Citrix Breakout
most company use Citrix to allow employees to work remotely which block things like (CMD, File Explorer)
Basic Methodology for break-out:
Gain access to a
Dialog Boxlike (Open, Save As)Exploit the Dialog Box to achieve
command execution. → use it to access C driver\\127.0.0.1\c$\users\pmorganEscalate privilegesto gain higher levels of access → run exe filesC:\Windows\System32\cmd.exe
How To join Citrix environment ?
sign in http://humongousretail.com/remote/ using RDP and use credential
Bypassing Path Restrictions
Run Paint from start menu and click on File > Open to open the Dialog Box.

With the windows dialog box open for paint, we can enter the UNC path \\127.0.0.1\c$\users\pmorgan under the File name field

Accessing SMB share from restricted environment
Having restrictions set, File Explorer does not allow direct access to SMB shares on the attacker machine, we use UNC path within the Windows dialog box
Run smb server on Attack box
Back in the Citrix environment, initiate the "Paint" application via the start menu. Proceed to navigate to the "File" menu and select "Open", thereby prompting the Dialog Box to appear. Within this Windows dialog box associated with Paint, input the UNC path as \\10.13.38.95\share into the designated "File name" field. Ensure that the File-Type parameter is configured to "All Files." Upon pressing the "Enter" key, entry into the share is achieved.

open pwn.exe to display CMD
We can then use the obtained cmd access to copy files from SMB share to pmorgans Desktop directory.

Modify existing shortcut file
Right-clickthe desired shortcut.Select
Properties.Within the
Targetfield, modify the path to the intended folder for access.

Script Execution
create file with extension .bat, .vbs, or .ps

Escalating Privileges
For instance, tools like Winpeas and PowerUp can also be employed to identify potential security issues and vulnerabilities within the operating system. We can also validate this using the Command Prompt by querying the corresponding registry keys:
we can make use of PowerUp, using it's Write-UserAddMSI function. This function facilitates the creation of an .msi file directly on the desktop.
Now we can execute UserAdd.msi and create a new user backdoor:T3st@123 under Administrators group. Note that giving it a password that doesn’t meet the password complexity criteria will throw an error.

Bypassing UAC
Last updated