Crackmapexec

  • Published on
    Enumerated users with crackmapexec, smbclient, and eventually cracked a .pfx file, converted it into a cert.pem and key.pem, then obtained foothold. For root, we have credentials in a LAPS group which provides root.
  • Published on
    This was an Active Directory Windows machine, started by finding credentials in an image on the website, then dumped information with LDAP for the domain to find a kerberoastable user, then enumerating more shares with cme, find which accounts were active, and then get foothold. For root, we pfx2john, and find a GMSA exploit on powershell, to reset a higher privilege user's password so we can authenticate with our new credentials.
  • Published on
    SharePoint endpoint enumerated into discovering FTP credentials, cracking the password needed and authenticating with crackmapexec, then privilege escalating with JuicyPotato.