<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Windows Machines on rchitect</title><link>https://www.rchitect.in/tags/windows-machines/</link><description>Recent content in Windows Machines on rchitect</description><generator>Hugo</generator><language>en</language><lastBuildDate>Wed, 09 Mar 2022 00:00:00 +0000</lastBuildDate><atom:link href="https://www.rchitect.in/tags/windows-machines/index.xml" rel="self" type="application/rss+xml"/><item><title>SeImpersonatePrivilege privilege escalation using Juicy Potato</title><link>https://www.rchitect.in/posts/juicy-potato/</link><pubDate>Wed, 09 Mar 2022 00:00:00 +0000</pubDate><guid>https://www.rchitect.in/posts/juicy-potato/</guid><description>&lt;h1 id="exploiting-seimpersonateprivilege-using-juicypotato-for-privilege-escalation"&gt;
 Exploiting &amp;lsquo;&amp;lsquo;SeImpersonatePrivilege&amp;rsquo; using Juicypotato for privilege escalation
 &lt;a class="heading-link" href="#exploiting-seimpersonateprivilege-using-juicypotato-for-privilege-escalation"&gt;
 &lt;i class="fa-solid fa-link" aria-hidden="true" title="Link to heading"&gt;&lt;/i&gt;
 &lt;span class="sr-only"&gt;Link to heading&lt;/span&gt;
 &lt;/a&gt;
&lt;/h1&gt;
&lt;p&gt;Lets take a sceanrio we have initail reverse shell or nomral user shell which requires to be elvated as Administrator.Checking the Privilege of cuurent user we have noticed &amp;ldquo;SeImpersonatePrivilege&amp;rdquo; is enabled.&lt;/p&gt;
&lt;pre tabindex="0"&gt;&lt;code&gt;whoami /priv

PRIVILEGES INFORMATION
----------------------

Privilege Name Description State 
============================= ========================================= ========
SeAssignPrimaryTokenPrivilege Replace a process level token Disabled
SeIncreaseQuotaPrivilege Adjust memory quotas for a process Disabled
SeShutdownPrivilege Shut down the system Disabled
SeAuditPrivilege Generate security audits Disabled
SeChangeNotifyPrivilege Bypass traverse checking Enabled 
SeUndockPrivilege Remove computer from docking station Disabled
SeImpersonatePrivilege Impersonate a client after authentication Enabled 
SeIncreaseWorkingSetPrivilege Increase a process working set Disabled
SeTimeZonePrivilege Change the time zone Disabled
PS C:\Windows\SysWOW64\inetsrv&amp;gt; 
&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;The below one privilege can be exploited using the [Juicypotato](&lt;a href="https://github.com/ohpe/juicy-potato/releases/tag/v0.1" class="external-link" target="_blank" rel="noopener"&gt;Release Fresh potatoes · ohpe/juicy-potato · GitHub&lt;/a&gt;) for most of the windows machine&lt;/p&gt;</description></item><item><title>Hackthebox Conceal</title><link>https://www.rchitect.in/posts/htb-conceal/</link><pubDate>Mon, 07 Mar 2022 00:00:00 +0000</pubDate><guid>https://www.rchitect.in/posts/htb-conceal/</guid><description>&lt;h1 id="hackthebox-conceal-walkthrough"&gt;
 Hackthebox Conceal Walkthrough
 &lt;a class="heading-link" href="#hackthebox-conceal-walkthrough"&gt;
 &lt;i class="fa-solid fa-link" aria-hidden="true" title="Link to heading"&gt;&lt;/i&gt;
 &lt;span class="sr-only"&gt;Link to heading&lt;/span&gt;
 &lt;/a&gt;
&lt;/h1&gt;
&lt;p&gt;&lt;img src="https://www.rchitect.in/images/walk/conceal/1.png" alt="conceal"&gt;&lt;/p&gt;
&lt;h3 id="initial-enumeration"&gt;
 Initial Enumeration
 &lt;a class="heading-link" href="#initial-enumeration"&gt;
 &lt;i class="fa-solid fa-link" aria-hidden="true" title="Link to heading"&gt;&lt;/i&gt;
 &lt;span class="sr-only"&gt;Link to heading&lt;/span&gt;
 &lt;/a&gt;
&lt;/h3&gt;
&lt;h4 id="port-scan"&gt;
 Port Scan
 &lt;a class="heading-link" href="#port-scan"&gt;
 &lt;i class="fa-solid fa-link" aria-hidden="true" title="Link to heading"&gt;&lt;/i&gt;
 &lt;span class="sr-only"&gt;Link to heading&lt;/span&gt;
 &lt;/a&gt;
&lt;/h4&gt;
&lt;pre tabindex="0"&gt;&lt;code&gt;$ sudo nmap -sT -p- -min-rate 10000 -Pn -oN alltcp.txt 10.10.10.116
sudo nmap -sU -p- -min-rate 10000 -Pn -oN alludp.txt 10.10.10.116
[sudo] password for rocky: 
Host discovery disabled (-Pn). All addresses will be marked &amp;#39;up&amp;#39; and scan times will be slower.
Starting Nmap 7.91 ( https://nmap.org ) at 2022-02-27 19:46 EST
Nmap scan report for 10.10.10.116
Host is up.
All 65535 scanned ports on 10.10.10.116 are filtered

