Hutch
Last updated
Was this helpful?
Last updated
Was this helpful?
Nmap scan
DNS recon turned up nothing.
This just turns up and IIS default landing page. Directory busting turned up nothing. After submitting my root and user flags I was able to look at the walkthrough. There was a vector here because the server uses webdav and I could have uploaded an ASPX reverse shell for a low privilege shell. Eh I found user credentials through LDAP first.
Tried kerberoasting the DC but came back with nothing.
Can get into RPC unauthenticated.
Unable to Enumdomusers or do much from RPC.
Got a lot of information enumerating LDAP.
Users found:
SMB login
Got a hint around this part that an authenticated ldap query might turn up more results. Already knew that the machine was using LAPS because of some of the files I found in SYSVOL. But did not know to do an authenticated LDAP query. Notes and methodology updated. LDAP Query