Open 10.10.150.246:22
Open 10.10.150.246:80
Open 10.10.150.245:88
Open 10.10.150.245:135
Open 10.10.150.245:139
Open 10.10.150.245:389
Open 10.10.150.245:445
Open 10.10.150.245:464
Open 10.10.150.245:593
Open 10.10.150.245:636
Open 10.10.150.245:3268
Open 10.10.150.245:3269
Open 10.10.150.245:3389
Open 10.10.150.245:9200
Open 10.10.150.245:9389
service enumeartion
there have ITShare custom share folder
we found a encrypt pdf file
i will download all
decrypt pdf file
i will put ADAudit.dll into dnSpy, there have encrypt function
those c# code will encrypt file
i will write a decrypt c# code, the 6951 is just pdf file length
i will create a new decryptPDF project
change filePath
launch!
ok, we get decrypted password report pdf file!
the pdf show us some cred!
and a username list
i will use kerbrute to see someone who have not change there weak password
i see Pamela.Clark@vigilant.vl:Vigilant@Tech2024
i will create some custom wordlist try to crack
but not luck
ssh into srv
seems the Pamela user password expired
i will use smbpasswd change password to Vigilant@Tech2023
now i can use the new password login srv host
there have elastic
bruteforce elasticsearch
/etc/.scripts/setup.sh
the 9200 port open on dc, elasticsearch?
ok~
and elastic EDR o_O
yes, we login in with Pamela.Clark cred
and Pamela.Clark role is superuser
abuse Synthetics monitor script
there have Synthetics periodically checks the web page
the monitor script is Playwright, and the Playwright runs inside the Node.js, which mean we can write revershell in nodejs
API key
Q2lKbTVvNEIycjl0Q0lzNWg2OEg6M09RMWNjQmJTOUNzUTVJVDNQUUxHQQ==
Use as environment variable
export SYNTHETICS_API_KEY=Q2lKbTVvNEIycjl0Q0lzNWg2OEg6M09RMWNjQmJTOUNzUTVJVDNQUUxHQQ==
Project push command
SYNTHETICS_API_KEY=Q2lKbTVvNEIycjl0Q0lzNWg2OEg6M09RMWNjQmJTOUNzUTVJVDNQUUxHQQ== npm run push