Active HTB Walkthrough

Nov 2, 2024    #box   #htb   #easy   #windows   #ldap   #kerberoasting   #kerberos   #cpassword   #active-directory  

Active Hack The Box Walkthrough/Writeup:

How I use variables & Wordlists:

1. Enumeration:

NMAP:

Basic Scans:

Comprehensive Scans:

LDAP 389:

Using LDAP anonymous bind to enumerate further:

DNS 53:

Kerberos 88:

Using Kerbrute to bruteforce Usernames:

SMB 445:

Attempting to connect with NULL & Guest sessions:

Enumerating the Replication share using smbclient:

Finding hard-coded creds for SVC_TGS user:

cpassword primer:

Decrypting the SVC_TGS password using gpp-decrypt:

2. Foothold:

Enumerating Users with impacket-lookupsid:

Enumerating the users share as SVC_TGS:

I query all users and groups using rpcclient:

3. Privilege Escalation:

Extracting the Administrator Hash via Kerberoasting:

Cracking the Admin Hash:

4. Ownership:

Cracking the Admin Hash to reveal the clear-text password

5. Persistence:

Dumping NTDS.dit/DC-SYNC attack:

Creating a Kerberos Golden Ticket:

Lessons Learned:

What did I learn?

  1. Try simple, kerberoast when we have creds can lead to easy wins and privesc paths.

What silly mistakes did I make?

  1. Had a brainfart in regards to using psexec that was fun.

Sign off:

Remember, folks as always: with great power comes great pwnage. Use this knowledge wisely, and always stay on the right side of the law!

Until next time, hack the planet!

– Bloodstiller

– Get in touch bloodstiller at proton dot me