Post

Secura Writeup

Detailed security assessment write-up for the Secura Lab.

Secura Writeup
  • This hands-on lab guides learners through a realistic, multi-stage attack against an enterprise environment, starting with the exploitation of CVE-2020-10189, a known vulnerability in ManageEngine Desktop Central. Participants will identify and exploit a vulnerable service using default credentials and gain remote code execution (RCE) to establish a foothold.

  • The attack continues with the extraction of plaintext credentials from RDCMan, pivoting deeper into the network through port forwarding, and exploiting insecure Group Policy Object (GPO) permissions to escalate privileges. The lab culminates in full domain compromise by achieving administrative control over the final target.

The Targets:

1
2
3
1. 192.168.139.97
2. 192.168.139.96
3. 192.168.139.95

Table of Contents

  1. Enumeration
  2. Initial Access
  3. Credential Dumping
  4. Lateral Movement and Privilege Escalation
  5. Target Identification and Credential Access
  6. Credential Discovery
  7. Credential Reuse and Domain Compromise
  8. GPO Abuse
  9. GPO Exploitation and Credential Dumping

Enumeration

Initial enumeration was performed using Nmap against the three target IP addresses to identify open ports and running services. The scan revealed a ManageEngine application running on 192.168.139.95 over port 8443.

Initial Access

Authentication to the ManageEngine application was successful using the default credentials admin:admin. However, no additional vulnerabilities or attack vectors were identified during further enumeration.

The lab-provided credentials were then tested against the WinRM service. Successful authentication was confirmed using the following credentials:

  • Username: Eric.Wallow
  • Password: EricLikesRunning800

This provided valid WinRM access to the target system.

Credential Dumping

The SAM and SYSTEM registry hives were saved successfully using the following command. This was unexpected, as no restrictions prevented access to the registry files.

The extracted hive files were then uploaded to the attacker machine and analyzed using secretsdump.py, which was used to extract password hashes from the system.

Lateral Movement and Privilege Escalation

After extracting the password hashes, a pass-the-hash attack was attempted against the Administrator account using the obtained hashes.

BloodHound (legacy version) was then used to further enumerate Active Directory relationships and potential privilege escalation paths. The analysis revealed that the user Charlotte has the following permissions over a Group Policy Object (GPO):

  • WriteDACL
  • GenericWrite
  • WriteOwner

These permissions indicate that the user has sufficient rights to modify the GPO, which can be leveraged for privilege escalation.

Target Identification and Credential Access

Based on the BloodHound analysis, the user Charlotte was identified as the primary target for achieving access to dc01, due to her elevated permissions over a Group Policy Object (GPO).

An attempt was made to extract credentials using LaZagne.exe; however, no credentials were recovered. As a result, mimikatz.exe was used to enumerate logged-on users and retrieve credential material from memory.

The credentials is apache:New2Era4.!. and it worked.

Credential Discovery

A non-default file was identified in the directory C:\xampp\mysql\data\creds\ named creds.ibd. This file does not exist in a standard XAMPP MySQL installation and appeared to contain potentially sensitive data.

An attempt was made to download the file directly; however, the transferred file contained no data. To resolve this issue, a backup of the file was created first, which was then successfully downloaded for further analysis.

1
copy creds.ibd creds2.ibd

After that I searched in google to find an online IBD converter online.

Credential Reuse and Domain Compromise

Valid credentials for the Administrator account were successfully recovered and confirmed to be functional on 192.168.139.96:

  • Administrator: Almost4There8.?

Additionally, the credentials Game20n4.! were tested against the user Charlotte on 192.168.139.97 and resulted in successful authentication.

GPO Abuse

Two different GPO abuse tools were evaluated in order to leverage Charlotte’s permissions over the Group Policy Object:

  1. SharpGPOAbuse
    • Repository: https://github.com/FSecureLABS/SharpGPOAbuse
    • This tool required compilation prior to execution, which was impractical in this environment.
  2. pyGPOAbuse
    • Repository: https://github.com/Hackndo/pyGPOAbuse
    • This tool executed successfully and was used for further exploitation.

Before abusing the GPO, the GPO identifier (GPO ID) was required. This information was obtained using BloodHound, which provided visibility into the affected GPO and Charlotte’s permissions over it.

And add a random or any Taskname for this to work.

GPO Exploitation and Credential Dumping

After modifying the targeted Group Policy Object, access was obtained as the user Charlotte. The updated GPO settings were then applied by forcing a policy refresh on the system.

Once the GPO changes took effect, elevated privileges were obtained, allowing credential access on the domain controller. The secretsdump.py tool was then used to dump the Administrator account hashes from the system.


This post is licensed under CC BY 4.0 by the author.

© drewbyte. Some rights reserved.

Using the Chirpy theme for Jekyll.