Technical Report
Technical Report
TECHNICAL REPORT
Salud Total
October 04, 2024
The methodology used to audit the computer systems is considered proprietary intellectual information of Vonahi Security and
may not be disclosed without written permission from Vonahi Security. Vonahi Security gives permission to copy this report for the
purpose of disseminating information within your organization, or any regulatory agency.
Confidentiality
This document contains company confidential information of a proprietary and sensitive nature. As such, this document should be
afforded the security and handling precautions that a confidential document warrants. This document should have a controlled
distribution to relevant parties only and should not be copied without written permission. Vonahi Security treats the contents of a
security audit as company confidential material and will not disclose the contents of this document to anyone without written
permission.
Title: Support
Office:
Email: [email protected]
SEVERITY DESCRIPTION
A critical threat ranking requires immediate remediation or mitigation. Exploiting these vulnerabilities
require a minimal amount of effort by the adversary but poses a significant threat to the confidentiality,
Critical integrity, and/or availability of the organization's systems and data. A successful compromise of
findings of this ranking leads to access to multiple systems and/or several pieces of sensitive
information.
A high threat ranking requires immediate remediation or mitigation. Exploiting these vulnerabilities
require a minimal amount of effort by the adversary but poses a significant threat to the confidentiality,
High
integrity, or availability of the organization's systems or data. A successful compromise of findings of
this ranking leads to access to a single system or limited sensitive information.
A medium threat ranking requires remediation or mitigation within a short and reasonable amount of
Medium time. These findings typically lead to a compromise of non-privileged user accounts on systems
and/or applications or denote a denial-of-service (DoS) condition of the host, service, or application.
A low threat ranking requires remediation or mitigation once all higher prioritized findings have been
Low remediated. These findings typically leak information to unauthorized or anonymous users and may
lead to more significant attacks when combined with other attack vectors.
An informational threat ranking does not pose a significant threat to the environment and may just be
findings that could potentially disclose valuable information but do not expose the organization to any
Informational
technical attacks. Findings rated as informational may be useful for an attacker performing information
gathering on the organization to leverage in other attacks, such as social engineering or phishing.
Vonahi Security recommends SaTo thoroughly leverage this report section to investigate and improve network security policies,
procedures, and controls within the organization's environment. All of the attacks mentioned in this report section should have
been detected and properly logged for investigation purposes by the organization.
Through discussions with SaTo's staff, the following target applications, IP addresses, and/or ranges were included as part of the
engagement scope.
10.10.150.0/24 10.10.181.0/24
Agent Information
To perform this assessment, Vonahi Security used an agent consisting of the necessary tools to conduct discovery, enumeration,
attacks, etc. The agent used in this assessment contained the following information:
DESCRIPTION DETAILS
Task Performed
To assess the targets listed above fully, Vonahi Security performed the following tasks:
Rules of Engagement
Host Discovery
The first process that was performed during the penetration test was host discovery. Host discovery includes several tasks,
including port scanning and ping sweeps, to identify the active systems within the environment. This is a crucial step in the
penetration test as it allows attackers to determine what systems are active within the targeted IP addresses and/or ranges.
Of the two (2) IP addresses/ranges that were provided as part of the scope, Vonahi Security was able to identify a total of two
hundred and ninety-seven (297) systems to be active within the targeted environment.
Vonahi Security also performed a port scan against two hundred and ninety-seven (297) targets to identify opened
ports and running services. Port scanning is also important in that it allows one to identify which ports are opened
Note
and visible from the tested system. By discovering opened ports within the environment, it is then possible to
determine which services are running and if any of the running services are vulnerable.
Of the two hundred and ninety-seven (297) addresses/ranges that were scanned, Vonahi Security found two thousand, one
hundred and seventy-two (2,172) ports opened.
Enumeration
After identifying the available hosts within the network, the next phase is to conduct enumeration. Enumeration consists of
scanning the identified ports to determine what services are running. Additional scans are performed based on the running
services to attempt enumerating information from the running services (if possible). Such information may be useful for identifying
additional vulnerabilities or knowledge for performing an attack against the service.
To help understand the operating systems and ports that were found to be most common within the environment, the following
tables display the top 10 operating systems and top 10 ports.
Undetected 124
Windows 10 / Server 2019 Build 17763 x64 89
Windows Server 2022 Build 20348 x64 70
Windows Server 2012 R2 Standard 9600 x64 7
Windows Server 2022 Standard 20348 x64 3
Windows Server 2008 R2 Standard 7601 Service Pack 1 x64 2
PORT/PROTOCOL COUNT
80/tcp 211
3389/tcp 176
445/tcp 174
135/tcp 173
5985/tcp 172
47001/tcp 170
139/tcp 165
443/tcp 147
5666/tcp 140
22/tcp 93
The first step in the enumeration phase was the discovery of systems on the local subnet.
The following results demonstrate that two hundred and eighteen (218) systems exist on the same local subnet:
The remainder of this output has been snipped for reporting purposes.
During the analysis, no VPN gateways were configured with IKE Aggressive Mode.
Vonahi Security identified nineteen (19) Microsoft SQL (MSSQL) Services present within the tested environment. While this
discovery does not indicate any significant issues were found, MSSQL services are often targeted by attackers in a form of a
password attack. A successful password attack will usually result in limited or elevated privileges to the SQL server, at which point
an attacker can begin to run SQL commands or execute system level commands.
The following information was discovered from the Microsoft SQL servers:
The remainder of this output has been snipped for reporting purposes.
Vonahi Security identified five (5) MySQL services present within the tested environment. While this discovery does not indicate
any significant issues were found, MySQL services are often targeted by attackers in a form of a password attack. A successful
password attack will usually result in limited or elevated privileges to the SQL service, at which point an attacker can begin to run
SQL commands or execute system level commands.
The following information was enumerated from the MySQL service(s) found during this assessment:
[*] 10.10.150.37:3306 - 10.10.150.37:3306 is running MySQL, but responds with an error: \x04Host '10.10.150.224' is not al
lowed to connect to this MySQL server
[+] 10.10.181.192:3306 - 10.10.181.192:3306 is running MySQL 8.0.31 (protocol 10)
[+] 10.10.150.139:3306 - 10.10.150.139:3306 is running MySQL 5.7.22 (protocol 10)
[+] 10.10.181.194:3306 - 10.10.181.194:3306 is running MySQL 8.0.31 (protocol 10)
[*] 10.10.150.152:3306 - 10.10.150.152:3306 is running MySQL, but responds with an error: \x04Host '10.10.150.224' is not
allowed to connect to this MySQL server
Next, Vonahi Security identified one hundred and seventy-four (174) systems that exposed the Remote Desktop Protocol (RDP)
service on port 3389/tcp. The following scan results display (some of) the identified services:
The remainder of this output has been snipped for reporting purposes.
Vonahi Security began enumerating information from the available RDP services with the goal of identifying if the targets were
vulnerable to common vulnerabilities that could be exploited to achieve remote code execution or denial-of-service (DoS).
Vonahi Security scanned SNMP-enabled devices to determine if any weak SNMP community strings were present. SNMP
community strings act as passwords for the SNMP protocol and allow network administrators to monitor the performance of
SNMP-enabled devices remotely. SNMP-enabled devices often come pre-installed with weak or default SNMP community strings.
This weakness could allow a malicious attacker to enumerate information from the remote devices.
During testing, Vonahi Security discovered thirteen (13) SNMP-enabled devices that contained a weak and/or default SNMP
community string. The output below demonstrates sample results from this scan
Vonahi Security used the weak SNMP community strings to enumerate information. The output below demonstrates the results
from one affected system:
The remainder of this output has been snipped for reporting purposes.
Vonahi Security identified twelve (12) Telnet services within the environment. As Telnet is an insecure protocol, it could potentially
expose sensitive information such as user credentials or device configuration information in a man-in-the-middle attack. The
following scan results display some information that was discovered as a result of these scans:
Testing of LDAP services identified that three (3) systems were found to accept anonymous LDAP bind queries, which allows
users to query information from within LDAP without proper authentication. This could allow an attacker to gain valuable
information about the Active Directory environment, such as domain information and possibly even usernames. The following
sample output was obtained while scanning for this weakness:
The remainder of this output has been snipped for reporting purposes.
Vonahi Security identified ninety-three (93) SSH services within the environment and attempted to retrieve banner information,
which can be used to identify specific server versions. The following scan results display some of the obtained information:
The remainder of this output has been snipped for reporting purposes.
Vonahi Security identified nine (9) FTP services within the environment. As FTP is an insecure protocol, it could potentially expose sensitive
information such as user credentials or device configuration information in a man-in-the-middle attack. The following scan results display
some information that was discovered as a result of these scans:
Testing of FTP services identified one (1) system to accept anonymous FTP authentication credentials. Anonymous login
credentials would allow an attacker to identify files that may exist on an FTP server. If permissions allow for write access, an
attacker could also attempt to use this to store malicious code. The following output displays the results of this FTP scan:
While analyzing one of the FTP services at 10.10.150.139, Vonahi Security was able to enumerate the directory structure. The
results of the directory structure listing are below:
./
During testing, Vonahi Security identified one (1) Microsoft Exchange server and performed a simple check to test for Proxyshell,
a vulnerability that allows bypassing authentication on Microsoft Exchange servers and, potentially, remote code execution.
However, none of the tested servers were vulnerable to ProxyShell.
