Offensive Security Notes
  • OSCP Checklist
    • Privilege Escalation Windows
  • Menu
    • Services
      • Remote Desktop (RDP) (3389)
      • FTP (21)
      • Telnet (23)
      • SMTP (25)
      • HTTP/HTTPS (80/443)
        • OWASP TOP 10 (2017)
      • Kerberos (88) / Active Directory (AD)
      • NetBIOS (139)
      • Samba / SMB (445)
      • IMAP (143/993)
      • MySQL / MariaDB (3389)
      • PostgreSQL (5432)
    • Vulnerability Methods
      • Padding Oracle Attack
      • Unsecure JSON Web Token (JWT)
      • XXE (XML External Entity)
      • LFI / RFI (Local / Remote File Inclusion)
      • CSRF (Cross-Site Request Forgery)
      • Session Fixation
      • SSRF (Server-Side Request Forgery)
      • Wildcard Injection
    • Tools of the Trade
      • powershell
      • hashcat
      • responder
      • OWASP Favicon DB
      • misc
      • meterpreter
      • Bloodhound
      • powerview
      • redis
      • wpscan
      • cewl
    • Walkthroughs
      • Try Hack Me
        • Attacktive Directory
      • OSCP Practice
        • Vector
        • Vault
        • QuarterJack
        • PayDay
        • Pelican
        • Postfish
        • Readys
Powered by GitBook
On this page
  1. Menu
  2. Walkthroughs
  3. OSCP Practice

Vault

┌──(kali㉿kali)-[~/PGP/Vault]
└─$ sudo nmap -Pn --script vuln vault.offsec                                                                             1 ⨯
[sudo] password for kali: 
Starting Nmap 7.92 ( https://nmap.org ) at 2022-01-05 16:51 EST
Pre-scan script results:
| broadcast-avahi-dos: 
|   Discovered hosts:
|     224.0.0.251
|   After NULL UDP avahi packet DoS (CVE-2011-1002).
|_  Hosts are all up (not vulnerable).
Nmap scan report for vault.offsec (192.168.187.172)
Host is up (0.064s latency).
Not shown: 988 filtered tcp ports (no-response)
PORT     STATE SERVICE
53/tcp   open  domain
88/tcp   open  kerberos-sec
135/tcp  open  msrpc
139/tcp  open  netbios-ssn
389/tcp  open  ldap
445/tcp  open  microsoft-ds
464/tcp  open  kpasswd5
593/tcp  open  http-rpc-epmap
636/tcp  open  ldapssl
3268/tcp open  globalcatLDAP
3269/tcp open  globalcatLDAPssl
3389/tcp open  ms-wbt-server

Host script results:
|_smb-vuln-ms10-054: false
|_samba-vuln-cve-2012-1182: Could not negotiate a connection:SMB: Failed to receive bytes: ERROR
|_smb-vuln-ms10-061: Could not negotiate a connection:SMB: Failed to receive bytes: ERROR

Nmap done: 1 IP address (1 host up) scanned in 74.22 seconds
┌──(kali㉿kali)-[~/PGP/Vault]
└─$ crackmapexec smb vault.offsec -u 'guest' -p '' 
SMB         192.168.187.172 445    DC               [*] Windows 10.0 Build 17763 x64 (name:DC) (domain:vault.offsec) (signing:True) (SMBv1:False)
SMB         192.168.187.172 445    DC               [+] vault.offsec\guest: 
                                                                                                                             
