Sauna Walkthrough
Hello Everyone! Today we have a great machine with more techniques and tips related to attacking active directory services, but before we get started letâs take a look at its info


As you can see, itâs similar to real-life challenges, so letâs get startedâŚ
Nmap scan
As we start every time we will scan the open ports and get all services that works on them to know where we will start the enumeration process
nmap -A -T4 -oG sauna.gnmap 10.10.10.175

As you can see here we have a bunch of open ports but the ports which we will keep our eyes on them are 88<kerberos> / 139,445<SMB> / 80<HTTP>
Service Enumeration
1. Enumerate HTTP: scan the source code for vulnerable CMS's, leaked info and directory brute forcing
2. Enumerate SMB/Kerberos: for more info about domain name and server files and directories + try to get TGT or TGS using exist usernames
HTTP Enumeration
For the first step, we opened port 80 as you can see here

and found repay keyword, after searching for it on exploit-db I canât find anything.
The source code and the endpoints also are clean, donât have any hints or leaked data
For directory brute-forcing Iâve found these directories and nothing have useful information :(

Letâs go to the next step.
SMB/Kerberos Enumeration
Iâve used smbclient/smbmap for this step to get any Shares which accept anonymous access by using these commands smbmap -H 10.10.10.175 and smbclinet -L 10.10.10.175 and it asks me for valid username so for now Iâll try to get valid username to use it to dump shares files from SMB server
We will use kerbrute to guess and brute-force the Kerberos with a list of Kerberos usernames

and we know that we have fsmith and administrator are valid and existing users, so we will try to use them in data dumping
Letâs try to get their password by dumping their hashed from
TGTby usingGetNPUser

Great, we have fsmith hashed password, letâs do the same thing with the administrator

Not allowed :( Itâs an expected response but at all, we have tried
Letâs crack fsmith hash by using hashcat


2. Letâs try to get all userâs NTLM hashes by using secretdump tool


Unfortunately, itâs not allowed
3. Letâs try to dump SMB shares by using smbclient and smbmap first to know fsmith permissionshas and we found that he have permission to read only 4 shares

Letâs try to dump their content by using smbmap
smbmap -H 10.10.10.175 -U fsmith -P <user-password> -R â -R for listing all data from userâs shares

and the end of this list you will find

User directory accessed for us but nothing returned from it, so itâs an empty directory, or we donât have permission to access its content, whatever the reason, port ssh/22 is not open, so letâs try to use a custom tool to get us into the server and search for any privilege escalation method
we will use crackmapexec â itâs a great tool that checks if you can login to the server by using services like winrm/smb/mssql/ssh and we will try winrm

So we will use this command crackmapexe winrm 10.10.10.175 -u username -p password

Great we have access to login to the server using winrm so we will use evil-winrm tool which will get us into it

As you can see weâre in the server now and have user priv.

Letâs try to get root privileges
After uploading WinPeas to our vulnerable box and execute it, Iâve found this username svc_loanmgr with default password as you can see it.

So Iâll use this username and its password to dump the users NTLM hashes and I hope to find the administrator hash inside them, Iâll use secretdump to perform this task, and Iâm lucky to find the admin hash :)

Okay, letâs try to login to the server using the userâs hash

Good box with more and more benefits and new techniques and tools
Summary
Use
smbclient / smbmapto list and know the userâs allowed shared.Use
kerbruteto brute-force Kerberos usernamesUse
GetNPUserto getTGTfromKerberos authentication systemand crack it to get the passwordTry to use
GetUserSPNto getTGSif theKerberosis vulnerable bykerberoastingâIn this case you will have the same password for the admin account also but in our case itâs not vulnerableâUse
secretdumpto dumpNTLMhashed by using valid username and passwordIf the secret dump step fails, so you can use
crackmapexecto check for your permission to login to the server bysmb/ssh/mysql/wimrmUse
evil-winrmto get into the server itselfUse
WinPeasto automate the enumeration processAccess the root account â¤
Last updated