Next, Vonahi Security identified one hundred and seventy-four (174) systems that exposed port 445/tcp, which is for the Server
Message Block (SMB) service. This service was targeted for the enumeration of information that may be valuable. One of the first
things scanned during this process is the support for SMB signing. SMB signing, when enabled, helps mitigate SMB relay attacks.
SMB relay attacks are when an attacker performs a poisoning attack and tricks a vulnerable system into sending hashed
authentication credentials to the attacker. The attacker then takes these hashed credentials and relays them to another system,
pivoting off that authenticated session to perform additional attacks, such as remote code execution.
Testing identified one hundred and seventy (170) of the one hundred and seventy-four (174) systems with port 445/tcp opened
that did not require SMB signing, therefore being vulnerable to SMB relay attacks. The following sample output from
CrackMapExec identified this weakness:
10.10.181.233:(signing:False)
10.10.181.215:(signing:False)
10.10.150.11:(signing:False)
10.10.150.39:(signing:False)
10.10.150.113:(signing:False)
10.10.150.112:(signing:False)
10.10.181.219:(signing:False)
10.10.150.15:(signing:False)
10.10.150.33:(signing:False)
10.10.150.10:(signing:False)
10.10.150.14:(signing:False)
As part of this operating system identification process, Vonahi Security identified one hundred and seventy-three (173) operating
systems. It's important to note that the tools and techniques used to gather information about operating system versions are not
always 100% accurate. While Vonahi Security makes several attempts to confirm the accurate operating systems through
additional methods, it should be noted that some results may require additional validation from a system administrator. The
following output demonstrates some of the results obtained:
SMB 10.10.150.20 445 SVAPPXCAPBOG04 [*] Windows Server 2022 Build 20348 x64 (name:SVAPPXCAPBO
G04) (domain:saludtotal.loc) (SMBv1:False)
SMB 10.10.181.36 445 SRVISWEBDEV001 [*] Windows Server 2022 Build 20348 x64 (name:SRVISWEBDEV
001) (domain:SRVISWEBDEV001) (SMBv1:False)
SMB 10.10.150.194 445 SRVODISSY05 [*] Windows Server 2022 Build 20348 x64 (name:SRVODISSY0
5) (domain:saludtotal.loc) (SMBv1:False)
SMB 10.10.150.75 445 SRVFTPTEMP [*] Windows Server 2022 Build 20348 x64 (name:SRVFTPTEMP)
(domain:saludtotal.loc) (SMBv1:False)
SMB 10.10.150.118 445 SRVIISITBOG11 [*] Windows 10 / Server 2019 Build 17763 x64 (name:SRVIIS
ITBOG11) (domain:saludtotal.loc) (SMBv1:False)
SMB 10.10.150.98 445 SRVFSSOBOG01 [*] Windows 10 / Server 2019 Build 17763 x64 (name:SRVFSS
OBOG01) (domain:saludtotal.loc) (SMBv1:False)
SMB 10.10.181.37 445 SRVISWEBDEV002 [*] Windows Server 2022 Build 20348 x64 (name:SRVISWEBDEV
002) (domain:SRVISWEBDEV002) (SMBv1:False)
The remainder of this output has been snipped for reporting purposes.
Vonahi Security also identified ten (10) systems that used an outdated operating system. Outdated operating systems are no
longer supported by their vendor and could pose a significant threat to the environment due to their lack of security updates. The
following output demonstrates an example of the outdated operating systems discovered:
SMB 10.10.150.11 445 SRVRSBOG02 [*] Windows Server 2012 R2 Standard 9600 x64 (name:SRVRSB
OG02) (domain:saludtotal.loc) (SMBv1:True)
SMB 10.10.150.10 445 SRVICPBOG01 [*] Windows Server 2008 R2 Standard 7601 Service Pack 1 x
64 (name:SRVICPBOG01) (domain:saludtotal.loc) (SMBv1:True)
SMB 10.10.150.33 445 SRVINTRANETNEW [*] Windows Server 2008 R2 Standard 7601 Service Pack 1 x
64 (name:SRVINTRANETNEW) (domain:saludtotal.loc) (SMBv1:True)
SMB 10.10.150.9 445 SRVRSBOG01 [*] Windows Server 2012 R2 Standard 9600 x64 (name:SRVRSB
OG01) (domain:saludtotal.loc) (SMBv1:True)
SMB 10.10.150.41 445 SRVMONBOG01 [*] Windows Server 2012 R2 Standard 9600 x64 (name:SRVMON
BOG01) (domain:saludtotal.loc) (SMBv1:True)
SMB 10.10.150.104 445 SRVODISSY01 [*] Windows Server 2012 R2 Standard 9600 x64 (name:SRVODI
SSY01) (domain:saludtotal.loc) (SMBv1:True)
SMB 10.10.150.156 445 SRVTMGBOG02 [*] Windows Server 2008 R2 Standard 7601 Service Pack 1
(name:SRVTMGBOG02) (domain:saludtotal.loc) (SMBv1:True)
SMB 10.10.150.161 445 SRVODISSY02 [*] Windows Server 2012 R2 Standard 9600 x64 (name:SRVODI
SSY02) (domain:saludtotal.loc) (SMBv1:True)
SMB 10.10.181.95 445 SRVODYPRB001 [*] Windows Server 2012 R2 Standard 9600 x64 (name:SRVODY
PRB001) (domain:saludtotal.loc) (SMBv1:True)
SMB 10.10.181.176 445 SRVREPPRB001 [*] Windows Server 2012 R2 Standard 9600 x64 (name:SRVREP
PRB001) (domain:saludtotal.loc) (SMBv1:True)
One hundred (100) systems were scanned using the auxiliary/scanner/smb/smb_ms17_010 module. This module attempts to
discover systems that contain a common vulnerability named EternalBlue. When successfully exploited, this vulnerability could
allow an attacker with system-level privileges on the system, allowing them to perform several post-exploitation techniques. Such
post-exploitation techniques include the enumeration of local administrator password hashes, the enumeration of Active Directory
infrastructure data, and more. Scans indicate that no systems were found to be vulnerable at the time of testing. The following
results were obtained from this scan:
[-] 10.10.150.113:445 - An SMB Login Error occurred while connecting to the IPC$ tree.
[-] 10.10.181.219:445 - An SMB Login Error occurred while connecting to the IPC$ tree.
[-] 10.10.150.110:445 - An SMB Login Error occurred while connecting to the IPC$ tree.
[-] 10.10.150.111:445 - An SMB Login Error occurred while connecting to the IPC$ tree.
[-] 10.10.150.2:445 - An SMB Login Error occurred while connecting to the IPC$ tree.
[-] 10.10.150.112:445 - An SMB Login Error occurred while connecting to the IPC$ tree.
[-] 10.10.181.215:445 - An SMB Login Error occurred while connecting to the IPC$ tree.
[-] 10.10.150.123:445 - An SMB Login Error occurred while connecting to the IPC$ tree.
[-] 10.10.181.216:445 - An SMB Login Error occurred while connecting to the IPC$ tree.
[-] 10.10.150.13:445 - An SMB Login Error occurred while connecting to the IPC$ tree.
[-] 10.10.150.114:445 - An SMB Login Error occurred while connecting to the IPC$ tree.
[-] 10.10.181.20:445 - An SMB Login Error occurred while connecting to the IPC$ tree.
[-] 10.10.181.217:445 - An SMB Login Error occurred while connecting to the IPC$ tree.
[-] 10.10.150.151:445 - An SMB Login Error occurred while connecting to the IPC$ tree.
[-] 10.10.181.16:445 - An SMB Login Error occurred while connecting to the IPC$ tree.
[-] 10.10.150.16:445 - An SMB Login Error occurred while connecting to the IPC$ tree.
[-] 10.10.181.229:445 - An SMB Login Error occurred while connecting to the IPC$ tree.
[-] 10.10.150.49:445 - An SMB Login Error occurred while connecting to the IPC$ tree.
[-] 10.10.150.42:445 - An SMB Login Error occurred while connecting to the IPC$ tree.
[-] 10.10.150.40:445 - An SMB Login Error occurred while connecting to the IPC$ tree.
The remainder of this output has been snipped for reporting purposes.
Three (3) systems were scanned using the exploit/windows/smb/ms08_067_netapi module. This module attempts to discover
systems that contain a common and old vulnerability that affects older versions of Microsoft Windows. When successfully
exploited, this vulnerability could allow an attacker with system-level privileges on the system, allowing them to perform several
post-exploitation techniques. Such post-exploitation techniques include the enumeration of local administrator password hashes,
the enumeration of Active Directory infrastructure data, and more. Scans indicate that no systems were found to be vulnerable at
the time of testing. The following results were obtained from this scan:
Vonahi Security then ran a custom script to check if any systems allowed for SMB NULL session authentication (i.e. without a
username or password). SMB NULL sessions can allow attackers with network access to identify and possibly retrieve files that
may exist on an SMB (445/tcp) server. If permissions allow for write access, an attacker could also attempt to use this to store
malicious code. The results showed that ten (10) systems accepted SMB NULL session authentication:
10.10.150.2
10.10.150.33
10.10.150.10
10.10.150.34
10.10.150.39
10.10.150.61
10.10.150.150
10.10.150.162
The below sample evidence shows some of the results of this attack:
[10.10.150.2]
# crackmapexec smb 10.10.150.2 -u '' -p '' --local-auth
SMB 10.10.150.2 445 SRVDCBOG02 [+] SRVDCBOG02\:
------------------------------------------------------------
[10.10.150.33]
# crackmapexec smb 10.10.150.33 -u '' -p '' --local-auth
SMB 10.10.150.33 445 SRVINTRANETNEW [+] SRVINTRANETNEW\:
------------------------------------------------------------
Vonahi Security then tried to take advantage of SMB NULL session authentication in order to enumerate the SMB shares
available on the affected systems. The aim of this process was to identify any accessible shares containing potentially sensitive
company data as well as shares configured with WRITE access. However, no accessible shares were identified.
