GPP/cPassword Attacks
Last updated
Last updated
GPP will keep passwords in an XML file
Works with smb
If we find a 334 open we can try to login anonymously Example from HTB - Active - Retired Machine
Tips: prompt off
(will not prompt when dl file) and recurse on
(will list everything)
We can get all the file using mget *
We are interested in the group.xml file which has been downloaded in active.htb/Policies/{31B2F340-016D-11D2-945F-00C04FB984F9}/MACHINE/Preferences/Groups/
We can just copy cpassword and crackit using gpp-decrypt: gpp-decrypt edBSHOwhZLTjt/QS9FeIcJ83mjWA98gw9guKOhJOdcqh+ZGMeXOsQbCpZ3xUjTLfCuNH8pG5aSVYdYw/NglVmQ
And we get the password: GPPstillStandingStrong2k18
The password obtain with gpp only gave us user. To root the machine we use kerberoasting again:
We can then crack the password with hashcat
And finally get shell using psexec.py (Impacket)