CRTM Walkthrough Global Central Bank

This blog based on my personal solution of the cybersecurity Certification [Certified Red Team Master (GCB)] of AlteredSecurity

Download as .zip Download as .tar.gz View on GitHub

Attack path 2

The attack path 2 It’s composed by three different sections

- section 3
- section 4
- section 5

The full network diagram of the target servers are defined in the following section

Complete network diagram

 Attack_path 2

Assets

The assets of the GCB that should be compromise during the attack path 2 belong to three different domains, it.gcb.local, msp.local and internal.msp.local:

	- it-track01.it.gcb.local
	- it-preprod.it.gcb.local
	- internal-batch.internal.msp.local
	- internal-dc01.internal.msp.local
	- msp-dc01.msp.local

Intrusion walkthrough

The starting point It’s the domain computer of the itemplyee15, with hostname employee15.it.gcb.local. You should enum the it.gcb.local domain using bloodhound in order to proced qith it-track01 access:

1. it-track-01.it.gcb.local

Access :

- Enumerate domain privilges 
- Abusse of RCBD
- Set new SPN to the target machine
- Abuse of constrained delagation in order to access like Domain Admin on the target machine it-track01 
- Disable AV
- Dump Lsass process 

it-track01.it.gcb.local

2. it-preprod.it.gcb.local

Access:

- Reuse root credentials for mysql of Bitname application
- Hunt for ldapintegration credentials
- Access using PS session
- Dump Lsass process

it-preprod.it.gcb.local

3. internal-batch.internal.msp.local

Access:

- Follow attack path 1 to msp-srv01.msp.local
- reuse credentials extracted on internal-srv06.internal.msp.local
- impersonate batchsvc user
- Access using PSsession to internal-batch witj administrative privileges
. Dump Lsass process

internal-batch.it.gcb.local

4. internal-dc01.internal.msp.local

Lateral Movement:

- Abuse trusted to auth property of internal-batch
- Access with admin privileges (S4U) using alternative service HTTP
- Impersonate Administrator 
- Access and dump domain hashes

internal-dc01.internal.msp.local

5. msp-dc01.msp.local

Access:

- Abuse child parent domain relationship internal.msp.local --> msp.local
- Access to parent domain msp-dc01.msp.local
- Dump domain hashes

msp-dc01.msp.local

back