Additionally, an enumeration of SMB services was performed in an attempt to identify whether usernames, password policies, or
additional computer and/or domain information could be obtained. Such information could be useful for performing a password
attack against the environment. A sample output of one of the results is as follows:
The remainder of this output has been snipped for reporting purposes.
It was possible to extract valuable information from two (2) IP addresses during testing. The following IP addresses were found to
be leaking excessive information via SMB:
10.10.150.150
10.10.150.2
The following table presents some statistics of the information captured while enumerating SMB services:
One example of a password policy that was obtained as part of this enumeration process can be found below:
During testing, Vonahi Security was unable to identify any domain controllers that were vulnerable to ZeroLogon.
Next, Vonahi Security's objective was to perform a password attack against the Active Directory environment. However, Vonahi
Security needed to gather a list of potential domain user accounts to perform this process. Vonahi Security used the Kerbrute tool
to assist with this process. Kerbrute is a tool that can be used to enumerate domain user accounts by interacting with Kerberos.
Based on the response from a ticket-granting ticket (TGT) request to the key distribution center (KDC) server, Kerbrute is able to
deduce whether or not the domain user account provided was valid or not.
The following domain was observed as part of the initial host discovery scans performed at the beginning of the assessment:
saludtotal.loc
Vonahi Security used naming schemes for four different naming conventions: 1) first initial last name, 2) first name last initial, 3)
first name dot last initial (e.g. First.Last), and 4) first name. A combination of common first and last names was used as part of this
process, as well as publicly available resources. Vonahi Security also included usernames gathered via enum4linux.
During this process, Vonahi Security discovered five thousand, seven hundred and ninety-two (5792) valid domain user accounts
for one (1) domain. The following usernames were observed:
saludtotal.loc
----
$duplicate-2df65
$duplicate-2e34e
$duplicate-3b46d
-adm-infra
-adm-spadmin
-adm-spfarm
-adm-spservise
-adm-spsqlengine
___vmware_conv_sa___
abrahamia
During the enumeration phase of the test, Vonahi Security identified a total of five thousand, seven hundred and ninety-two
(5792) domain users. Vonahi Security carried out a limited password attack, consisting of one (1) login attempt per account,
against the identified users.
During this password attack, no successful login attempts were identified. The complete evidence of this login attack can be found
within the supporting evidence. The following is a short snippet of the password attack results:
The remainder of this output has been snipped for reporting purposes.
No servers were found to contain weak or default credentials at the time of testing. The following code snippet shows sample
output results of this scan:
No servers were found to contain weak or default credentials at the time of testing. The following code snippet shows sample
output results of this scan:
No servers were found to contain weak or default credentials at the time of testing. The following code snippet shows sample
output results of this scan:
Vonahi Security detected seven (7) sets of weak or default credentials across two (2) hosts.
When enabled on Microsoft Windows systems, DNS names that cannot be resolved by a system's configured DNS server or local
hosts file will be communicated in the form of NBNS and/or LLMNR broadcast packets across the network environment. Similarly,
multicast DNS (mDNS) can be used within small networks to resolve a DNS name when no local DNS server exists. This is done
via IP multicast query messages to the hosts on the local subnet. The problem with this configuration is that it is possible to
respond to these broadcast/multicast packets and spoof the IP address of the DNS name in question. In other words, if SystemA
is attempting to resolve www.helloworld.com and cannot find its IP address, an attacking system can pretend to be the IP address
of www.helloworld.com. Upon a successful attack, it may be possible to capture cleartext or hashed credentials.
Vonahi Security deployed a rogue IPv6 router within the environment to determine if it'd be possible to conduct IPv6 attacks.
Since IPv6 is treated with higher priority than IPv4, any time a network device sees an IPv6 router available, it will attempt to
retrieve an IPv6 address. An attacker can abuse this by deploying a rogue DHCPv6 server within the environment and assigning
all IPv6 clients with an IP address and DNS configurations that route traffic through the attacker's system.
While Vonahi Security was successful with capturing NBNS/LLMNR/mDNS broadcast packets across the local subnet, it was not
possible to capture any credentials at the time of testing. This is primarily due to the lack of systems and/or services successfully
authenticating to the penetration testing VM during these attacks. An example of these successful NBNS/LLMNR/mDNS
poisoning attempts is shown below:
2024-10-04 06:11:33,110 - [*] [NBT-NS] Poisoned answer sent to 10.10.150.98 for name CPO31DIGITOUCH0 (service: Workstatio
n/Redirector)
2024-10-04 06:11:33,368 - [*] [MDNS] Poisoned answer sent to 10.10.150.98 for name CPO31DIGITOUCH0.local
2024-10-04 06:11:33,383 - [*] [MDNS] Poisoned answer sent to 10.10.150.98 for name CPO31DIGITOUCH0.local
2024-10-04 06:11:34,360 - [*] [NBT-NS] Poisoned answer sent to 10.10.150.61 for name SERHSRTS01 (service: Workstation/Redi
rector)
2024-10-04 06:11:34,360 - [*] [MDNS] Poisoned answer sent to 10.10.150.61 for name SERHSRTS01.local
2024-10-04 06:11:34,361 - [*] [MDNS] Poisoned answer sent to 10.10.150.61 for name SERHSRTS01.local
2024-10-04 06:11:34,362 - [*] [LLMNR] Poisoned answer sent to 10.10.150.61 for name SERHSRTS01
2024-10-04 06:11:34,362 - [*] [LLMNR] Poisoned answer sent to 10.10.150.61 for name SERHSRTS01
2024-10-04 06:11:36,005 - [*] [MDNS] Poisoned answer sent to 10.10.150.16 for name SRVFACBOG01.local
2024-10-04 06:11:36,005 - [*] [MDNS] Poisoned answer sent to 10.10.150.16 for name SRVFACBOG01.local
2024-10-04 06:11:36,097 - [*] [NBT-NS] Poisoned answer sent to 10.10.150.150 for name BOGCIR4313707 (service: Workstation/
Redirector)
2024-10-04 06:11:36,097 - [*] [MDNS] Poisoned answer sent to 10.10.150.150 for name BOGCIR4313707.local
2024-10-04 06:11:36,098 - [*] [LLMNR] Poisoned answer sent to 10.10.150.150 for name BOGCIR4313707
2024-10-04 06:11:36,189 - [*] [MDNS] Poisoned answer sent to 10.10.150.150 for name BOGCIR4313707.local
2024-10-04 06:11:36,189 - [*] [LLMNR] Poisoned answer sent to 10.10.150.150 for name BOGCIR4313707
2024-10-04 06:11:37,028 - [*] [MDNS] Poisoned answer sent to 10.10.150.114 for name DBAUTORIZACIONE.local
2024-10-04 06:11:37,378 - [*] [NBT-NS] Poisoned answer sent to 10.10.150.33 for name NTAUTHORITY (service: File Server)
2024-10-04 06:11:37,581 - [*] [NBT-NS] Poisoned answer sent to 10.10.150.156 for name SRVTMOSBOG01 (service: Workstation/R
edirector)
2024-10-04 06:11:38,330 - [*] [NBT-NS] Poisoned answer sent to 10.10.150.156 for name SRVTMOSBOG01 (service: Workstation/R
edirector)
2024-10-04 06:11:39,080 - [*] [NBT-NS] Poisoned answer sent to 10.10.150.156 for name SRVTMOSBOG01 (service: Workstation/R
edirector)
The remainder of this output has been snipped for reporting purposes.
When attempting to perform IPv6 attacks, Vonahi Security successfully assigned IPv6 addresses with the attacking system set as
the default DNS server. An example of this can be found below:
The remainder of this output has been snipped for reporting purposes.
At the time of testing, Vonahi Security was successful with capturing password hashes via NTLM relaying attacks. The following
output is a snippet of the NTLM relay log results:
[*] Received connection from SALUDTOTAL/SRVINTRANETNEW$ at SRVINTRANETNEW, connection will be relayed after re-authenticat
ion
[*] SMBD-Thread-6 (process_request_thread): Connection from SALUDTOTAL/SRVINTRANETNEW$@::ffff:10.10.150.33 controlled, att
acking target smb://10.10.181.233
[*] Authenticating against smb://10.10.181.233 as SALUDTOTAL/SRVINTRANETNEW$ SUCCEED
[*] SMBD-Thread-6 (process_request_thread): Connection from SALUDTOTAL/SRVINTRANETNEW$@::ffff:10.10.150.33 controlled, att
acking target smb://10.10.181.215
[-] DCERPC Runtime Error: code: 0x5 - rpc_s_access_denied
[*] Authenticating against smb://10.10.181.215 as SALUDTOTAL/SRVINTRANETNEW$ SUCCEED
[*] SMBD-Thread-6 (process_request_thread): Connection from SALUDTOTAL/SRVINTRANETNEW$@::ffff:10.10.150.33 controlled, att
acking target smb://10.10.150.11
[-] DCERPC Runtime Error: code: 0x5 - rpc_s_access_denied
[*] Authenticating against smb://10.10.150.11 as SALUDTOTAL/SRVINTRANETNEW$ SUCCEED
[*] SMBD-Thread-6 (process_request_thread): Connection from SALUDTOTAL/SRVINTRANETNEW$@::ffff:10.10.150.33 controlled, att
acking target smb://10.10.150.39
[-] DCERPC Runtime Error: code: 0x5 - rpc_s_access_denied
[*] Authenticating against smb://10.10.150.39 as SALUDTOTAL/SRVINTRANETNEW$ SUCCEED
[*] SMBD-Thread-6 (process_request_thread): Connection from SALUDTOTAL/SRVINTRANETNEW$@::ffff:10.10.150.33 controlled, att
acking target smb://10.10.150.113
[-] DCERPC Runtime Error: code: 0x5 - rpc_s_access_denied
[*] Authenticating against smb://10.10.150.113 as SALUDTOTAL/SRVINTRANETNEW$ SUCCEED
[*] SMBD-Thread-6 (process_request_thread): Connection from SALUDTOTAL/SRVINTRANETNEW$@::ffff:10.10.150.33 controlled, att
acking target smb://10.10.150.112
The remainder of this output has been snipped for reporting purposes.
