $(seq 1990 2050); do for a in $(cat months.txt); do echo "$a$i" >> wordlist.txt; done; done

Using our custom wordlist, our users list and the following crackmapexec command
crackmapexec smb 172.31.3.4 -u users.txt -p wordlist.txt --continue-on-success
we were able to retrieve the user ‘backup-izabel’ password

Which we then used to access the server

PRIV ESCALATION
Using WinPEAS we were able to uncover some Firefox passwords
We were lucky to have winPEAS to show these to us but we could have use https://github.com/lclevy/firepwd to display these Firefox credentials

and one of these passwords gives us access to the server
