Joff Thyer //
ADVISORY: The techniques and tools referenced within this blog post may be outdated and do not apply to current situations. However, there is still potential for this blog entry to be used as an opportunity to learn and to possibly update or integrate into modern tools and techniques.
Many of us in the penetration testing community are used to scenarios whereby we land a targeted phishing campaign within a Windows enterprise environment and have that wonderful access into the world of Windows command line networking tools. You get your shell and before you know it, you are ready to run all your favorite enumeration commands. These are things like:
- C:\> NET VIEW /DOMAIN
- C:\> NET GROUP “Domain Administrators” /DOMAIN
and so on. Not to mention that you often have all of the wealth of Metasploit post exploitation modules, and the many wonders of various PowerShell tools such as Veil, and PowerShell Empire.
Imagine a world where all you have is a Linux host available on an internal network with no backdoor shell access to any existing Windows system. Imagine that world wherein you are effectively segmented away from the rest of the network and cannot even capture useful network traffic using interception techniques such as Ettercap. This was indeed the case for me recently whereby all I could do was SSH into a single Linux host I controlled.
After having not been in this situation in some time, I paused a moment before recalling the wonderful world of Samba. In particular there are two excellent, and useful programs in the Samba suite namely “rpcclient”, and its friend “smbclient”. Also, let us not forget our favorite DNS utility called “dig”.
My first task was to use available reconnaissance to make informed guesses as to what the internal domain name was likely to be. There are a few different methods to think about here but the first thing was to play with “dig” to determine DNS information of use. I can try to look up the Windows global catalog record, and authoritative domain server records to determine domain controller addresses. Examples as follows:
This will only give me answers if I have predicted or determined the correct “domain.corp” name.
Now, luckily for me I had access to internal Nessus vulnerability report data and had determined that SMB NULL sessions were permitted to some hosts. I matched up the data to my dig results and determined that the NULL sessions were actually corresponding to domain controller addresses. My next task was to try and enumerate user and group information from the domain controllers with “rpcclient” only available to me. I quickly determined by using the “man” page that rpcclient could indeed perform an anonymous bind as follows:
whereby 10.10.10.10 was the chosen address of the domain controller I could anonymously bind to. After that command was run, “rpcclient” will give you the most excellent “rpcclient> ” prompt. At this point in time, if you can use anonymous sessions, then there are some very useful commands within the tool.
1. Enumerate Domain Users
2. Enumerate Domain Groups
3. Query Group Information and Group Membership
4. Query Specific User Information (including computers) by RID.
So in working with these basic commands, I was able to survey the landscape of Windows domain user, and group information pretty thoroughly.
Another technique often used during a penetration test is called “Password Spraying”. This is a particularly effective technique whereby given a list of domain users, and knowledge of very common password use, the tester attempts to perform a login for every user in the list. The technique is very effective given that you deliberately limit the list of passwords to try to a small number. In fact a single password per spraying attempt is advisable for the sole reason that you really do not want to lock accounts.
Before password spraying, it is very useful to determine the Windows domain password policy using a command such as “NET ACCOUNTS /DOMAIN” in the Windows world. However given that we don’t have a Windows shell available to us, rpcclient gives us the following options.
At least we are able to determine the crucial information about the password length. After I write this, I will probably work out how to decode the password properties and match them back to the appropriate information but I have not yet done that task.
In order to perform a password spray attack, the next step is to pick a common password (such as “Autumn2015”) and work out our technique on how to spray using “rpcclient”. Conveniently, “rpcclient” allows us to specify some commands on the command line which is very handy. The follow two examples show a successful logon versus a failed logon. (password of “bbb” is the correct logon)
In these examples, we specifically told “rpcclient” to run two commands, these being “getusername” and then “quit” to exit out of the client. Now we have all of the ingredients to perform a password spraying attack. All we need is a bourne/bash shell loop and we are off to the races. Example of a simple shell script or command line to spray given that the “enumdomusers” output is in the “domain-users.txt” file would be as follows.
You know that you are successful when you see the string “Authority” appear in the output. Lack of success for each user is going to be the “NT_STATUS_LOGON_FAILURE” message.
If you begin to get the “ACCOUNT_LOCKED” failure you should immediately stop your spray because you have likely sprayed too many times in a short period of time.
Assuming you have gained access to a credential, one of the additional nice things you can do is explore the SYSVOL using the “smbclient” program. The syntax is as follows.
I highly recommend getting familiar with the UNIX Samba suite and in particular these tools. They quite literally saved by bacon over the past week and you could well be in the same boat needing these fun tools in your future also.
Join the BHIS Blog Mailing List – get notified when we post new blogs, webcasts, and podcasts.