SRVINTRANETNEW$::SALUDTOTAL:4141414141414141:7b7ccc683ead4c48e1a21da9a98cf832:01...[partially-obfuscated]
This phase of the security assessment focused on the security of network assets within the internal network environment. During
this phase, Vonahi Security used a comprehensive set of tools, custom scripts, and manual techniques to thoroughly identify
possible threats to the environment. Like a traditional penetration test, all identified threats were tested and validated to evaluate
the depth of compromise. Unlike a traditional penetration test, this evaluation of threats was not isolated or limited to a handful of
threats, but rather across all threats identified.
Observation
Intelligent Platform Management Interface (IPMI) is a hardware solution that allows network administrators to centrally
control and manage servers. When setting up a server with IPMI, some servers may contain vulnerabilities that allow for
an attacker to remotely bypass the authentication process, resulting in extracting the password hash. In some cases, an
attacker may also be able to identify the cleartext password if the hash of the password is still default or weak.
Security Impact
By extracting the cleartext password, an attacker may be able to gain remote access to the service. This access may be
to the service's Secure Shell (SSH), Telnet, or even web interfaces. Successful access could result in the manipulation
of configurations that may negatively impact the availability of services provided by the compromised server.
Affected Nodes
SIXTEEN (16) NODES AFFECTED
Recommendation
Since there is no patch available for this particular vulnerability, it is recommended to perform one or more of the
following actions.
Restrict IPMI access to a limited amount of systems - systems that require access for administration purposes.
Disable the IPMI service if it is not required for business operations.
Change the default administrator password to one that is strong and complex.
Only use secure protocols, such as HTTPS and SSH, on the service to limit the chances of an attacker
successfully obtaining this password in a man-in-the-middle attack.
Reproduction Steps
Leveraging the Metasploit framework, configure and run the following module against the affected service:
auxiliary/scanner/ipmi/ipmi_dumphashes
References
https://www.zenlayer.com/blog/what-is-ipmi/
https://www.tenable.com/plugins/nessus/68931
https://beyondsecurity.com/scan-pentest-network-multiple-vendor-ipmi-cipher-zero-authentication-bypass-
vulnerability.html?cn-reloaded=1
Evidence
[+] 10.10.150.26:623 - IPMI - Hash found: [+] 10.10.150.26:623 - IPMI - Hash found: USERID:10dd817204050003571d3a3
f267d51dc[partially-obfuscated]45524944:275d47c23482ada32189a0ac24459967a0ab71d0
[+] 10.10.150.28:623 - IPMI - Hash found: [+] 10.10.150.28:623 - IPMI - Hash found: USERID:fe41fca504050003bc5009c
193641db5[partially-obfuscated]45524944:3b4f7547f1462f31c9aaee1d35f07d457500269e
[+] 10.10.150.23:623 - IPMI - Hash found: [+] 10.10.150.23:623 - IPMI - Hash found: USERID:28ceaf0a040e00037367327
9142215ec[partially-obfuscated]45524944:84284de15b468e9458a0f46371f42cba17b12e9d
[+] 10.10.150.27:623 - IPMI - Hash found: [+] 10.10.150.27:623 - IPMI - Hash found: USERID:4a8c49a6040500032031bc0
46b39166d[partially-obfuscated]45524944:aa04a11c3e16b7fa6b9828657d28eeef286826f9
[+] 10.10.150.188:623 - IPMI - Hash found: [+] 10.10.150.188:623 - IPMI - Hash found: USERID:966126e000050003dfe60
21e83ad5aa5[partially-obfuscated]45524944:6f6e7efb6e6399e95bf428205d3c8fa46eec0865
[+] 10.10.150.25:623 - IPMI - Hash found: [+] 10.10.150.25:623 - IPMI - Hash found: USERID:46b1e49d0405000393ae128
b0ff53f67[partially-obfuscated]45524944:dc3d75992fada21f2f5ac2a0c2f9b1bedc40c29f
[+] 10.10.150.29:623 - IPMI - Hash found: [+] 10.10.150.29:623 - IPMI - Hash found: USERID:24069dd50405000301d163a
efcf86d20[partially-obfuscated]45524944:79a9cdadda41eef10c76d25fc8ec921c96686385
[+] 10.10.150.220:623 - IPMI - Hash found: [+] 10.10.150.220:623 - IPMI - Hash found: Administrator:26f14f553840a9
2eb1d88f8a90c3e8e4[partially-obfuscated]61746f72:4349868169de2601b9bf21a5181b34afd44ef29b
[+] 10.10.150.24:623 - IPMI - Hash found: [+] 10.10.150.24:623 - IPMI - Hash found: USERID:fba997b5040500030dce4e5
fba7c0052[partially-obfuscated]45524944:a9f08f9fa343d3035440d57a43be22e2db5aab8c
[+] 10.10.150.228:623 - IPMI - Hash found: [+] 10.10.150.228:623 - IPMI - Hash found: Administrator:28b383843311d3
530f1072bf0d9b74be[partially-obfuscated]61746f72:e1aae4a4c939d1f83eefb14f95d393b6de7ada6b
[+] 10.10.150.234:623 - IPMI - Hash found: [+] 10.10.150.234:623 - IPMI - Hash found: Administrator:64962315c273fb
649573048e6a6a9787[partially-obfuscated]61746f72:ae267cdfc3c1af5af92366a837586c8a611c05b7
[+] 10.10.150.227:623 - IPMI - Hash found: [+] 10.10.150.227:623 - IPMI - Hash found: Administrator:943d9c533311d3
Observation
IPv6 DNS spoofing is possible due to the possibility of deploying a rogue DHCPv6 server on the internal network. Since
Microsoft Windows systems prefer IPv6 over IPv4, IPv6-enabled clients will prefer to obtain IP address configurations
from a DHCPv6 server when one is available.
During an attack such as the one performed during this assessment, an IPv6 DNS server was assigned to IPv6-enabled
clients; however, the IPv6-enabled clients retained their pre-existing IPv4 address configurations - IP address, default
gateway, and subnet mask.
Security Impact
By deploying a rogue DHCPv6 server, an attacker is able to intercept DNS requests by reconfiguring IPv6-enabled
clients to use the attacker's system as the DNS server. Such an attack could potentially lead to the successful capture of
sensitive information, including user credentials and other information. Resolving all DNS names to an attacker's system
results in the victim's system communicating with services such as SMB, HTTP, RDP, MSSQL, etc. all hosted on the
attacker's system.
Affected Nodes
THIRTY-FIVE (35) NODES AFFECTED
Recommendation
Disable IPv6 unless it is required for business operations. As disabling IPv6 could potentially cause an interruption in
network services, it is strongly advised to test this configuration prior to mass deployment. An alternative solution would
be to implement DHCPv6 guard on network switches. Essentially, DHCPv6 guard ensures that only an authorized list of
DHCP servers are allowed to assign leases to clients.
Reproduction Steps
Leveraging the "mitm6" tool within Kali Linux, a user is able to quickly deploy a DHCPv6 server within the local network
and assign five-minute leases (by default) to IPv6-enabled clients.
References
https://blog.fox-it.com/2018/01/11/mitm6-compromising-ipv4-networks-via-ipv6/
Evidence
IPv6 address fe80::9345:3 is now assigned to mac=00:50:56:ba:f9:cb host=SRVIISBOG03.saludtotal.loc. ipv4=
IPv6 address fe80::9345:4 is now assigned to mac=00:50:56:ba:c7:a6 host=SRVINTRABOG01.saludtotal.loc. ipv4=
Sent spoofed reply for time.windows.com. to fe80::9345:3
IPv6 address fe80::9345:5 is now assigned to mac=00:50:56:ba:7e:ff host=SRVINTRABOG02.saludtotal.loc. ipv4=
IPv6 address fe80::9345:1 is now assigned to mac=2c:44:fd:7c:3d:39 host=ColectorST. ipv4=
IPv6 address fe80::9345:6 is now assigned to mac=52:54:00:73:fe:60 host=proxy-st. ipv4=
IPv6 address fe80::9345:7 is now assigned to mac=00:50:56:ba:f9:8a host=SRVNCHDBOG01. ipv4=
IPv6 address fe80::9345:8 is now assigned to mac=52:54:00:ad:d6:7a host=nessus-2. ipv4=
--snipped--
Observation
Link-Local Multicast Name Resolution (LLMNR) is a protocol used amongst workstations within an internal network
environment to resolve a domain name system (DNS) name when a DNS server does not exist or cannot be helpful.