┌──(kali㉿kali)-[~/PGP/Vault]
└─$ crackmapexec smb vault.offsec -u 'guest' -p '' --shares
SMB         192.168.187.172 445    DC               [*] Windows 10.0 Build 17763 x64 (name:DC) (domain:vault.offsec) (signing:True) (SMBv1:False)
SMB         192.168.187.172 445    DC               [+] vault.offsec\guest: 
SMB         192.168.187.172 445    DC               [+] Enumerated shares
SMB         192.168.187.172 445    DC               Share           Permissions     Remark
SMB         192.168.187.172 445    DC               -----           -----------     ------
SMB         192.168.187.172 445    DC               ADMIN$                          Remote Admin
SMB         192.168.187.172 445    DC               C$                              Default share
SMB         192.168.187.172 445    DC               DocumentsShare  READ,WRITE      
SMB         192.168.187.172 445    DC               IPC$            READ            Remote IPC
SMB         192.168.187.172 445    DC               NETLOGON                        Logon server share 
SMB         192.168.187.172 445    DC               SYSVOL                          Logon server share 
                                                                                                                             
┌──(kali㉿kali)-[~/PGP/Vault]
└─$ crackmapexec smb vault.offsec -u 'guest' -p '' --rid-brute
SMB         192.168.187.172 445    DC               [*] Windows 10.0 Build 17763 x64 (name:DC) (domain:vault.offsec) (signing:True) (SMBv1:False)
SMB         192.168.187.172 445    DC               [+] vault.offsec\guest: 
SMB         192.168.187.172 445    DC               [+] Brute forcing RIDs
SMB         192.168.187.172 445    DC               498: VAULT\Enterprise Read-only Domain Controllers (SidTypeGroup)
SMB         192.168.187.172 445    DC               500: VAULT\Administrator (SidTypeUser)
SMB         192.168.187.172 445    DC               501: VAULT\Guest (SidTypeUser)
SMB         192.168.187.172 445    DC               502: VAULT\krbtgt (SidTypeUser)
SMB         192.168.187.172 445    DC               512: VAULT\Domain Admins (SidTypeGroup)
SMB         192.168.187.172 445    DC               513: VAULT\Domain Users (SidTypeGroup)
SMB         192.168.187.172 445    DC               514: VAULT\Domain Guests (SidTypeGroup)
SMB         192.168.187.172 445    DC               515: VAULT\Domain Computers (SidTypeGroup)
SMB         192.168.187.172 445    DC               516: VAULT\Domain Controllers (SidTypeGroup)
SMB         192.168.187.172 445    DC               517: VAULT\Cert Publishers (SidTypeAlias)
SMB         192.168.187.172 445    DC               518: VAULT\Schema Admins (SidTypeGroup)
SMB         192.168.187.172 445    DC               519: VAULT\Enterprise Admins (SidTypeGroup)
SMB         192.168.187.172 445    DC               520: VAULT\Group Policy Creator Owners (SidTypeGroup)
SMB         192.168.187.172 445    DC               521: VAULT\Read-only Domain Controllers (SidTypeGroup)
SMB         192.168.187.172 445    DC               522: VAULT\Cloneable Domain Controllers (SidTypeGroup)
SMB         192.168.187.172 445    DC               525: VAULT\Protected Users (SidTypeGroup)
SMB         192.168.187.172 445    DC               526: VAULT\Key Admins (SidTypeGroup)
SMB         192.168.187.172 445    DC               527: VAULT\Enterprise Key Admins (SidTypeGroup)
SMB         192.168.187.172 445    DC               553: VAULT\RAS and IAS Servers (SidTypeAlias)
SMB         192.168.187.172 445    DC               571: VAULT\Allowed RODC Password Replication Group (SidTypeAlias)
SMB         192.168.187.172 445    DC               572: VAULT\Denied RODC Password Replication Group (SidTypeAlias)
SMB         192.168.187.172 445    DC               1000: VAULT\DC$ (SidTypeUser)
SMB         192.168.187.172 445    DC               1101: VAULT\DnsAdmins (SidTypeAlias)
SMB         192.168.187.172 445    DC               1102: VAULT\DnsUpdateProxy (SidTypeGroup)
SMB         192.168.187.172 445    DC               1103: VAULT\anirudh (SidTypeUser)

PreviousVectorNextQuarterJack

Last updated 3 years ago