CRTA EXAM REPORT-2
CRTA EXAM REPORT-2
CRTA EXAM REPORT-2
Report
1. Introduction 2
2. Exam Environment Details 2
3. Key Findings 3
4. Detailed Analysis 3
4.1. Initial Access & Reconnaissance 4
4.2. Enumeration 9
4.3. Internal Network Discovery and Pivoting 15
4.4. Internal Network Enumeration and Exploitation 18
4.5. Post-Exploitation 26
4.6. Exploitation of 10.10.10.2 - CHILD.redteam.corp 30
4.7. Post Exploitation of 10.10.10.2 - Active Directory Enumeration 32
4.8. Lateral Movement - Child DC to Parent DC 34
4.9. Exfiltration of Sensitive Data 37
5. Conclusion 39
2 of 53
Certified Red Team Analyst
(CRTA) - Exam Report
1. Introduction
This report presents my experience and approach to the Certified Red Teaming
Assessment (CRTA) conducted by Cyber Warfare Labs. The exam is structured
to simulate real-world scenarios, challenging participants to demonstrate
advanced red teaming skills. Throughout the assessment, I navigated tasks
such as enumeration, Pivoting, exploitation, privilege escalation, and lateral
movement, aiming to achieve the objectives set within a controlled
environment.
3 of 53
Certified Red Team Analyst
(CRTA) - Exam Report
3. Key Findings
4 of 53
Certified Red Team Analyst
(CRTA) - Exam Report
4. Detailed Analysis
4.1. Initial Access & Reconnaissance
Tools Used: Nmap, Netcat, msfvenom
Upon successful VPN connection, I was able to access the internal network
range 172.16.25.0/24. Notably, 172.16.25.1 was explicitly out of scope.
I performed an initial Nmap scan to identify live hosts in the network range
172.16.25.0/24 using the following command:
As you can see the two ip’s were found which are:-
172.16.25.2 and 172.16.25.3
Next, To gather more information about the open ports and services running
on the host 172.16.25.2, & 172.16.25.3 I conducted a detailed Nmap scan
with the -sC (script scan) and -sV (service version detection) options. This
scan provided additional insights into the services and their versions.
5 of 53
Certified Red Team Analyst
(CRTA) - Exam Report
Results:
6 of 53
Certified Red Team Analyst
(CRTA) - Exam Report
Findings:
There were a lot of findings on the 172.16.25.2 IP, so I decided to focus on it,
gather information, and gain initial access by exploiting it.
Notably, port 8180 was running Tomcat 5.5, which raised a red flag as this
version might still have known vulnerabilities. I decided to focus on this
service and attempt to gain initial access through it.
Upon reviewing the Tomcat installation, I attempted to login using the default
Tomcat credentials (tomcat:tomcat) and successfully gained access to the
7 of 53
Certified Red Team Analyst
(CRTA) - Exam Report
With access to the Tomcat interface, I uploaded a reverse shell. The reverse
shell was crafted with msfvenom to connect back to my attacking machine.
Command Executed:
Command Executed:
nc -lvnp 4444
8 of 53
Certified Red Team Analyst
(CRTA) - Exam Report
9 of 53
Certified Red Team Analyst
(CRTA) - Exam Report
10 of 53
Certified Red Team Analyst
(CRTA) - Exam Report
4.2. Enumeration
After gaining initial access via the Tomcat reverse shell, I started exploring
the file system for sensitive information. One of the first files I inspected was
/etc/passwd to enumerate user accounts and gather possible clues.
Command Executed:
cat /etc/passwd
11 of 53
Certified Red Team Analyst
(CRTA) - Exam Report
12 of 53
Certified Red Team Analyst
(CRTA) - Exam Report
I navigated to the home directories of the identified users and found a file
named credential.txt in the prod-admin user's home directory. This file
contained credentials for two users: support and prod-admin.
