LDAPDomainDump


A misconfigured web application for administering printer/s resulted in exposing a CLEARTEXT credential for what appears to be a service account for printer/s. The credential was later validated and used to request for a TGT

Here, I will get ldapdomaindump running to get a general review of the target domain

┌──(kali㉿kali)-[~/…/htb/labs/return/ldapdomaindump]
└─$ ldapdomaindump printer.return.local -u 'return.local\svc-printer' -p '1edFg43012!!' -n $IP
[*] Connecting to host...
[*] Binding to host
[+] Bind OK
[*] Starting domain dump
[+] Domain dump finished

Unfortunately, I am unable to conduct the pass-the-ticket technique as ldapdomaindump doesn’t support importing Kerberos tickets Nevertheless, I got the domain information out in HTML format

Computers


It appears that the target host is the only machine in the domain

Users


The svc-printer user is part of the following groups

  • Server Operators
  • Remote Management Users
  • Print Operators

Given the context of the group membership, I’d assume that the next attack vector would be relevant to exploiting the printer. Regardless, I should be able to gain a foothold to the target system directly via WinRM as the user is part of the Remote Management Users