Nmap done: 1 IP address (1 host up) scanned in 130.18 seconds
Host discovery disabled (-Pn). All addresses will be marked &amp;#39;up&amp;#39; and scan times will be slower.
Starting Nmap 7.91 ( https://nmap.org ) at 2022-02-27 19:48 EST
Nmap scan report for 10.10.10.116
Host is up (0.16s latency).
Not shown: 65534 open|filtered ports
PORT STATE SERVICE
500/udp open isakmp

Nmap done: 1 IP address (1 host up) scanned in 14.25 seconds
&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;I have decided to run the &lt;a href="https://rchitect.in/posts/autorecon/" class="external-link" target="_blank" rel="noopener"&gt;Autorecon&lt;/a&gt; script as well to confirm i have not missed anything. It took longer time(more than 40min). I could see and additinal udp port 161 as well.Full results are uploaded [here](&lt;a href="https://github.com/tcprks/Rchitect/blob/Yoda/CTF/conceal/_top_100_udp_nmap.txt" class="external-link" target="_blank" rel="noopener"&gt;Rchitect/_top_100_udp_nmap.txt at Yoda · tcprks/Rchitect · GitHub&lt;/a&gt;). There 2 services to enumerate( SNMP and ISAKMP)&lt;/p&gt;</description></item><item><title>Hackthebox Silo</title><link>https://www.rchitect.in/posts/htb-silo/</link><pubDate>Thu, 24 Feb 2022 00:00:00 +0000</pubDate><guid>https://www.rchitect.in/posts/htb-silo/</guid><description>&lt;h1 id="hackthebox-silo-walkthrough"&gt;
 Hackthebox Silo Walkthrough
 &lt;a class="heading-link" href="#hackthebox-silo-walkthrough"&gt;
 &lt;i class="fa-solid fa-link" aria-hidden="true" title="Link to heading"&gt;&lt;/i&gt;
 &lt;span class="sr-only"&gt;Link to heading&lt;/span&gt;
 &lt;/a&gt;
&lt;/h1&gt;
&lt;p&gt;&lt;img src="https://www.rchitect.in/images/walk/silo/1.png" alt="silo"&gt;&lt;/p&gt;
&lt;h3 id="initial-enumeration"&gt;
 Initial Enumeration
 &lt;a class="heading-link" href="#initial-enumeration"&gt;
 &lt;i class="fa-solid fa-link" aria-hidden="true" title="Link to heading"&gt;&lt;/i&gt;
 &lt;span class="sr-only"&gt;Link to heading&lt;/span&gt;
 &lt;/a&gt;
&lt;/h3&gt;
&lt;h4 id="port-scan"&gt;
 Port Scan
 &lt;a class="heading-link" href="#port-scan"&gt;
 &lt;i class="fa-solid fa-link" aria-hidden="true" title="Link to heading"&gt;&lt;/i&gt;
 &lt;span class="sr-only"&gt;Link to heading&lt;/span&gt;
 &lt;/a&gt;
&lt;/h4&gt;
&lt;pre tabindex="0"&gt;&lt;code&gt;─$ nmap -sT -p- -min-rate 10000 -Pn -oN alltcp.txt 10.10.10.82
Host discovery disabled (-Pn). All addresses will be marked &amp;#39;up&amp;#39; and scan times will be slower.
Starting Nmap 7.91 ( https://nmap.org ) at 2022-02-23 19:46 EST
Nmap scan report for 10.10.10.82
Host is up (0.091s latency).
Not shown: 65261 filtered ports, 269 closed ports
PORT STATE SERVICE
80/tcp open http
135/tcp open msrpc
139/tcp open netbios-ssn
445/tcp open microsoft-ds
8080/tcp open http-proxy

Nmap done: 1 IP address (1 host up) scanned in 121.90 seconds

┌──(rocky㉿kali)-[~/hckbox/silo]
└─$ nmap -sT -p- -min-rate 10000 -Pn -oN alltcp.txt 10.10.10.82
Host discovery disabled (-Pn). All addresses will be marked &amp;#39;up&amp;#39; and scan times will be slower.
Starting Nmap 7.91 ( https://nmap.org ) at 2022-02-23 19:48 EST
Nmap scan report for 10.10.10.82
Host is up (0.100s latency).
Not shown: 65268 filtered ports, 262 closed ports
PORT STATE SERVICE
80/tcp open http
135/tcp open msrpc
139/tcp open netbios-ssn
445/tcp open microsoft-ds
8080/tcp open http-proxy

Nmap done: 1 IP address (1 host up) scanned in 13.36 seconds

┌──(rocky㉿kali)-[~/hckbox/silo]
└─$ sudo nmap -sU -p- -min-rate 10000 -Pn -oN alludp.txt 10.10.10.82
[sudo] password for rocky: 
Host discovery disabled (-Pn). All addresses will be marked &amp;#39;up&amp;#39; and scan times will be slower.
Starting Nmap 7.91 ( https://nmap.org ) at 2022-02-23 19:49 EST
Warning: 10.10.10.82 giving up on port because retransmission cap hit (10).
Nmap scan report for 10.10.10.82
Host is up (0.16s latency).
All 65535 scanned ports on 10.10.10.82 are open|filtered (65460) or closed (75)

