cubeActive

Easy Windows Active Directory HTB box

Reconnaissance

As always we start off by performing a port scan with the tool Nmap

We see that the IP Points out to the domain active.htb so we add it into our /etc/hosts file

The SMB Service running on port 445 gives us a hint that we're facing a DC (Domain Controller) so let's enumerate it using smbmap

We can see we have READ ACCESS to the /Replication share so let's see what's inside using smbclient

After enumerating for a bit, under the following directory:\active.htb\Policies{31B2F340-016D-11D2-945F-00C04FB984F9}\MACHINE\Preferences\Groups\ We find the file: Groups.xml

Hash Cracking

We found a Username: SVC_TGS with a hashes password that we can crack using gpp-decrypt

And we got the password! --> GPPstillStandingStrong2k18

Let's try and enumerate the SMB Shares that this user has access to using SMBMap

We see we have now access to three more shares: NETLOGON | SYSVOL | Users so let's start off by enumerating the Users share, where we can find the user.txt

After this we proceed to enumerate the RPC service using rpcclient

Kerberoasting

We see the Administrator account so if this account has an SPN (Service Principal Name) tied to it, we might be able to Kerberoast it.

Kerberoasting is a technique where we request a Kerberos service ticket (TGS) for an account with an SPN. The ticket comes back encrypted with the account’s NTLM hash so we can crack it offline

Let's try and perform this attack using impacket-GetUserSPNs

We successfully dumped the hash! let's try and crack it using john

We successfully cracked the Administrator's password — Ticketmaster1968

Let's login via SMB to see the root.txt flag

Hope you liked this Write-Up and see you next time!!

Last updated