Hi,
I have access to a Fortigate, but I'm stuck trying to move laterally to other systems in the network. The Active Directory network has the following devices:
The Windows Server 2012 running MSSQL version 11.0.2100.0. Although it’s an old version, I haven’t found any relevant exploits.
Another device is running Apache 2.4.46 on a WampServer 3.2.3, but I haven’t found any exploits for this setup either.
None of the devices seem to have vulnerabilities like EternalBlue, PetitPotam, or anything similar.
In the network, I found a Cisco switch with default credentials, but I'm not sure if that could be useful. I’d like to perform an LLMNR attack, but I believe it’s not possible through the VPN. Is there any way to configure Fortigate to intercept NTLMv2 hashes?
I’ve also tried some exploits to access the QNAP devices, hoping to find some credentials, but none were successful. One of the NAS devices has a folder with read and write access, but it only contains irrelevant photos.
Does anyone have any ideas on what I could do next? Any suggestions would be greatly appreciated.
I have access to a Fortigate, but I'm stuck trying to move laterally to other systems in the network. The Active Directory network has the following devices:
Код:
SMB 192.168.1.1 445 NONE [*] I5OS V6R1M0 (name:) (domain:) (signing:False) (SMBv1:True)
SMB 192.168.1.6 445 SRV-CED [*] Windows Server 2012 R2 Standard 9600 x64 (name:SRV-CED) (domain:.local) (signing:False) (SMBv1:True)
SMB 192.168.1.219 445 SRV-CED2022 [*] Windows Server 2022 Standard 20348 x64 (name:SRV-CED2022) (domain:.local) (signing:False) (SMBv1:True)
SMB 192.168.1.28 445 PC-PESA [*] Windows 10 / Server 2019 Build 19041 x64 (name:PC-PESA) (domain:.local) (signing:False) (SMBv1:False)
SMB 192.168.1.122 445 NAS02 [*] Windows 6.1 Build 0 (name:NAS02) (domain:NAS02) (signing:False) (SMBv1:False)
SMB 192.168.1.17 445 PC- [*] Windows 11 Build 22621 x64 (name:PC-) (domain:l.local) (signing:False) (SMBv1:False)
SMB 192.168.1.33 445 PC- [*] Windows 11 Build 22621 x64 (name:PC-) (domain:.local) (signing:False) (SMBv1:False)
SMB 192.168.1.21 445 NB- [*] Windows 11 Build 22621 x64 (name:NB-) (domain:.local) (signing:False) (SMBv1:False)
SMB 192.168.1.101 445 SRV-DC01 [*] Windows 10 / Server 2019 Build 17763 x64 (name:SRV-DC01) (domain:local) (signing:True) (SMBv1:False)
SMB 192.168.1.24 445 [*] Windows 10 / Server 2019 Build 19041 x64 (name:) (domain:.local) (signing:False) (SMBv1:False)
SMB 192.168.1.227 445 SRV-DATABASE [*] Windows Server 2022 Build 20348 x64 (name:SRV-DATABASE) (domain:.local) (signing:False) (SMBv1:False)
SMB 192.168.1.225 445 APP-PESA [*] Windows 10 / Server 2019 Build 19041 x64 (name:APP-PESA) (domain:.local) (signing:False) (SMBv1:False)
SMB 192.168.1.228 445 SRV- [*] Windows Server 2022 Build 20348 x64 (name:SRV-) (domain:.local) (signing:False) (SMBv1:False)
SMB 192.168.1.121 445 NAS [*] Windows 6.1 Build 0 (name:NAS) (domain:) (signing:False) (SMBv1:False)
The Windows Server 2012 running MSSQL version 11.0.2100.0. Although it’s an old version, I haven’t found any relevant exploits.
Another device is running Apache 2.4.46 on a WampServer 3.2.3, but I haven’t found any exploits for this setup either.
None of the devices seem to have vulnerabilities like EternalBlue, PetitPotam, or anything similar.
In the network, I found a Cisco switch with default credentials, but I'm not sure if that could be useful. I’d like to perform an LLMNR attack, but I believe it’s not possible through the VPN. Is there any way to configure Fortigate to intercept NTLMv2 hashes?
I’ve also tried some exploits to access the QNAP devices, hoping to find some credentials, but none were successful. One of the NAS devices has a folder with read and write access, but it only contains irrelevant photos.
Does anyone have any ideas on what I could do next? Any suggestions would be greatly appreciated.
Последнее редактирование модератором: