Active
Easy Windows Active Directory HTB box

Reconnaissance
As always we start off by performing a port scan with the tool Nmap
We see that the IP Points out to the domain active.htb so we add it into our /etc/hosts file
The SMB Service running on port 445 gives us a hint that we're facing a DC (Domain Controller) so let's enumerate it using smbmap
We can see we have READ ACCESS to the /Replication share so let's see what's inside using smbclient
After enumerating for a bit, under the following directory:\active.htb\Policies{31B2F340-016D-11D2-945F-00C04FB984F9}\MACHINE\Preferences\Groups\ We find the file: Groups.xml
Hash Cracking
We found a Username: SVC_TGS with a hashes password that we can crack using gpp-decrypt
And we got the password! --> GPPstillStandingStrong2k18
Let's try and enumerate the SMB Shares that this user has access to using SMBMap
We see we have now access to three more shares: NETLOGON | SYSVOL | Users so let's start off by enumerating the Users share, where we can find the user.txt
After this we proceed to enumerate the RPC service using rpcclient
Kerberoasting
We see the Administrator account so if this account has an SPN (Service Principal Name) tied to it, we might be able to Kerberoast it.
Kerberoasting is a technique where we request a Kerberos service ticket (TGS) for an account with an SPN. The ticket comes back encrypted with the account’s NTLM hash so we can crack it offline
Let's try and perform this attack using impacket-GetUserSPNs
We successfully dumped the hash! let's try and crack it using john
We successfully cracked the Administrator's password — Ticketmaster1968
Let's login via SMB to see the root.txt flag
Hope you liked this Write-Up and see you next time!!
Last updated