When a system attempts to resolve a DNS name, the system proceeds with the following steps:
1. The system checks its local host file to determine if an entry exists to match the DNS name in question with an IP
address.
2. If the system does not have an entry in its local host's file, the system then sends a DNS query to its configured DNS
server(s) to attempt to retrieve an IP address that matches the DNS name in question.
3. If the configured DNS server(s) cannot resolve the DNS name to an IP address, the system then sends an LLMNR
broadcast packet on the local network to seek assistance from other systems.
Security Impact
Since the LLMNR queries are broadcasted across the network, any system can respond to these queries with the IP
address of the DNS name in question. This can be abused by malicious attackers since an attacker can respond to all of
these queries with the IP address of the attacker's system. Depending on the service that the victim was attempting to
communicate with (e.g. SMB, MSSQL, HTTP, etc.), an attacker may be able to capture sensitive cleartext and/or hashed
account credentials. Hashed credentials can, many times, be recovered in a matter of time using computing modern-day
computing power and brute-force techniques.
Affected Nodes
SEVEN (7) NODES AFFECTED
Recommendation
The most effective method for preventing exploitation is to configure the Multicast Name Resolution registry key in order
to prevent systems from using LLMNR queries.
Using Group Policy: Computer Configuration\Administrative Templates\Network\DNS Client \Turn off Multicast
Name Resolution = Enabled (To administer a Windows 2003 DC, use the Remote Server Administration Tools for
Reproduction Steps
On a system configured with LLMNR, attempt to interact with a DNS name that is known to be invalid (e.g.
test123.local). On another system, use a network packet analyzer, such as Wireshark, to inspect the broadcasted traffic
on the internal network environment.
References
https://attack.mitre.org/techniques/T1557/001/
Evidence
2024-10-04 06:11:34,362 - [*] [LLMNR] Poisoned answer sent to 10.10.150.61 for name SERHSRTS01
2024-10-04 06:11:34,362 - [*] [LLMNR] Poisoned answer sent to 10.10.150.61 for name SERHSRTS01
2024-10-04 06:11:36,098 - [*] [LLMNR] Poisoned answer sent to 10.10.150.150 for name BOGCIR4313707
2024-10-04 06:11:36,189 - [*] [LLMNR] Poisoned answer sent to 10.10.150.150 for name BOGCIR4313707
2024-10-04 06:11:43,779 - [*] [LLMNR] Poisoned answer sent to 10.10.150.98 for name BOGSUCASDAUX188
2024-10-04 06:11:43,779 - [*] [LLMNR] Poisoned answer sent to 10.10.150.98 for name BOGSUCASDAUX188
2024-10-04 06:05:12,627 - [*] [LLMNR] Poisoned answer sent to 10.10.150.98 for name CPO31DIGITOUCH0
2024-10-04 06:05:12,627 - [*] [LLMNR] Poisoned answer sent to 10.10.150.98 for name CPO31DIGITOUCH0
2024-10-04 06:05:19,036 - [*] [LLMNR] Poisoned answer sent to 10.10.150.106 for name gpsutg
2024-10-04 06:05:19,037 - [*] [LLMNR] Poisoned answer sent to 10.10.150.106 for name gpsutg
2024-10-04 06:05:24,395 - [*] [LLMNR] Poisoned answer sent to 10.10.150.106 for name gpsutg
2024-10-04 06:05:24,396 - [*] [LLMNR] Poisoned answer sent to 10.10.150.106 for name gpsutg
2024-10-04 06:17:53,892 - [*] [LLMNR] Poisoned answer sent to 10.10.150.98 for name CPO31DIGITOUCH0
2024-10-04 06:17:53,892 - [*] [LLMNR] Poisoned answer sent to 10.10.150.98 for name CPO31DIGITOUCH0
2024-10-04 06:18:25,283 - [*] [LLMNR] Poisoned answer sent to 10.10.150.98 for name BOGADM109PSUP06
2024-10-04 06:18:25,284 - [*] [LLMNR] Poisoned answer sent to 10.10.150.98 for name BOGADM109PSUP06
2024-10-04 06:24:17,663 - [*] [LLMNR] Poisoned answer sent to 10.10.150.2 for name CPO11BHM
2024-10-04 06:24:17,695 - [*] [LLMNR] Poisoned answer sent to 10.10.150.2 for name CPO11BHM
2024-10-04 06:24:23,042 - [*] [LLMNR] Poisoned answer sent to 10.10.150.98 for name CPO31DIGITOUCH0
2024-10-04 06:24:23,042 - [*] [LLMNR] Poisoned answer sent to 10.10.150.98 for name CPO31DIGITOUCH0
2024-10-04 06:24:44,076 - [*] [LLMNR] Poisoned answer sent to 10.10.150.98 for name BOGADMA685LID02
--snipped--
Observation
Multicast DNS (mDNS) is a protocol used within small networks to resolve a domain name system (DNS) name when a
local DNS server does not exist.
When a system attempts to resolve a DNS name, the system proceeds with the following steps:
1. The system checks its local host file to determine if an entry exists to match the DNS name in question with an IP
address.
2. On small networks where no DNS Server is configured, the system then uses mDNS to send an IP multicast query
message to the systems on the local subnet that asks the host having that name to identify itself. Attackers can take
advantage of this by answering this request and impersonating a system on the network.
Security Impact
Since the mDNS queries are sent to systems on the local subnet, any system can respond to these queries with the IP
address of the DNS name in question. This can be abused by malicious attackers since an attacker can respond to all of
these queries with the IP address of the attacker's system. Depending on the service that the victim was attempting to
communicate with (e.g. SMB, MSSQL, HTTP, etc.), an attacker may be able to capture sensitive cleartext and/or hashed
account credentials. Hashed credentials can, many times, be recovered in a matter of time using computing modern-day
computing power and brute-force techniques.
Affected Nodes
TWENTY (20) NODES AFFECTED
Recommendation
The most effective method for preventing exploitation is to disable mDNS altogether if it is not being used. Depending on
the implementation, this can be achieved by disabling the Apple Bonjour or avahi-daemon service.
Reproduction Steps
On a system configured with mDNS, attempt to interact with a DNS name that is known to be invalid (e.g. test123.local).
On another system, use a network packet analyzer, such as Wireshark, to inspect the mDNS traffic on the internal
network environment by filtering for UDP queries over port 5353.
References
http://www.multicastdns.org/
Evidence
2024-10-04 06:11:33,368 - [*] [MDNS] Poisoned answer sent to 10.10.150.98 for name CPO31DIGITOUCH0.local
2024-10-04 06:11:33,383 - [*] [MDNS] Poisoned answer sent to 10.10.150.98 for name CPO31DIGITOUCH0.local
2024-10-04 06:11:34,360 - [*] [MDNS] Poisoned answer sent to 10.10.150.61 for name SERHSRTS01.local
2024-10-04 06:11:34,361 - [*] [MDNS] Poisoned answer sent to 10.10.150.61 for name SERHSRTS01.local
2024-10-04 06:11:36,005 - [*] [MDNS] Poisoned answer sent to 10.10.150.16 for name SRVFACBOG01.local
2024-10-04 06:11:36,005 - [*] [MDNS] Poisoned answer sent to 10.10.150.16 for name SRVFACBOG01.local
2024-10-04 06:11:36,097 - [*] [MDNS] Poisoned answer sent to 10.10.150.150 for name BOGCIR4313707.local
2024-10-04 06:11:36,189 - [*] [MDNS] Poisoned answer sent to 10.10.150.150 for name BOGCIR4313707.local
2024-10-04 06:11:37,028 - [*] [MDNS] Poisoned answer sent to 10.10.150.114 for name DBAUTORIZACIONE.local
2024-10-04 06:11:39,994 - [*] [MDNS] Poisoned answer sent to 10.10.150.114 for name DBAUTORIZACIONE.local
2024-10-04 06:11:39,995 - [*] [MDNS] Poisoned answer sent to 10.10.150.114 for name DBAUTORIZACIONE.local
2024-10-04 06:11:40,369 - [*] [MDNS] Poisoned answer sent to 10.10.150.122 for name DBIPS.local
2024-10-04 06:11:40,369 - [*] [MDNS] Poisoned answer sent to 10.10.150.122 for name DBIPS.local
2024-10-04 06:11:43,388 - [*] [MDNS] Poisoned answer sent to 10.10.150.114 for name LS_AUTO.local
2024-10-04 06:11:43,388 - [*] [MDNS] Poisoned answer sent to 10.10.150.114 for name LS_AUTO.local
2024-10-04 06:11:43,779 - [*] [MDNS] Poisoned answer sent to 10.10.150.98 for name BOGSUCASDAUX188.local
2024-10-04 06:11:43,779 - [*] [MDNS] Poisoned answer sent to 10.10.150.98 for name BOGSUCASDAUX188.local
2024-10-04 06:11:44,893 - [*] [MDNS] Poisoned answer sent to 10.10.150.115 for name SHIELDDTC.local
2024-10-04 06:11:45,918 - [*] [MDNS] Poisoned answer sent to 10.10.150.116 for name LS_OPSALUD.local
2024-10-04 06:05:12,207 - [*] [MDNS] Poisoned answer sent to 10.10.150.114 for name SHIELD.local
2024-10-04 06:05:12,625 - [*] [MDNS] Poisoned answer sent to 10.10.150.98 for name CPO31DIGITOUCH0.local
--snipped--
Observation
NetBIOS Name Service (NBNS) is a protocol used amongst workstations within an internal network environment to
resolve a domain name system (DNS) name when a DNS server does not exist or cannot be helpful.
