Information

About this lab

Navigate through a complex multi-machine lab, beginning with a SQL injection vulnerability leading to remote code execution and privilege escalation. Utilize lateral movement techniques, exploit Windows services, and harvest credentials to gain access to critical systems, culminating in full domain compromise. Hone your skills in privilege escalation, token impersonation, and exploiting misconfigurations.

Targets

External Network Information

IPPort
192.168.247.12022, 80
192.168.247.12180, 135, 139, 445, 5985
192.168.247.12222

Internal Network Information

IPPort
172.16.247.1053, 88, 135, 139, 445, 5985
172.16.247.11135, 445, 5985
172.16.247.12139, 445, 3389, 5985
172.16.247.13135, 445, 5985
172.16.247.1422
172.16.247.82135, 445, 3389
172.16.247.83135, 445, 5985

192.168.247.121

Initial Access

Accessed web service on port 80

Discovered SQL Injection vulnerability on login page

Executed Powershell reverse shell command via SQL Injection vulnerability

Reverse shell connection established successfully

Privilege Escalation

Created reverse shell executable file using msfvenom

Obtained administrator privilege using PrintSpoofer

Confirmed proof.txt file

Post-Exploitation

Enumerated domain user list

Dumped Windows logon credentials using mimikatz

Obtained plaintext password (Flowers1) for user joe


192.168.247.122

Initial Access

Discovered password ‘password’ via SSH brute force using Hydra

Connected via SSH as offsec account and confirmed local.txt file

Privilege Escalation

Checked privilege settings with command ‘sudo -l’ and exploited openvpn to gain root access

Confirmed proof.txt file

Post-Exploitation

Discovered SSH private key for mario account

Configured network tunneling using Ligolo


172.16.247.14

Initial Access

Accessed to system using previously discovered mario account’s SSH private key and confirmed local.txt file


172.16.247.11

Initial Access

Confirmed valid credentials (joe/Flowers) against WinRM service using nxc

Obtained PowerShell remote session via Evil-WinRM

Confimed local.txt file

Confirmed proof.txt file

Post-Exploitation

Discovered user NTLM hash information in C:\Users\joe\Documents\fileMonitorBackup.log file

Cracked wario’s plaintext password (Mushroom!) using hashcat


172.16.247.83

Initial Access

Successfully authenticated via WinRM using wario’s credentials through nxc

Obtained Powershell remote session via Evil-WinRM

Confirmed local.txt file

Privilege Escalation

Enermerated system using WinPEAS and discovered executable file modifiable by wario

Created reverse shell executable file using msfvenom for privilege escalation

Replaced original file with newly created reverse shell executable file and started service

Successfully obatained reverse shell with Administrator privileges and confirmed proof.txt file


172.16.247.82

Initial Access

Successfully authenticated to SMB service using ‘yoshi/Mushroom!’ credentilas via nxc

Connected via psexec and confirmed proof.txt file


172.16.247.12

Initial Access

Successfully authenticated to RDP service using ‘yoshi/Mushroom!’ credentials via nxc

Connected to RDP service

Confirmed local.txt file from desktop

Privilege Escalation

System enumeration using WinPEAS discovered modifiable file by yoshi

Event logs suggested the file was being executed periodically through Taks Scheduler

Created reverse shell executable file using msfvenom

Overwrote existing backup.exe file with newly created reverse shell executable file

Reverse shell connection established successfully after brief delay

Confirmed proof.txt file

Post-Exploitation

Dumped Windows logon credentials using mimikatz

Confirmed plaintext password for leon account


172.16.247.10

Initial Access

Successfully authenticated to SMB service using ‘leon/rabbit:)’ credentilas via nxc

Connected via psexec

Confirmed proof.txt file

Post-Exploitation

Discovered web01 access credentials in credentials.txt file located in same directory as proof.txt


172.16.247.13

Initial Access

Successfully authenticated to SMB service using ‘leon/rabbit:)’ credentials via nxc

Connected via psexec

Confirmed proof.txt file


192.168.247.120

Initial Access

Connected via SSH using previously discovered credentials

Privilege Escalation

Exploited sudo configuration to gain root privileges

Confirmed proof.txt file