Information

About this Lab

Explore a multi-stage network attack involving an enterprise environment vulnerable to CVE-2020-10189, an exploit for ManageEngine. Progress through system compromise via default credentials, leverage RCE to extract plaintext passwords, pivot using port forwarding, and escalate privileges by exploiting insecure GPO permissions. Your mission concludes with complete domain compromise.

Targets

  • Target 1 - 192.168.150.95 (Eric.Wallows/EricLikesRunning800)
  • Target 2 - 192.168.150.96
  • Target 3 - 192.168.150.97

Target 1 - 192.168.150.95

Service Enumeration

Performed port scan on target 192.168.150.95

Authenticated to SMB service using provided credentials (Eric.Wallows/EricLikesRunning800) and confirmed administrative access

Initial Access

Obtained PowerShell remote session via Evil-WinRM

Confirmed the proof.txt file on Administrator’s Desktop

Post-Exploitation

Dumped lsass credentials from memory using nxc’s lsassy module and obtained apahce account for era computer


Target 2 - 192.168.150.96

Service Enumeration

Performed port scan on target 192.168.150.96

Initial Access

Obtained PowerShell remote session via Evil-WinRM

Privilege Escalation

Confirmed MySQL service is running

Dumped the complete database using mysqldump

Found the administrator and charlotte account credentials in the dumped database

Successfully accessed to 192.168.150.96 via WinRM using administrator’s credentials

Confired proof.txt file


Target 3 - 192.168.150.97

Service Enumeration

Performed port scan on target 192.168.150.96

Initial Access

Confirmed successful SMB authentication to 192.168.150.96 using previously obtained charlotte account

Remote WinRM access to 192.168.150.97 using charlotte account

Privilege Escalation

Confirmed SeImpersonatePrivilege enabled and spoolsv service running

Create reverse shell payload (sh.exe) using msfvenom

Uploaded PrintSpoofer64.exe file

Uploaded sh.exe file

Obtained previlege escalation and SYSTEM privileges reverse shell using PrintSpoofer64

Discovered proof.txt file and obtained flag from Administrator.DC01 account’s Desktop