Everything, Everything

2024: J F M A M J J A S O N
2023: J F M A M J J A S O N D
2022: J F M A M J J A S O N D
2021: J F M A M J J A S O N D
2020: J F M A M J J A S O N D
2019: J F M A M J J A S O N D
2018: J F M A M J J A S O N D
2017: J F M A M J J A S O N D
2016: J F M A M J J A S O N D
2015: J F M A M J J A S O N D
2014: J F M A M J J A S O N D
2013: J F M A M J J A S O N D
2012: J F M A M J J A S O N D
2011: J F M A M J J A S O N D
2010: J F M A M J J A S O N D
2009: J F M A M J J A S O N D
2008: J F M A M J J A S O N D
2007: J F M A M J J A S O N D
2006: J F M A M J J A S O N D
2005: J F M A M J J A S O N D
2004: J F M A M J J A S O N D
June 2017
Domain Admin Through Social Engineering
Monday 26th June, 2017 22:41
A long time ago in a job far, far away, there was an occasion where I managed to gain Domain Admin access without using any special tools, and then abused trust relationships to move around their entire network. The vulnerability was simple, but exploiting it quickly was more difficult. I had to trick someone.

After using VPN credentials to gain access to an internal network, I had an IP address, details of their DNS servers, a gateway, and that was about it. The VPN credentials were also Windows domain credentials. I scanned the network ranges I could see for RDP ports and found a few servers, but my low privileged domain user wasn't allowed to log in. I persevered and eventually logged into a host: a Citrix host.

I poked around the host and spotted that several applications had been installed on D drive. This included files used by Citrix when you logged in, intended to help the user experience. Thankfully I was the only user on the host at the time so I was able to kill the process for my own user and then replace the executable with my own file. To help evade AV, I went with a simple batch file and converted it to an executable using an application. Lazy, but effective.

But in order to escalate my privileges, I needed an admin to log into the host. I needed them to do it quickly as it was a short engagement. I decided to give them a reason to look into the host, but without being too obvious.

I copied CPU Burn-in onto the host, renamed the binary to match another process that was currently running, then set the priority to idle so as not to affect other users. Then I went home.

The next morning, I logged back onto my Citrix box to discover the process was no longer running. I ran a quick net command to confirm that my simple batch file had been executed. The user existed on the domain. I ran another net command. The user was now a member of Domain Admins. It seems that an admin spotted the high CPU usage and logged into the host to investigate, and based on the uptime they rebooted the server to fix the fault.

The moral of this story is don't use your Domain Admin account to log into misbehaving servers. Also, if you install applications to the non-system drive, make sure you modify the default NTFS permissions.

Creating a new Domain Admin account isn't the subtlest of things. It'd make sense to use tools like Mimikatz to get cleartext credentials, but back then it was only a standalone application and hard to interact with.
@RobNicholls81
Sunday 11th June, 2017 23:30
Bit disappointed with the exclusive Xbox games. None of them feel like a "must have". I'll probably stick with the PS4 Pro.
@RobNicholls81
Sunday 11th June, 2017 22:18
New Porsche 911 GT2 RS looks just like... a Porsche 911. Forza 7 looks pretty though. Might get it for Windows 10 over the Xbox One X.
© Robert Nicholls 2002-2024
The views and opinions expressed on this site do not represent the views of my employer.
HTML5 / CSS3