Exfiltration

Don't mis any data

PoC

Linux

cat proof.txt && whoami && hostname && ip addr
cat local.txt && whoami && hostname && ip addr

Windows

type proof.txt && whoami && hostname && ipconfig
type local.txt && whoami && hostname && ipconfig

Catch the Flag

Windows

dir "\proof*.txt" /s

PS> gci -recurse -inculde FILENAME*

search credentials or password:

gci -path . -recurse -ea SilentlyContinue -Include *.txt,*.ini,*.yml,*.xml,*.ps1,*.cfg |select-string pass

Linux

Dump Active Directory with PS

Dump with dump.exe

make sure you able to access Lsass or you have managed the bypass LSA Protection to remove protection.

https://github.com/chvancooten/OSEP-Code-Snippets/tree/main/MiniDump

build it with configuration Release, x64, then run in the compromised user with NT AUTHORITY/SYSTEM priviledge.

the result is in the directory C:\Windows\Tasks\lsass.dmp

then use this command to exctract lsass.dmp via kali linux:

or via windows machine:

Dump with Mimikatz

ref: https://book.hacktricks.xyz/windows-hardening/stealing-credentials/credentials-mimikatz

cheatsheet: https://gist.github.com/insi2304/484a4e92941b437bad961fcacda82d49

copy from: https://kashz.gitbook.io/kashz-jewels/cheatsheet/mimikatz

Bypass LSA Protection

https://blog.cyberadvisors.com/technical-blog/blog/credential-dumping-protections-part-2-bypass-lsa-protection

make sure mimikatz.sys in same folder with mimikatz.exe

run this command:

Bypass AV and LSA

make sure the current shell is NT AUTHORITY\SYSTEM

copy mimidrv.sys or mimikats.sys (driver) into the target computer

then create new service

[SC] CreateService SUCCESS

start new service

then you able to load mimikatz into memory with Invoke-Mimikatz

Disable LSA Protection

if success:

Now you able to interact with Lsass.

[Important to start first] Test Mimikatz

Password / hashes

Escalate privilege using NTLM Hash

ref: https://www.youtube.com/watch?v=NeY7OiQTRK8

DCsync (Priviledge Escalation AD)

[requirement] user must have permission to domain:

  • Replication Directory Changes

  • Replication Directory Changes All

DCshadow

Attack DCshadow and DCsync (persistence domain admin / AD Attribute Takeover)

https://www.elladodelmal.com/2018/03/dcshadow-y-dcsync-enganando-al-domain.html

Use case:

  • Bypass MFA

Golden / Silver Ticket

Kerberos Skeleton key

Install backdoor to memory, and make all user can use same password "mimikatz".

note: if the machine was reboot, this backdoor can't exists.

Get DNS Zone

Online request server: https://beeceptor.com/

Last updated