User support
Pass: support@123
Prod-admin Credential:
User: prod-admin
Pass: Prød!@#$%
13 of 53
Certified Red Team Analyst
(CRTA) - Exam Report
14 of 53
Certified Red Team Analyst
(CRTA) - Exam Report
Password: Prød!@#$%
The credentials for prod-admin failed to work for SSH login. I decided to test
the default credentials for the msfadmin user instead.Which i found from
/etc/passwd file
Password: msfadmin
15 of 53
Certified Red Team Analyst
(CRTA) - Exam Report
Command Executed:
ip a
16 of 53
Certified Red Team Analyst
(CRTA) - Exam Report
From the output, I discovered that the machine was connected to an internal
network (10.10.10.0/24) via the eth1 interface, which was not accessible
directly from my attacking machine.
To gain access to the internal network, I established a SOCKS proxy using the
ssh -D option, allowing traffic to be routed through the msfadmin machine.
Command Executed:
ssh -D 9050 msfadmin@172.16.25.2 -oHostKeyAlgorithms=+ssh-dss
Password: msfadmin
[ProxyList]
17 of 53
Certified Red Team Analyst
(CRTA) - Exam Report
18 of 53
Certified Red Team Analyst
(CRTA) - Exam Report
Command Executed:
Command Executed:
19 of 53
Certified Red Team Analyst
(CRTA) - Exam Report
• 10.10.10.1
• 10.10.10.2
• 10.10.10.3
• 10.10.10.4
• 10.10.10.5
A targeted scan was performed on all active hosts to enumerate open ports
and services.
Command Executed:
20 of 53
Certified Red Team Analyst
(CRTA) - Exam Report
21 of 53
Certified Red Team Analyst
(CRTA) - Exam Report
I checked all the open ports on the hosts but found nothing unusual. After
spending a few hours, I noticed that the services on 10.10.10.3 (ports 9090
and 10000) were unclear, and no version details were available. This made
me suspicious and needed further investigation.
Using curl, I queried the services on ports 9090 and 10000 for additional
information.
Command Executed:
22 of 53
Certified Red Team Analyst
(CRTA) - Exam Report
In the response's title tag, I found 'Login to Webmin,' making it clear that port
10000 was hosting a Webmin service. Further research on Webmin revealed
known vulnerabilities.
23 of 53
Certified Red Team Analyst
(CRTA) - Exam Report
Command Executed:
msfconsole
Search webmin
use exploit/linux/http/webmin_packageup_rce
exploit
24 of 53
Certified Red Team Analyst
(CRTA) - Exam Report
After successfully exploiting the Webmin service and gaining initial access to
the system, I proceeded to obtain an interactive reverse shell for further
control and enumeration.
25 of 53
Certified Red Team Analyst
(CRTA) - Exam Report
nc -lvnp 4445
26 of 53
Certified Red Team Analyst
(CRTA) - Exam Report
This reverse shell enabled interactive control over the compromised host,
facilitating further enumeration and post-exploitation activities.
4.5. Post-Exploitation
27 of 53
Certified Red Team Analyst
(CRTA) - Exam Report
Copy the Base64-encoded content and save it to a new file on the attacker
machine:
28 of 53
Certified Red Team Analyst
(CRTA) - Exam Report
echo
"BQIAAABAAAEAEkNISUxELlJFRFRFQU0uQ09SUAALY2hpbGQtYWRtaW4AAAABXxNIZwEAF
wAQ26wrV6c7uINCJljSrqNpZwAAAEAAAQASQ0hJTEQuUkVEVEVBTS5DT1JQAAtjaGlsZC1
hZG1pbgAAAAFfE0hnAQAXABDbrCtXpzu4g0ImWNKuo2ln" > keytab.b64
file child-admin.keytab
The KeyTabExtract tool was utilized to extract the NTLM hash from the child-
admin.keytab file.
29 of 53
Certified Red Team Analyst
(CRTA) - Exam Report
cd KeyTabExtract
Output:
The NTLM hash extracted from the child-admin.keytab file provides critical
credentials for potential further exploitation, including lateral movement or
privilege escalation.
