Exploiting EternalBlue on bdc.artstailor.com to Achieve Domain Admin Access
Exploiting EternalBlue on bdc.artstailor.com to Achieve Domain Admin Access
Situation:
This exercise aimed to exploit an SMB vulnerability on bdc.artstailor.com
to achieve Domain Admin privileges within the artstailor.com network. The bdc.artstailor.com
server, recently added to the domain, was found to be unpatched and vulnerable to the EternalBlue exploit.
Obstacles:
- Host Identification:
- Determining the correct IP address of the backup domain controller (BDC) among other machines in the network.
- Vulnerability Validation:
- Confirming the presence of the EternalBlue (EternalSynergy) vulnerability on the identified host.
- Exploit Execution:
- Finding a Metasploit module compatible with Windows Server 2016.
Actions Taken:
- Network Scanning:
- Established a Chisel SOCKS proxy through
costumes.artstailor.com
using credentials from previous exercises. - Ran a targeted
nmap
scan with Proxychains on the10.70.184.*
subnet, identifying port 445 open onbdc.artstailor.com
(10.70.184.89). - Validated the vulnerability by executing:
proxychains nmap -Pn -sT -p 445 10.70.184.89 --script vuln
- Confirmed the machine was susceptible to EternalBlue (CVE-2017-0143).
- Established a Chisel SOCKS proxy through
- Exploit Execution:
- Loaded Metasploit and selected the EternalSynergy module:
exploit/windows/smb/ms17_010_psexec
- Configured the exploit with:
LHOST
: Attack machine IP (172.24.0.10
)RHOSTS
: Target IP (10.70.184.89
)
- Successfully exploited the machine, gaining
NT AUTHORITY\SYSTEM
privileges.
- Loaded Metasploit and selected the EternalSynergy module:
- Privilege Escalation:
- Migrated to the process
svchost.exe
running underARTSTAILOR\Administrator
to gain Domain Admin access.
- Migrated to the process
- Data Exfiltration:
- Located and exfiltrated
MoreSacredText.txt
from the root directory, which contained the twenty-third encryption key.
- Located and exfiltrated
Results:
- Domain Admin Access Achieved:
- Gained full control of the domain by exploiting a critical SMB vulnerability.
- Sensitive Data Retrieved:
- Extracted the twenty-third encryption key:
KEY023-[Redacted for Security]
.
- Extracted the twenty-third encryption key:
- High Security Risk Identified:
- The unpatched server exposed the entire domain to severe risks, including privilege escalation and data exfiltration.
Tool Purpose Overview:
Chisel:
- Created a SOCKS proxy for accessing internal network resources.
Proxychains:
- Enabled
nmap
scans to target internal hosts via the Chisel proxy.
nmap:
- Identified open SMB ports and validated vulnerabilities using the
--script vuln
flag.
Metasploit:
- Exploited the EternalSynergy vulnerability to achieve remote code execution and Domain Admin privileges.
Recommendations:
- Patch SMB Services:
- Apply all updates to address EternalBlue vulnerabilities on all domain controllers.
- Disable SMBv1:
- Prevent legacy protocol exploitation by disabling SMBv1 across the network.
- Monitor Privileged Accounts:
- Implement real-time monitoring for Domain Admin accounts to detect unauthorized activities.
- Conduct Regular Penetration Tests:
- Perform frequent security assessments to identify and mitigate emerging vulnerabilities.
View PDF Document