Active HTB Walkthrough: GPP, Kerberoasting, and Golden Ticket Attacks

Nov 2, 2024    #windows   #htb   #hack-the-box   #active-directory   #ldap   #kerberoasting   #kerberos   #gpp   #cpassword   #golden-ticket   #domain-controller   #windows-server-2008   #privilege-escalation   #dc-sync   #ntds.dit  

Active Hack The Box Walkthrough/Writeup:

How I use variables & Wordlists:

1. Enumeration:

NMAP:

Basic Scans:

Comprehensive Scans:

LDAP 389:

Using LDAP anonymous bind to enumerate further:

DNS 53:

Kerberos 88:

Using Kerbrute to bruteforce Usernames:

SMB 445:

Attempting to connect with NULL & Guest sessions:

Enumerating the Replication share using smbclient:

Finding hard-coded creds for SVC_TGS user:

cpassword primer:

Decrypting the SVC_TGS password using gpp-decrypt:

2. Foothold:

Enumerating Users with impacket-lookupsid:

Enumerating the users share as SVC_TGS:

I query all users and groups using rpcclient:

3. Privilege Escalation:

Extracting the Administrator Hash via Kerberoasting:

Cracking the Admin Hash:

4. Ownership:

Cracking the Admin Hash to reveal the clear-text password

5. Persistence:

Dumping NTDS.dit/DC-SYNC attack:

Creating a Kerberos Golden Ticket:

Lessons Learned:

What did I learn?

  1. Try simple, kerberoast when we have creds can lead to easy wins and privesc paths.

What silly mistakes did I make?

  1. Had a brainfart in regards to using psexec that was fun.

Sign off:

Remember, folks as always: with great power comes great pwnage. Use this knowledge wisely, and always stay on the right side of the law!

Until next time, hack the planet!

– Bloodstiller

– Get in touch bloodstiller at proton dot me



Next: Cicada HTB Walkthrough: Active Directory Enumeration and SeBackupPrivilege Exploitation