Nmap done: 1 IP address (1 host up) scanned in 75.11 seconds

┌──(rocky㉿kali)-[~/hckbox/silo]
└─$ sudo nmap -p 80,135,139,445,8080 -Pn -sC -sV -oN detailed.txt 10.10.10.82
Host discovery disabled (-Pn). All addresses will be marked &amp;#39;up&amp;#39; and scan times will be slower.
Starting Nmap 7.91 ( https://nmap.org ) at 2022-02-23 19:53 EST
Nmap scan report for 10.10.10.82
Host is up (0.16s latency).

PORT STATE SERVICE VERSION
80/tcp open http Microsoft IIS httpd 8.5
| http-methods: 
|_ Potentially risky methods: TRACE
|_http-server-header: Microsoft-IIS/8.5
|_http-title: IIS Windows Server
135/tcp open msrpc Microsoft Windows RPC
139/tcp open netbios-ssn Microsoft Windows netbios-ssn
445/tcp open microsoft-ds Microsoft Windows Server 2008 R2 - 2012 microsoft-ds
8080/tcp open http Oracle XML DB Enterprise Edition httpd
| http-auth: 
| HTTP/1.1 401 Unauthorized\x0D
|_ Basic realm=XDB
|_http-server-header: Oracle XML DB/Oracle Database
|_http-title: 400 Bad Request
Service Info: OSs: Windows, Windows Server 2008 R2 - 2012; CPE: cpe:/o:microsoft:windows

Host script results:
|_clock-skew: mean: 3s, deviation: 0s, median: 3s
| smb-security-mode: 
| authentication_level: user
| challenge_response: supported
|_ message_signing: supported
| smb2-security-mode: 
| 2.02: 
|_ Message signing enabled but not required
| smb2-time: 
| date: 2022-02-24T00:53:53
|_ start_date: 2022-02-24T00:28:20

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 15.89 seconds
&lt;/code&gt;&lt;/pre&gt;&lt;h5 id="vulnrability-scan"&gt;
 Vulnrability Scan
 &lt;a class="heading-link" href="#vulnrability-scan"&gt;
 &lt;i class="fa-solid fa-link" aria-hidden="true" title="Link to heading"&gt;&lt;/i&gt;
 &lt;span class="sr-only"&gt;Link to heading&lt;/span&gt;
 &lt;/a&gt;
&lt;/h5&gt;
&lt;pre tabindex="0"&gt;&lt;code&gt;$ sudo nmap -p 80,135,139,445,8080 -script VULN 10.10.10.82
Starting Nmap 7.91 ( https://nmap.org ) at 2022-02-23 19:54 EST
Nmap scan report for 10.10.10.82
Host is up (0.057s latency).

PORT STATE SERVICE
80/tcp open http
|_http-csrf: Couldn&amp;#39;t find any CSRF vulnerabilities.
|_http-dombased-xss: Couldn&amp;#39;t find any DOM based XSS.
|_http-stored-xss: Couldn&amp;#39;t find any stored XSS vulnerabilities.
135/tcp open msrpc
139/tcp open netbios-ssn
445/tcp open microsoft-ds
8080/tcp open http-proxy
| http-enum: 
|_ /i/: Potentially interesting folder

Host script results:
|_samba-vuln-cve-2012-1182: NT_STATUS_ACCESS_DENIED
|_smb-vuln-ms10-054: false
|_smb-vuln-ms10-061: No accounts left to try

Nmap done: 1 IP address (1 host up) scanned in 342.38 seconds
&lt;/code&gt;&lt;/pre&gt;&lt;h5 id="smb-enumeration"&gt;
 SMB enumeration
 &lt;a class="heading-link" href="#smb-enumeration"&gt;
 &lt;i class="fa-solid fa-link" aria-hidden="true" title="Link to heading"&gt;&lt;/i&gt;
 &lt;span class="sr-only"&gt;Link to heading&lt;/span&gt;
 &lt;/a&gt;
&lt;/h5&gt;
&lt;p&gt;It seems we may not get any information from SMB ports.&lt;/p&gt;</description></item><item><title>Hackthebox Buff</title><link>https://www.rchitect.in/posts/htb-buff/</link><pubDate>Wed, 23 Feb 2022 00:00:00 +0000</pubDate><guid>https://www.rchitect.in/posts/htb-buff/</guid><description>&lt;p&gt;This post is about the Walkthrough of the hackthebox machine: Buff&lt;/p&gt;</description></item><item><title>Hackthebox Legacy</title><link>https://www.rchitect.in/posts/htb-legacy/</link><pubDate>Tue, 22 Feb 2022 00:00:00 +0000</pubDate><guid>https://www.rchitect.in/posts/htb-legacy/</guid><description>&lt;p&gt;This post is about the Walkthrough of the hackthebox machine: Legacy&lt;/p&gt;</description></item></channel></rss>