HTB - Active

Active

Getting Root:

  1. Used smbmap to enumerate smb and found a Group Policy config file with encrypted creds.

  2. Decrypted the password using gpp-decrypt

  3. Used bloodhound to enumerate the DC

  4. Found the Administrator user was kerberostable

Nmap

Enumerating SMB

Looks like we can read the Replication share

Recursively listing all files using smbmap

Downloading the file using smbmap

Contents of the Groups.xml file

Decrypting the Group Policy Password using gpp-decrypt

BloodHound

Getting Bloodhound

Collecting the Data

Graphing the Data

Shortest Paths from Kerberoastable Users

The above query results show that the user Administrator is Kerberoastable

Using Impacket-GetUserSPNs.py

Cracking the Hash

I use a windows box with nice GPUs to crack hashcat... It's way faster than using the Kali VM

Root Flag

Last updated