30 of 53
Certified Red Team Analyst
(CRTA) - Exam Report
• IP Address: 10.10.10.2
• Domain: CHILD.redteam.corp
• Service Exploited: SMB (Server Message Block)
• Vulnerability Type: Overpass the Hash
Discovery of Vulnerability
Exploit Steps
Command executed:
proxychains impacket-psexec child-admin@10.10.10.2 -
hashes :dbac2b57a73bb883422658d2aea36967
31 of 53
Certified Red Team Analyst
(CRTA) - Exam Report
On the attacker's machine, the reverse shell executable was hosted using a
simple Python HTTP server:
32 of 53
Certified Red Team Analyst
(CRTA) - Exam Report
On the target machine, the following command was executed via the
interactive shell:
The reverse shell executable was then executed & The attacker machine was
prepared to capture the reverse shell:
nc -lvnp 4447
The use of the impacket-psexec tool and the NTLM hash allowed successful
exploitation of the SMB service on 10.10.10.2, leading to a foothold. The
deployment of a reverse shell enabled interactive access, providing further
opportunities for privilege escalation and lateral movement.
Using the PowerView script (powerview.ps1), the Security Identifier (SID) for
the following domains was successfully retrieved:
1 Domain: child.redteam.corp
33 of 53
Certified Red Team Analyst
(CRTA) - Exam Report
• SID: S-1-5-21-2332039752-785340267-2377082902
2 Domain: redteam.corp
• SID: S-1-5-21-1882140339-3759710628-635303199
Commands Used:
34 of 53
Certified Red Team Analyst
(CRTA) - Exam Report
35 of 53
Certified Red Team Analyst
(CRTA) - Exam Report
Discovery of Vulnerability: After successfully extracting the krbtgt hash from the
child.redteam.corp domain using Mimikatz, a Golden Ticket Attack was planned and executed.
This vulnerability leverages the compromised krbtgt hash to generate forged Kerberos tickets,
granting unauthorized access to services within the domain.
Parameters Explained:
1. /user:Administrator
• Specifies the user account for the forged ticket (Administrator).
2. /domain:child.redteam.corp
• Specifies the child domain where the ticket is generated.
3. /sid:S-1-5-21-2332039752-785340267-2377082902
• SID of the child domain (child.redteam.corp).
4. /sids:S-1-5-21-1882140339-3759710628-635303199-519
• SID of the Enterprise Admins group in the parent domain
(redteam.corp).
5. /krbtgt:24dd6646fd7e11b60b6a9508e6fe7e5a
• The hash of the krbtgt service account for the child domain.
6. /ptt
36 of 53
Certified Red Team Analyst
(CRTA) - Exam Report
Steps Executed
37 of 53
Certified Red Team Analyst
(CRTA) - Exam Report
Objective:
To locate and extract the sensitive file secret.xml from the parent domain
controller RED-DC.redteam.corp.
File Discovery:
After gaining access to the parent domain controller via the Golden Ticket
Attack, the file secret.xml was located in the following directory:
\\RED-DC.redteam.corp\C$\Users\Administrator\Desktop\
38 of 53
Certified Red Team Analyst
(CRTA) - Exam Report
Get-Content \\RED-
DC.redteam.corp\C$\Users\Administrator\Desktop\secret.xml
39 of 53
Certified Red Team Analyst
(CRTA) - Exam Report
40 of 53
Certified Red Team Analyst
(CRTA) - Exam Report
5. Conclusion
41 of 53
Certified Red Team Analyst
(CRTA) - Exam Report
The use of advanced techniques like the Golden Ticket attack revealed a lack
of sufficient protections for Kerberos authentication. Additionally, the absence
of robust network segmentation and security monitoring allowed the attacker
to traverse the network undetected and access critical resources in the parent
domain.
42 of 53
Certified Red Team Analyst
(CRTA) - Exam Report
43 of 53
Certified Red Team Analyst
(CRTA) - Exam Report
44 of 53
Certified Red Team Analyst
(CRTA) - Exam Report
45 of 53
Certified Red Team Analyst
(CRTA) - Exam Report
46 of 53
Certified Red Team Analyst
(CRTA) - Exam Report
47 of 53
Certified Red Team Analyst
(CRTA) - Exam Report
48 of 53
Certified Red Team Analyst
(CRTA) - Exam Report
49 of 53
Certified Red Team Analyst
(CRTA) - Exam Report
50 of 53
Certified Red Team Analyst
(CRTA) - Exam Report
51 of 53
Certified Red Team Analyst
(CRTA) - Exam Report
52 of 53
Certified Red Team Analyst
(CRTA) - Exam Report
53 of 53