When a system attempts to resolve a DNS name, the system proceeds with the following steps:
1. The system checks its local host file to determine if an entry exists to match the DNS name in question with an IP
address.
2. If the system does not have an entry in its local hosts file, the system then sends a DNS query to its configured DNS
server(s) to attempt retrieving an IP address that matches the DNS name in question.
3. If the configured DNS server(s) cannot resolve the DNS name to an IP address, the system then sends an NBNS
broadcast packet on the local network to seek assistance from other systems.
Security Impact
Since the NBNS queries are broadcasted across the network, any system can respond to these queries with the IP
address of the DNS name in question. This can be abused by malicious attackers since an attacker can respond to all of
these queries with the IP address of the attacker's system. Depending on the service that the victim was attempting to
communicate with (e.g. SMB, MSSQL, HTTP, etc.), an attacker may be able to capture sensitive cleartext and/or hashed
account credentials. Hashed credentials can, many times, be recovered in a matter of time using computing modern-day
computing power and brute-force techniques.
Affected Nodes
TEN (10) NODES AFFECTED
Recommendation
Configure the UseDnsOnlyForNameResolutions registry key in order to prevent systems from using NBNS queries
(http://technet.microsoft.com/en-us/library/cc775874(v=ws.10).aspx). Set the registry DWORD to 1.
Disable the NetBIOS service for all Windows hosts in the internal network. This can be done via DHCP options,
network adapter settings, or a registry key.
Reproduction Steps
On a system configured with NBNS, attempt to interact with a DNS name that is known to be invalid (e.g. test123.local).
On another system, use a network packet analyzer, such as Wireshark, to inspect the broadcasted traffic on the internal
network environment.
References
http://markgamache.blogspot.com/2013/01/ntlm-challenge-response-is-100-broken.html
http://support.microsoft.com/kb/313314
http://develnet.blogspot.com/2006/10/disabling-netbios-over-tcpip-via.html
http://technet.microsoft.com/en-us/library/cc775874(v=ws.10).aspx
Evidence
2024-10-04 06:11:33,110 - [*] [NBT-NS] Poisoned answer sent to 10.10.150.98 for name CPO31DIGITOUCH0 (service: Wor
kstation/Redirector)
2024-10-04 06:11:34,360 - [*] [NBT-NS] Poisoned answer sent to 10.10.150.61 for name SERHSRTS01 (service: Workstat
ion/Redirector)
2024-10-04 06:11:36,097 - [*] [NBT-NS] Poisoned answer sent to 10.10.150.150 for name BOGCIR4313707 (service: Work
station/Redirector)
2024-10-04 06:11:37,378 - [*] [NBT-NS] Poisoned answer sent to 10.10.150.33 for name NTAUTHORITY (service: File Se
rver)
2024-10-04 06:11:37,581 - [*] [NBT-NS] Poisoned answer sent to 10.10.150.156 for name SRVTMOSBOG01 (service: Works
tation/Redirector)
2024-10-04 06:11:38,330 - [*] [NBT-NS] Poisoned answer sent to 10.10.150.156 for name SRVTMOSBOG01 (service: Works
tation/Redirector)
2024-10-04 06:11:39,080 - [*] [NBT-NS] Poisoned answer sent to 10.10.150.156 for name SRVTMOSBOG01 (service: Works
tation/Redirector)
2024-10-04 06:11:39,841 - [*] [NBT-NS] Poisoned answer sent to 10.10.150.156 for name SRVTMOSBOG01 (service: Works
tation/Redirector)
2024-10-04 06:11:40,590 - [*] [NBT-NS] Poisoned answer sent to 10.10.150.156 for name SRVTMOSBOG01 (service: Works
tation/Redirector)
2024-10-04 06:11:41,341 - [*] [NBT-NS] Poisoned answer sent to 10.10.150.156 for name SRVTMOSBOG01 (service: Works
tation/Redirector)
2024-10-04 06:11:43,778 - [*] [NBT-NS] Poisoned answer sent to 10.10.150.98 for name BOGSUCASDAUX188 (service: Wor
kstation/Redirector)
2024-10-04 06:11:47,099 - [*] [NBT-NS] Poisoned answer sent to 10.10.150.156 for name SRVTMOSBOG01 (service: Works
tation/Redirector)
2024-10-04 06:11:47,848 - [*] [NBT-NS] Poisoned answer sent to 10.10.150.156 for name SRVTMOSBOG01 (service: Works
tation/Redirector)
2024-10-04 06:11:48,598 - [*] [NBT-NS] Poisoned answer sent to 10.10.150.156 for name SRVTMOSBOG01 (service: Works
tation/Redirector)
2024-10-04 06:11:54,359 - [*] [NBT-NS] Poisoned answer sent to 10.10.150.156 for name SRVTMOSBOG01 (service: Works
tation/Redirector)
2024-10-04 06:11:55,108 - [*] [NBT-NS] Poisoned answer sent to 10.10.150.156 for name SRVTMOSBOG01 (service: Works
tation/Redirector)
2024-10-04 06:05:15,930 - [*] [NBT-NS] Poisoned answer sent to 10.10.150.156 for name SRVTMOSBOG01 (service: Works
tation/Redirector)
--snipped--
Observation
An outdated Microsoft Windows system raises several concerns as the system is no longer receiving updates by
Microsoft. This could be a prime target for an attacker as these systems typically do not contain the latest security
updates, often times leaving them vulnerable to significant threats.
Security Impact
An exploited Microsoft Windows system could potentially result in an attacker gaining unauthorized access to the
affected system(s). Additionally, depending on the similarities in configurations between the compromised system(s) and
other systems within the network, an attacker may be able to pivot from this system to other systems and resources
within the environment.
Affected Nodes
TEN (10) NODES AFFECTED
Recommendation
Replace outdated versions of Microsoft Windows with operating systems that are up-to-date and supported by the
manufacturer.
Reproduction Steps
Use an operating system identification scanner, such as Nmap or Metasploit, to scan the affected targets to identify their
specific versions. Alternatively, a network administrator can check the operating system version by logging into the
system and viewing the operating system version through the system properties.
Evidence
SMB 10.10.150.10 445 SRVICPBOG01 [*] Windows Server 2008 R2 Standard 7601 Service
Pack 1 x64 (name:SRVICPBOG01) (domain:saludtotal.loc) (signing:False) (SMBv1:True)
SMB 10.10.150.33 445 SRVINTRANETNEW [*] Windows Server 2008 R2 Standard 7601 Service
Pack 1 x64 (name:SRVINTRANETNEW) (domain:saludtotal.loc) (signing:False) (SMBv1:True)
SMB 10.10.150.156 445 SRVTMGBOG02 [*] Windows Server 2008 R2 Standard 7601 Service
Pack 1 (name:SRVTMGBOG02) (domain:saludtotal.loc) (signing:False) (SMBv1:True)
SMB 10.10.150.11 445 SRVRSBOG02 [*] Windows Server 2012 R2 Standard 9600 x64 (nam
e:SRVRSBOG02) (domain:saludtotal.loc) (signing:False) (SMBv1:True)
SMB 10.10.150.9 445 SRVRSBOG01 [*] Windows Server 2012 R2 Standard 9600 x64 (nam
e:SRVRSBOG01) (domain:saludtotal.loc) (signing:False) (SMBv1:True)
SMB 10.10.150.41 445 SRVMONBOG01 [*] Windows Server 2012 R2 Standard 9600 x64 (nam
e:SRVMONBOG01) (domain:saludtotal.loc) (signing:False) (SMBv1:True)
SMB 10.10.150.104 445 SRVODISSY01 [*] Windows Server 2012 R2 Standard 9600 x64 (nam
e:SRVODISSY01) (domain:saludtotal.loc) (signing:False) (SMBv1:True)
SMB 10.10.150.161 445 SRVODISSY02 [*] Windows Server 2012 R2 Standard 9600 x64 (nam
e:SRVODISSY02) (domain:saludtotal.loc) (signing:False) (SMBv1:True)
SMB 10.10.181.95 445 SRVODYPRB001 [*] Windows Server 2012 R2 Standard 9600 x64 (nam
e:SRVODYPRB001) (domain:saludtotal.loc) (signing:False) (SMBv1:True)
Observation
During testing, it was possible to discover the use of default/common credentials for FTP servers. A limited password
attack was performed against the identified applications to determine if weak or default credentials were present.
Caution was exercised to avoid locking out any legitimate user or service accounts.
Security Impact
Exposing the applications with default credentials could allow an attacker to authenticate to the affected applications.
Depending on the application's functionality, this could lead to the manipulation of critical network devices, resulting in a
compromise of data and/or systems.
Affected Nodes
TWO (2) NODES AFFECTED
Recommendation
Connect to the affected devices via FTP or otherwise and change the default credentials to use passwords that adhere
with the organization's password complexity requirements.
Reproduction Steps
Connect to the affected FTP server(s) and attempt to authenticate using default credentials.
