Page cover

Cicada

Synopsis

Cicada is a easy windows machine created by theblxckcicadaarrow-up-right. The machine has Active Directory and allows us the SMB Guest login and has a read permission in HR Share which contains the txt file. The file contains the password. The username rid-brute and password spraying is used. The password is used to authenticate into LDAP as michael.wrightson. The LDAP user enumeration reveals the david.orelious password for SMB authentication. The david.orelious has a read permission in DEV share which contains the ps1 file. The file contains the emily.oscars password. We get the user flag and shell as emily.oscars with the password. The emily.oscars has a SeBackupPrivilege which can be exploited for privilege escalation with diskshadow.exe. The sam and system registry hives is backuped. The password is dumped using impacket-secretdump, with successful exploitation we get the root flag and shell as Administrator using ntlm hash.

OS
Difficulty
Points
Release Date
Retired Date

Windows

Easy

20

28-09-2024

15-02-2025


Enumeration

Nmap

Started the nmap and found the Active directory ports open. Due to some reason the service is showing the tcpwrapped.

nmap -Pn -sC -sV --min-rate=500 10.10.11.35

Starting Nmap 7.94SVN ( https://nmap.org ) at 2024-12-24 01:09 EST
Nmap scan report for cicada.htb (10.10.11.35)
Host is up (0.60s latency).
Not shown: 993 filtered tcp ports (no-response)
PORT     STATE SERVICE    VERSION
53/tcp   open  tcpwrapped
135/tcp  open  tcpwrapped
139/tcp  open  tcpwrapped
445/tcp  open  tcpwrapped
464/tcp  open  tcpwrapped
593/tcp  open  tcpwrapped
3268/tcp open  tcpwrapped

Host script results:
| smb2-security-mode: 
|   3:1:1: 
|_    Message signing enabled and required
| smb2-time: 
|   date: 2024-12-24T12:54:40
|_  start_date: N/A
|_clock-skew: 6h45m12s

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 52.90 seconds

SMB - Guest

The SMB allows the Guest login and we have a read permissions in HR shares.

Downloading all the files from HR shares.

The HR share contains the 'Notice from HR.txt' file and it contains the Password for joining the Cicada Corp! team.

Username rid-burte and Password Spraying

Getting all the usernames using --rid-brute.

Saved the output into the output.txt file and using grep for username filtration.

Password Spraying the obtained password and it works on michael.wrightson user.

LDAP - michael.wrightson

Trying different protocol authentication and we can authenticate into LDAP protocol.

Bloodhound

The Bloodhound can be used to enumerate the Active Directory using nxc as a ingestor for collecting bloodhound data.

First of all lets start neo4j database.

Open the bloodhound and upload the data and while enumerating the user, found the david.orelious password in his description. The below query is used for listing all the user.

circle-info

Alternatively we can use ldapsearch or nxc with -users flag for user enumeration without using bloodhound.


Foothold

SMB - david.orelious

The password can be used in SMB authentication and downloaded all the files from the share.

The DEV share contains the Backup_script.ps1 file which contains the emily.oscars password.

Shell - emily.oscars

The password can be used in SMB and WINRM authentication.

Getting shell using evil-winrm as emily.oscars.

circle-info

The use flag is present in C:\Users\emily.oscars.CICADA\Desktop\user.txt 👏


Privilege Escalation

Shell - Administrator [ SeBackupPrivilege Exploit ]

Running whoami /all reveals that the user has a SeBackupPrivilege.

The blog post is written to exploit the SeBackupPrivilege for dumping the ntlm hashes. The exploit can be found herearrow-up-right.

1

Create the diskshadow.txt file in local machine and upload it into C:\Windows\Temp folder.

2

Run the diskshadow.exe

If the diskshadow.exe has run successfully the below output will be printed, otherwise the output will be different.

3

Getting system registry hives and downloading it into localhost.

In the above exploit the ntds.dit is backed up but in this machine it gives us some error and I am backuping the system registry hives.

4

Dump the hash and get Administrator shell using evil-winrm.

circle-info

The root flag is present in C:\Users\Administrator\Desktop\root.txt 🎉


Proof of Concept

The below video provides the PoC of Cicada machine.

Last updated