AS2Go | Run over PtH & PtT Attack

This post describes how to handle AS2Go to run the attack!

Assuming you finished the attack preparation.

The attack runs step-by-step alone the cyber kill-chain and covers the following attack stages:

  • User Account Compromised
  • Reconnaissance
  • Lateral Movement (Pass-The-Hash & Pass-The-Ticket)
  • Privileged Account Compromised
  • Access Sensitive Data
  • Exfiltrate Data
  • Domain Compromised & Persistence
Each attack stage contains several separate steps!

For example the attack stage Domain Compromised & Persistence contains 6 separates steps.

For a better orientation the corresponding terminal background color changes based on the used Kerberos ticket

  • BLACK – VICTIM
  • BLUE – Helpdesk
  • BLACK – Domain Admin
  • RED – Golden Ticket

Another orientation help is the graphical representation of the current attack stage, e.g. attack stage Domain Compromised & Persistence.

Some basics before we run the attack

Every coming attack stage or step is accurate predefined and can confirmed by pressing ENTER. You can also skip a task.

If needed you can repeat the previous attack stage.

With pressing CTRL + C the attack can be terminated at any time.

Let’s start the attack

Phase #1 | Before Privileged Escalation

Simply start the attack with the command 00.cmd (helper script).

The helper script

  • Changed the working directory to c:\temp\as2go
  • Customized the Terminal Windows regarding size, title & background color
  • Checked the current permissions regarding file & LDAP, these depends on the attack level
  • Started the the actual PowerShell script AS2Go.ps1

Start the attack from the beginning ….

Please confirm with Y, that you are at the beginning of the use case.

Detailed steps can be found in the following short video (no sound available)

Attack Stage: User Account Compromised

____________________________________________________________________

            Attack Level - COMPROMISED User Account
                Was this a PRIVLEDGE(!) Account?
____________________________________________________________________


 -> Enter (Y) to confirm or (N) for a non-sensitive user! Default [N]:

Important: Please confirm with N, that your compromised user is a NON Privileged Account.

Detailed steps can be found in the following short video (no sound available)

Attack Stage: RECONNAISSANCE

Attacker will typically spend time researching

____________________________________________________________________

                   Attack Level - RECONNAISSANCE
      try to collect reconnaissance and configuration data
___________________________________________________________________

Do you want to run this step - Y or N? Default [Y]:

Detailed steps can be found in the following short video (no sound available)

Phase #2 | During Privileged Escalation

Regarding the lateral movement techniques, first I perform a Overpass-the-attack and a Pass-The-Ticket attack in the second step.

Attack Stage: LATERAL MOVEMENT

Running a Overpass-The-Attack to become a Help Desk Admin

__________________________________________________________________

                 Attack Level - LATERAL MOVEMENT
            Choose your Lateral Movement Technique!
___________________________________________________________________

Enter Pass-the-Hash (H), Pass-the-Ticket (T) or skip (S) this step! Default [H]:

Important: Please confirm with H.
Detailed steps can be found in the following short video (no sound available)

Attack Stage: Privileged Account Compromised

Just show some info, like cached Kerberos tickets

____________________________________________________________________

            Attack Level - COMPROMISED User Account
                Was this a PRIVLEDGE(!) Account?
____________________________________________________________________


 -> Enter (Y) to confirm or (N) for a non-sensitive user! Default [Y]:

Important: Please confirm with Y, that your compromised user is a Privileged Account.
Detailed steps can be found in the following short video (no sound available)

Attack Stage: RECONNAISSANCE

Second run with privileged rights

____________________________________________________________________

                   Attack Level - RECONNAISSANCE
      try to collect reconnaissance and configuration data
___________________________________________________________________

Do you want to run this step - Y or N? Default [Y]:

Detailed steps can be found in the following short video (no sound available)

Attack Stage: LATERAL MOVEMENT

Running a Pass-The-Ticket attack to become a Domain Admin

___________________________________________________________________

                 Attack Level - LATERAL MOVEMENT
            Choose your Lateral Movement Technique!
___________________________________________________________________

Enter Pass-the-Hash (H), Pass-the-Ticket (T) or skip (S) this step! Default [T]:

Important: Please confirm with T.
Detailed steps can be found in the following short video (no sound available)

Phase #3 | After Privileged Escalation

Attack Level – ACCESS SENSITIVE DATA

____________________________________________________________________

                Attack Level - ACCESS SENSITIVE DATA
               Try to find and exfiltrate these data
____________________________________________________________________

Do you want to run this step - Y or N? Default [Y]:

Detailed steps can be found in the following short video (no sound available)

Attack Level – Exfiltrate data

_________________________________________________________________

                  Data exfiltration over SMB Share
_________________________________________________________________

Detailed steps can be found in the following short video (no sound available)

Attack Stage: Domain compromise & persistence

Simulate attempts to achieve persistent domain dominance

____________________________________________________________________

          Attack Level - DOMAIN COMPROMISED AND PERSISTENCE

            #1 - create back door user
            #2 - export DPAPI master key
            #3 - PW reset and disable users
            #4 - Encrypt files
            #5 - create golden ticket
            #6 - reboot (all machines)
____________________________________________________________________

Do you want to run these steps - Y or N? Default [Y]:

Detailed steps can be found in the following short video (no sound available)

2 thoughts on “AS2Go | Run over PtH & PtT Attack

Leave a comment