Evidence
[+] 10.10.150.10:21 - 10.10.150.10:21 - Login Successful: default:[obfuscated]
[+] 10.10.150.33:21 - 10.10.150.33:21 - Login Successful: default:[obfuscated]
[+] 10.10.150.10:21 - 10.10.150.10:21 - Login Successful: localadmin:[obfuscated]
[+] 10.10.150.33:21 - 10.10.150.33:21 - Login Successful: localadmin:[obfuscated]
[+] 10.10.150.10:21 - 10.10.150.10:21 - Login Successful: user:[obfuscated]
[+] 10.10.150.33:21 - 10.10.150.33:21 - Login Successful: user:[obfuscated]
[+] 10.10.150.33:21 - 10.10.150.33:21 - Login Successful: user1:[obfuscated]
Observation
Server Message Block (or SMB) is a communication protocol used in Windows operating systems to communicate with
each other over a network. SMB serves an important part in an Active Directory environment as it provides file sharing,
printer sharing, and network browsing to machines in the environment. It also allows for processes to communicate with
each other using a concept called named pipes, and this is what's known as inter-process communication.
Security Impact
SMBv1 has been depreciated by Microsoft since 2013. Due to this, SMBv1 has become outdated and contains multiple
exploits/vulnerabilities that can allow remote control execution on the target machine using this protocol.
Affected Nodes
FOURTEEN (14) NODES AFFECTED
Recommendation
To stay protected from exploits that target vulnerabilities in this protocol, it's recommended to disable SMBv1 in favor of
SMBv2/v3.
Microsoft has published documentation on their site about disabling SMBv1, as well as upgrading to SMBv2/v3 in just a
few commands.
Reproduction Steps
The CrackMapExec tool can be utilized to check whether or not a host has SMBv1 enabled. To do so the following
command can be used:
SMB 10.10.10.10 445 SRV [*] Windows Server 2012 R2 Standard 9600 x64 (name:SRV) (domain:domain.l
ocal) (SMBv1:True)
The (SMBv1:True) part of the response is what indicates whether or not SMBv1 is in use. In this case you can see it
shows that this host has SMBv1 enabled since the value is set to True.
References
WannaCry: What is WANNACRY/WANACRYPTOR? (cisa.gov)
Petya: Petya Destructive Malware Variant Spreading via Stolen Credentials and EternalBlue Exploit | Mandiant
Bad Rabbit: Bad Rabbit, Software S0606 | MITRE ATT&CK®
Evidence
SMB 10.10.150.39 445 SRVINTRABOG02 [*] Windows Server 2022 Standard 20348 x64 (name:
SRVINTRABOG02) (domain:saludtotal.loc) (signing:False) (SMBv1:True)
SMB 10.10.150.11 445 SRVRSBOG02 [*] Windows Server 2012 R2 Standard 9600 x64 (nam
e:SRVRSBOG02) (domain:saludtotal.loc) (signing:False) (SMBv1:True)
SMB 10.10.150.15 445 SRVMABOG01 [*] Windows Server 2016 Standard 14393 x64 (name:
SRVMABOG01) (domain:saludtotal.loc) (signing:False) (SMBv1:True)
SMB 10.10.150.10 445 SRVICPBOG01 [*] Windows Server 2008 R2 Standard 7601 Service
Pack 1 x64 (name:SRVICPBOG01) (domain:saludtotal.loc) (signing:False) (SMBv1:True)
SMB 10.10.150.34 445 SRVINTRABOG01 [*] Windows Server 2022 Standard 20348 x64 (name:
SRVINTRABOG01) (domain:saludtotal.loc) (signing:False) (SMBv1:True)
SMB 10.10.150.33 445 SRVINTRANETNEW [*] Windows Server 2008 R2 Standard 7601 Service
Pack 1 x64 (name:SRVINTRANETNEW) (domain:saludtotal.loc) (signing:False) (SMBv1:True)
Observation
An Active Directory Domain Password Policy is extremely critical as it is the security settings that many domain user
accounts will use when having their accounts configured. These policies include lockout thresholds, lockout durations,
minimum characters required, password complexity requirements, and more. During post-exploitation, it was discovered
that the password policy configured does not meet security best practices.
Security Impact
A weak password policy can be disastrous for a company in that it allows attackers to exploit the weaknesses of domain
user accounts. For example, the lack of a strict account lockout threshold allows malicious attackers to perform
numerous login attempts to domain user accounts prior to being locked out. Here are some of the security impacts that
can be associated with domain password policies:
Minimum password length: An attacker can take advantage of this by trying weak passwords that exist in the
dictionary, such as Apple, Car, Dog, etc. By increasing the minimum password length, an attacker's chances of
successfully guessing and/or even cracking (through password cracking techniques) a password is much lower.
Lockout threshold: If the lockout threshold value is too low, an attacker can perform numerous login attempts to
the user accounts before locking out an account, which then depends on the lockout duration for unlocking the
domain user account.
Lockout duration (minutes): If the account does not remain locked out for a long period of time, then attackers
can continuously perform login attempts every X amount of minutes that the account gets unlocked. A small
number increases the chances of a successful attack as the disruption to user accounts will be minimum.
Lockout observation window (minutes): By default, Microsoft Windows sets this to 30. This setting indicates how
many times someone can perform a login attempt before it subtracts from the lockout threshold. For example, if this
setting is set to 30, then this means an attacker can perform one login attempt per 30 minutes, and the lockout
threshold will never exceed the value of 1 because the observation window resets the counter every 30 minutes.
Recommendation
Use the references to reconfigure your domain's password policy to adhere to security best practices. It is crucial to
enforce complex passwords. In addition, the following minimum configurations are recommended:
Note: the Lockout threshold / Account Lockout Threshold configuration should not be set to 0, because that disables the
threshold and can allow malicious actors to perform bruteforce password attacks without the risk of locking out users.
Reproduction Steps
References
https://blog.devolutions.net/2018/02/top-10-password-policies-and-best-practices-for-system-administrators
https://www.microsoft.com/en-us/microsoft-365/blog/2018/03/05/azure-ad-and-adfs-best-practices-defending-
against-password-spray-attacks/
Evidence
The following weak Active Directory password policy settings were identified for the saludtotal.loc domain:
Observation
A file transfer protocol (FTP) service allows users to transfer files to/from remote FTP servers. The FTP service typically
allows for setting user credentials, which could include complex usernames and passwords. However, during the case of
the assessment, testing identified that anonymous FTP was found present. Anonymous FTP servers allow for anyone to
login to the FTP server to browse the files that have been remotely uploaded.
Security Impact
The issue with anonymous FTP is that any individual, including an attacker, could gain remote access to the FTP server
and observe the contents within the server. Depending on anonymous permissions, an attacker may also be able to
leverage this default, weak configuration in order to store/transmit malicious code.
The exposure of files stored on anonymous FTP servers could present the opportunity for an attacker to compromise the
confidentiality and/or integrity of sensitive files that may be deemed for authorized access only.
Affected Nodes
ONE (1) NODE AFFECTED
Recommendation
If the anonymous FTP server is not required for business operations, consider disabling the service altogether and
updating the organization's configuration baseline. The configuration baseline should ensure that unnecessary services
are disabled prior to deployment. If the service is required for business operations, consider disabling anonymous
authentication and implementing authentication that leverages a complex password.
Reproduction Steps
Using the operating system's built in FTP client, Metasploit, or Nmap, connect to the affected FTP server(s) using
"anonymous/anonymous" (username and password).
Evidence
Nmap scan report for 10.10.150.139
Host is up, received arp-response (0.0020s latency).
Scanned at 2024-10-04 05:17:44 UTC for 0s
Observation
The File Transfer Protocol (FTP) service is used for client systems to connect to and store and retrieve files. However,
FTP does not encrypt the communications between the server and the client, exposing all data in cleartext. Although
FTP can negotiate to use TLS, the affected server(s) were not found to negotiate TLS.
Security Impact
Since FTP is cleartext, all of the traffic between the client and the server is exposed in cleartext. This presents the
opportunity for an attacker to perform a man-in-the-middle attack and obtain sensitive user credentials as well as file
contents. Such valuable information may also be useful for other attacks within the environment.
Affected Nodes
NINE (9) NODES AFFECTED
Recommendation
Disable the service if it is not needed for business operations. If transferring files is necessary for business operations,
then consider implementing Secure FTP (SFTP) as SFTP uses encryption during communications to/from SFTP clients.
Reproduction Steps
Use an FTP client to connect to one of the affected servers on port 21/tcp. The following syntax can be used to attempt
connecting to an FTP server:
ftp <server_ip_address>
telnet <server_ip_address> 21
If the command above works, then the remote server is listening on port 21/tcp.
References
https://www.ipa.go.jp/security/rfc/RFC2577EN.html
Evidence
[+] 10.10.150.10:21 - FTP Banner: '220-Microsoft FTP S -- snipped --
[+] 10.10.181.1:21 - FTP Banner: '220 FTP server read -- snipped --
[+] 10.10.150.75:21 - FTP Banner: '220 Microsoft FTP S -- snipped --
[+] 10.10.150.79:21 - FTP Banner: '220 Microsoft FTP S -- snipped --
[+] 10.10.150.139:21 - FTP Banner: '220 (vsFTPd 3.0.2)'
[+] 10.10.181.232:21 - FTP Banner: '220 Microsoft FTP S -- snipped --
[+] 10.10.150.33:21 - FTP Banner: '220-Microsoft FTP S -- snipped --
[+] 10.10.181.80:21 - FTP Banner: '220-Microsoft FTP S -- snipped --
[+] 10.10.181.88:21 - FTP Banner: '220-Microsoft FTP S -- snipped --
Observation
The telnet service is used for network administrators to perform remote administration of network devices. This service,
however, does not enforce encryption and, therefore, exposes all traffic in cleartext.
