Beyond
This is the beyond page that an additional post enumeration and assessment are conducted as SYSTEM after compromising the target system.
Scheduled Tasks
As expected, there are 4 scheduled tasks;
CleanPerms
CleanSPN
CreateExplorerShellUnelevatedTask
User_Feed_Synchronization-{EFE1614B-2B33-4ED0-AD7E-E59FAAE42451}
CleanPerms
powershell.exe -c "c:\users\administrator\contacts\PermsAndGroups.ps1
get-aduser winrm_svc | set-adobject -Clear ServicePrincipalName
get-aduser batch_runner | set-adobject -Clear ServicePrincipalName
Set-ADServiceAccount delegator -PrincipalsAllowedToDelegateToAccount $null
net group ServiceMgmt oorend /del
cmd /c 'dsacls "OU=service users,DC=rebound,DC=htb" /resetDefaultDACL'
cmd /c 'dsacls "cn=batch_runner,OU=service users,DC=rebound,DC=htb" /resetDefaultDACL'
cmd /c 'dsacls "cn=winrm_svc,OU=service users,DC=rebound,DC=htb" /resetDefaultDACL'
cmd /c 'dsacls.exe "ou=service users,dc=rebound,dc=htb" /g rebound\servicemgmt:GA'
CleanSPN
powershell -c "C:\users\administrator\contacts\SPNandPass.ps1
net user winrm_svc Idonthitnkthismattersnow123
set-aduser -identity "winrm_svc" -cannotchangepassword $true
net user batch_runner SpanishDisquisitionaasdsvv123-
set-aduser -identity "batch_runner" -cannotchangepassword $true
set-aduser -identity "batch_runner" -serviceprincipalnames $null
set-aduser -identity "winrm_svc" -serviceprincipalnames $null
$objects = Get-ADobject -searchbase "OU=Service Users,DC=rebound,DC=htb" -Filter *
$objectsToDelete = $objects | Where-Object { $_.Name -notin @("winrm_svc", "batch_runner", "Service Users") }
foreach ($object in $objectsToDelete) {
Remove-ADobject -identity $object.distinguishedname -Confirm:$false -Recursive
}
CreateExplorerShellUnelevatedTask
User_Feed_Synchronization-{EFE1614B-2B33-4ED0-AD7E-E59FAAE42451}
Objects
Managed Service Accounts
delegator
ldap_monitor
ServiceMgmt
tbrady
ReadgMSAPassword