Post

Active

Active

Reconnaissance

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
PORT      STATE SERVICE       VERSION
53/tcp    open  domain        Microsoft DNS 6.1.7601 (1DB15D39) (Windows Server 2008 R2 SP1)
| dns-nsid: 
|_  bind.version: Microsoft DNS 6.1.7601 (1DB15D39)
88/tcp    open  kerberos-sec  Microsoft Windows Kerberos (server time: 2025-01-17 00:33:20Z)
135/tcp   open  msrpc         Microsoft Windows RPC
139/tcp   open  netbios-ssn   Microsoft Windows netbios-ssn
389/tcp   open  ldap          Microsoft Windows Active Directory LDAP (Domain: active.htb, Site: Default-First-Site-Name)
445/tcp   open  microsoft-ds?
464/tcp   open  kpasswd5?
593/tcp   open  ncacn_http    Microsoft Windows RPC over HTTP 1.0
636/tcp   open  tcpwrapped
3268/tcp  open  ldap          Microsoft Windows Active Directory LDAP (Domain: active.htb, Site: Default-First-Site-Name)
3269/tcp  open  tcpwrapped
49152/tcp open  msrpc         Microsoft Windows RPC
49153/tcp open  msrpc         Microsoft Windows RPC
49154/tcp open  msrpc         Microsoft Windows RPC
49155/tcp open  msrpc         Microsoft Windows RPC
49157/tcp open  ncacn_http    Microsoft Windows RPC over HTTP 1.0
49158/tcp open  msrpc         Microsoft Windows RPC
Aggressive OS guesses: Microsoft Windows 10 1511 (92%), Microsoft Windows 7 SP1 or Windows Server 2008 SP2 (92%), Microsoft Windows Windows 7 SP1 (92%), Microsoft Windows Vista Home Premium SP1, Windows 7, or Windows Server 2008 (92%), Microsoft Windows Vista SP1 (92%), Microsoft Windows 7 SP1 (91%), Microsoft Windows 7 SP1 or Windows Server 2008 (90%), Microsoft Windows 7 Ultimate (90%), Microsoft Windows 8.1 (90%), Microsoft Windows 8 (90%)
No exact OS matches for host (test conditions non-ideal).
Uptime guess: 0.055 days (since Fri Jan 17 00:17:45 2025)
Network Distance: 2 hops
TCP Sequence Prediction: Difficulty=264 (Good luck!)
IP ID Sequence Generation: Busy server or unknown class
Service Info: Host: DC; OS: Windows; CPE: cpe:/o:microsoft:windows_server_2008:r2:sp1, cpe:/o:microsoft:windows

Host script results:
| smb2-security-mode: 
|   2:1:0: 
|_    Message signing enabled and required
| smb2-time: 
|   date: 2025-01-17T00:36:14
|_  start_date: 2025-01-17T00:00:55
|_clock-skew: -1s

TRACEROUTE (using port 445/tcp)
HOP RTT       ADDRESS
1   342.13 ms 10.10.16.1
2   342.20 ms 10.129.85.192

The nmap scan shows an smb server is running, using smb null session we were able to list the available shares

smbclient

Trying to access the shares using anonymous login was not successful

smbclient

Looking at the shares there was another share which looked interesting Replication and we were able to connect to it using anonymous login

Exploitation

smbclient

Looking through the Policies folder i found an encrypted password for a user active.htb\SVC_TGS in a group policy xml file

smbclient

Using the tool gpp-decrypt the tester was able to decrypt the password

smbclient

Using the credentials the tester was able to gain a shell in the Users share

smbclient

Navigating to the found users Desktop directory the tester was able to get the user flag

smbclient

Using the credentials with bloodhound-python the tester was able to obtain some domain data

bloodhound-python

Using bloodhound GUI the tester found 2 kerberoastable accounts

bloodhound

Privilege Escalation

Using impackets getuserspns the tester was able to perform a kerberoast attack on user administrator and get the users kerberos hash

kerberoast

Using hashcat the tester was able to crack the kerberos hash and get the user cleartext password

hashcat

Using the new credentials the tester was able to get a shell on the machine using psexec

psexec

Navigating to the Desktop folder of the administrator user the tester found the root.txt file

root

This post is licensed under CC BY 4.0 by the author.