Security Impact
Since telnet communications are in cleartext, an attacker could perform a man-in-the-middle attack and obtain sensitive
information such as user credentials, command outputs, and more. Such valuable information may also be useful for
other attacks within the environment.
Affected Nodes
TWELVE (12) NODES AFFECTED
Recommendation
Disable the telnet service if it is not required for business operations. If it is required for business operations, consider
using an alternative protocol, such as Secure Shell (SSH), to accomplish the same goal with encryption being
implemented.
Reproduction Steps
Use a telnet client to connect to a telnet server. Using a network packet analyzer, such as Wireshark, observe the
References
https://isc.sans.edu/diary/Computer+Security+Awareness+Month+-+Day+18+-
+Telnet+an+oldie+but+a+goodie/7393
Evidence
[+] 10.10.181.1:23 - 10.10.181.1:23 TELNET login :
[+] 10.10.150.8:23 - 10.10.150.8:23 TELNET ********** -- snipped --
[+] 10.10.150.63:23 - 10.10.150.63:23 TELNET Fabric OS -- snipped --
[+] 10.10.150.62:23 - 10.10.150.62:23 TELNET Fabric OS -- snipped --
[+] 10.10.150.188:23 - 10.10.150.188:23 TELNET Welcome -- snipped --
[+] 10.10.181.50:23 - 10.10.181.50:23 TELNET Fabric OS -- snipped --
[+] 10.10.181.51:23 - 10.10.181.51:23 TELNET Fabric OS -- snipped --
[+] 10.10.181.212:23 - 10.10.181.212:23 TELNET Fabric O -- snipped --
[+] 10.10.181.213:23 - 10.10.181.213:23 TELNET Fabric O -- snipped --
[+] 10.10.150.208:23 - 10.10.150.208:23 TELNET Fabric O -- snipped --
[+] 10.10.150.209:23 - 10.10.150.209:23 TELNET Fabric O -- snipped --
[+] 10.10.150.217:23 - 10.10.150.217:23 TELNET Welcome -- snipped --
Observation
A Server Message Block protocol (SMB) service allows SMB NULL Session Authentication (i.e. without a username or
password). SMB NULL sessions allow anyone to log in to SMB shares to browse the files that have been remotely
uploaded.
Security Impact
The issue with SMB NULL sessions is that any individual, including an attacker, could gain remote access to the SMB
share and observe the contents. If the NULL session also provides write access, an attacker may also be able to
leverage this insecure configuration in order to store/transmit malicious code.
The exposure of files stored on affected SMB shares could present the opportunity for an attacker to compromise the
confidentiality and/or integrity of sensitive files that may be deemed for authorized access only.
Affected Nodes
TEN (10) NODES AFFECTED
Recommendation
If the SMB server is not required for business operations, consider disabling the service altogether and updating the
organization's configuration baseline. The configuration baseline should ensure that unnecessary services are disabled
prior to deployment. If the service is required for business operations, consider disabling SMB NULL session
authentication and implementing authentication that leverages a complex password.
Reproduction Steps
If the operation succeeds without any errors and smbclient prints information about the configured shares and/or
workgroups, the SMB server is affected.
The same checks can also be performed using dedicated scripts that are part of the Metasploit framework or the Nmap
portscanning tool.
Evidence
[10.10.150.2]
# crackmapexec smb 10.10.150.2 -u '' -p '' --local-auth
SMB 10.10.150.2 445 SRVDCBOG02 [+] SRVDCBOG02\:
------------------------------------------------------------
[10.10.150.33]
# crackmapexec smb 10.10.150.33 -u '' -p '' --local-auth
SMB 10.10.150.33 445 SRVINTRANETNEW [+] SRVINTRANETNEW\:
------------------------------------------------------------
[10.10.150.10]
# crackmapexec smb 10.10.150.10 -u '' -p '' --local-auth
SMB 10.10.150.10 445 SRVICPBOG01 [+] SRVICPBOG01\:
------------------------------------------------------------
[10.10.150.34]
# crackmapexec smb 10.10.150.34 -u '' -p '' --local-auth
SMB 10.10.150.34 445 SRVINTRABOG01 [+] SRVINTRABOG01\:
------------------------------------------------------------
[10.10.150.39]
# crackmapexec smb 10.10.150.39 -u '' -p '' --local-auth
SMB 10.10.150.39 445 SRVINTRABOG02 [+] SRVINTRABOG02\:
------------------------------------------------------------
[10.10.150.61]
--snipped--
Observation
Testing identified Microsoft Windows configuration concerns that could potentially result in an increased risk of an attack
against Microsoft operating systems within the targeted environment. By default, Microsoft Windows comes pre-installed
with several configuration issues that require network administrators to explicitly disable or enable to enhance security. If
these options are not modified, then these systems could remain vulnerable to several attacks.
More specifically, the SMB signing feature was not found to be required at the time of testing. SMB signing is a security
feature implemented by Microsoft to combat SMB relay attacks. An SMB relay attack occurs when an attacker tricks the
victim system into authenticating to the attacker, and the attacker relays those credentials to another system.
Security Impact
Since many organizations use Microsoft Windows and Active Directory environments to manage users, a successful
attack against a Microsoft Windows system could potentially expose the organization to other attacks, including privilege
escalation and lateral movement. Furthermore, many Microsoft Windows systems share similar configurations due to
Group Policy's ability to configure settings on a global scale. A single misconfiguration within Group Policy could present
significant threats.
As it relates to SMB signing, a successful SMB relay attack could provide an attacker with access to a system of the
attacker's choosing, depending on the permission levels of the authentication credentials being relayed. This could result
in remote command execution, access to resources, and more.
Affected Nodes
ONE HUNDRED AND SEVENTY (170) NODES AFFECTED
Recommendation
Enforce SMB signing by configuring this across the organization's systems via Group Policy.
References
https://docs.microsoft.com/en-us/windows-server/identity/ad-ds/plan/security-best-practices/best-practices-for-
securing-active-directory
https://www.microsoft.com/security/blog/2018/12/05/step-1-identify-users-top-10-actions-to-secure-your-
environment/
https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-security-baselines
https://support.microsoft.com/en-us/help/887429/overview-of-server-message-block-signing
Evidence
10.10.181.233:(signing:False)
10.10.181.215:(signing:False)
10.10.150.11:(signing:False)
10.10.150.39:(signing:False)
10.10.150.113:(signing:False)
10.10.150.112:(signing:False)
Observation
Simple Network Management Protocol (SNMP) is a protocol used by remote administration tools to enumerate
information about a particular SNMP-enabled device, such as running services, listening ports, etc. To perform this
process, the SNMP client uses an SNMP community string, which is essentially very similar to a password. If the correct
SNMP community string is provided, then it is possible to extract information from the remote device. When an SNMP
community string is default or can be easily guessed by malicious attackers, this allows for the unauthorized user to
extract information about the device.
Security Impact
Depending on the information extracted from the remote device, it could potentially expose additional security
vulnerabilities. These additional vulnerabilities may provide valuable information to an attacker to be able to conduct a
successful attack against the vulnerable system or other confidential/sensitive resources or systems.
Affected Nodes
THIRTEEN (13) NODES AFFECTED
Recommendation
Since SNMP is typically enabled by default, it should first be evaluated to determine if it should be enabled. If required,
change the default SNMP community string to one that meets the organization's password complexity requirements.
Finally, ensure that SNMPv3 is enabled if possible.
Evidence
[161][snmp] host: 10.10.150.209 password: private
[161][snmp] host: 10.10.150.243 password: public
--snipped--
Observation
An egress filtering check was performed as part of the internal network penetration test. This check aims to determine if
the internal environment allows excessive access to the public Internet, which could increase the risk of data exfiltration.
This check was not performed against a specific in-scope target, but on the public Internet in general to evaluate this
risk.
During this check, it was possible to identify access to an excessive number of ports residing on the public Internet. This
particular check targeted scanme.nmap.org, which is designed for organizations to check whether or not they have
access to servers on the public Internet.
Security Impact
Allowing end-users access to excessive services, such as SSH, Telnet, etc. allows for an attacker or end-user to bypass
security controls by exfiltrating information through other communication channels. During an attack, an attacker may
also leverage this excessive access to establish a command-and-control (C2) server to communicate commands and
data back and forth between a compromised system.
Recommendation
Disable access to services that are not required for business operations. Restricting access to only services that are
required for business operations allows the organizations to establish more control over communication channels,
allowing for inspection of indicators of compromise (IoC) as well as malicious data exfiltration attempts.
Reproduction Steps
With permission, perform a scan against an Internet-facing service that has an excessive amount of ports opened.
Analyze the results of the results to determine where services may be visible from the internal network environment.
Evidence
# Nmap 7.95 scan initiated Fri Oct 4 05:11:46 2024 as: nmap -sS -Pn -v -n -oA /root/pentest/172483/discovery/scan
me scanme.nmap.org
Nmap scan report for scanme.nmap.org ([external-ip])
Host is up (0.12s latency).
Other addresses for scanme.nmap.org (not scanned): 2600:3c01::f03c:91ff:fe18:bb2f
Not shown: 996 closed tcp ports (reset)
PORT STATE SERVICE
22/tcp open ssh
80/tcp open http
9929/tcp open nping-echo
31337/tcp open Elite