HTB | Active
Last updated
Last updated
This is the Box on Hack The Box Active Directory 101 Track. Find the box here.
SMB enumeration techniques
Group Policy Preferences enumeration and exploitation
Identification and exploitation of Kerberoastable accounts
IP: 10.10.10.100
here we can see that we can enumerate Replication share, let's do that
in the Replication share, we found Groups.xml
In Groups.xml we found the user and cpassword
Whenever a new Group Policy Preference (GPP) is created, there’s an xml file created in the SYSVOL share with that config data, including any passwords associated with the GPP. For security, Microsoft AES encrypts the password before it’s stored as cpassword. But then Microsoft published the key on MSDN.
Microsoft issued a patch in 2014 that prevented admins from putting passwords into GPP. But that patch doesn’t do anything about any of these breakable passwords that were already there, and from what I understand, pentesters still find these regularly in 2018. For more details, check out this AD Security post.
Since we have the password we can decrypt it using gpp-decrypt
With the username and password I can connect to 3 more share
Let's connect to Users share
we found user.txt
Since we have valid domain credentials, we can request a TGT (Ticket Granting Ticket)
I’ll look up the hash type here(https://hashcat.net/wiki/doku.php?id=example_hashes), and then crack it with hashcat:
and we found the password
since now we have administrator cred we can check for its share
Let's connect it via psexec
we can also use smbclient to connect to C$ since we have read-and-write access
We found the root.txt