• [ Регистрация ]Открытая и бесплатная
  • Tg admin@ALPHV_Admin (обязательно подтверждение в ЛС форума)

Uncommon Physical Breach to Domain Admin

admin

#root
Администратор
Регистрация
20.01.2011
Сообщения
7,665
Розыгрыши
0
Реакции
135
Although there are plenty of articles online detailing various physical red team activities such as rubber ducky attacks, key-based attacks, bypassing gates, shoulder surfing, and social engineering, I identified that the most critical aspect is the network and open LAN ports. Dumpster diving and the absence of network access controls also play significant roles.

Before that, I enumerated everything and gathered some credentials via password spraying “Jan@2024” & “Feb@2024” using Для просмотра ссылки Войди или Зарегистрируйся. Surprisingly, I was able to compromise 34 email accounts. However, as I previously mentioned, their external security was robust. Account security was also strong, with MFA and authenticator implementations in place.

1*Q303NPeO_IbTlASQsrkQHQ.png

1*2NSTHiNpaxh25RXGtzwHjQ.png


I took ALFA card and laptop, identified the WiFi by sitting outside the premises of corporate office, and discovered that they were using MSCHAP-V2 (Microsoft Challenge Handshake Authentication Protocol version 2). You can read more about it Для просмотра ссылки Войди или Зарегистрируйся. We waited until night for everyone to log off and disconnect from the network.

The credentials compromised during the password spray worked well and allowed me to connect to the WiFi, giving me direct access to the internal network. This breach could have been prevented if proper network access controls had been implemented.

1*3cYJzR5OuDscN6XiPMMPHQ.png

1*XrDuSptUa8KCc2_rgr0W1Q.png


Eventually using credentials that were compromised initially , i was able to authenticate to DC as well.

1*NY57_3CTDxV3yxvcTo32ow.png


I started enumerating everything using Для просмотра ссылки Войди или Зарегистрируйся manually as i didn’t want to generate traffic by running bloodhound or any similar automated tool.

1*1NPS92JKJjZuiIBqSLg59A.png


I enumerated the users, groups, permissions etc and then i came across a template vulnerable to ESC1.

1*49WXipa5wNL8xcJzoyX6YQ.png

1*F6BGQzJ48ZKEeiFeIIVJjw.png


what else do i need? ah Certipy ;)

1*F5Aak9QABM-1hmdjDB08Mw.png


So it hardly took 3 hours to get DA, physical breach is good to go.
 
Activity
So far there's no one here
Сверху Снизу