The administrator is a medium machine difficulty with the assume breach methodology, in which you start the machine with a low-privileged user.
Enumeration
Nmap Scan
┌─[kali@parrot]─[~/HackTheBox/platform/machines/Administrator]
└──╼ $nmap -F -Pn $ip -oN Nmap/fast-scan
PORT STATE SERVICE
21/tcp open ftp
53/tcp open domain
88/tcp open kerberos-sec
135/tcp open msrpc
139/tcp open netbios-ssn
389/tcp open ldap
445/tcp open microsoft-ds
┌─[kali@parrot]─[~/HackTheBox/platform/machines/Administrator]
└──╼ $sudo nmap -sU -p1-10000 --min-rate 10000 $ip -Pn
PORT STATE SERVICE
53/udp open domain
88/udp open kerberos-sec
123/udp open ntp
389/udp open ldap
┌─[kali@parrot]─[~/HackTheBox/platform/machines/Administrator]
└──╼ $nmap -p21,53,88,135,139,389,445 -sCV $ip -oN Nmap/script-scan
PORT STATE SERVICE VERSION
21/tcp open ftp Microsoft ftpd
53/tcp open domain Simple DNS Plus
88/tcp open kerberos-sec Microsoft Windows Kerberos
135/tcp open msrpc Microsoft Windows RPC
139/tcp open netbios-ssn Microsoft Windows netbios-ssn
389/tcp open ldap Active Directory LDAP (Domain: administrator.htb)
445/tcp open microsoft-ds?
Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows
Host script results:
| smb2-time:
| date: 2024-11-10T04:07:40
|_ start_date: N/A
| smb2-security-mode:
| 3:1:1:
|_ Message signing enabled and required
|_clock-skew: 7h00m00s
Summary
* Open ports: 21,53,88,135,139,389,445
* UDP open ports: 53,88,123,389
* Services: FTP - DNS - KERBEROS - RPC - SMB - LDAP
* Important notes: Domain: administrator.htb
hosts file
┌─[kali@parrot]─[~/HackTheBox/platform/machines/Administrator]
└──╼ sudo sh -c "echo '10.10.11.42 dc administrator.htb DC.administrator.htb' >> /etc/hosts"
┌─[kali@parrot]─[~/HackTheBox/platform/machines/Administrator]
└──╼ $tail -n1 /etc/hosts
10.10.11.42 dc administrator.htb DC.administrator.htb
Foothold
I'm in the habit of searching and using new tools released, So I will start my enumeration process this time with cicada-masterful
┌─[kali@parrot]─[~/HackTheBox/platform/machines/Administrator]
└──╼ $python3 cicada-mastertul.py -u Olivia -p ichliebedich -d Administrator.htb -t 10.10.11.42 --full
██████╗██╗ ██████╗ █████╗ ██████╗ █████╗
██╔════╝██║██╔════╝██╔══██╗██╔══██╗██╔══██╗
██║ ██║██║ ███████║██║ ██║███████║
██║ ██║██║ ██╔══██║██║ ██║██╔══██║
╚██████╗██║╚██████╗██║ ██║██████╔╝██║ ██║
╚═════╝╚═╝ ╚═════╝╚═╝ ╚═╝╚═════╝ ╚═╝ ╚═╝
|__ by - theblxckcicada __|
███╗ ███╗ █████╗ ███████╗████████╗███████╗██████╗ ████████╗██╗ ██╗██╗
████╗ ████║██╔══██╗██╔════╝╚══██╔══╝██╔════╝██╔══██╗╚══██╔══╝██║ ██║██║
██╔████╔██║███████║███████╗ ██║ █████╗ ██████╔╝ ██║ ██║ ██║██║
██║╚██╔╝██║██╔══██║╚════██║ ██║ ██╔══╝ ██╔══██╗ ██║ ██║ ██║██
██║ ╚═╝ ██║██║ ██║███████║ ██║ ███████╗██║ ██║ ██║ ╚██████╔╝███████╗
╚═╝ ╚═╝╚═╝ ╚═╝╚══════╝ ╚═╝ ╚══════╝╚═╝ ╚═╝ ╚═╝ ╚═════╝ ╚══════╝
..snip..
[!x!] Scanning 10.10.11.42
[!] Enumerating SMB...
[-] Could not connect to SMB
[!] Connecting to WinRM...
[-] Could not connect to WinRM
[!] Enumerating Lookupsids using impacket...
[+] Lookupsids saved to /home/kali/HackTheBox/platform/machines/Administrator/mastertul/10.10.11.42/lookupsid_results/lookupsid_file.txt
[+] Users list saved to /home/kali/HackTheBox/platform/machines/Administrator/mastertul/10.10.11.42/lookupsid_results/users.txt
[!] Enumerating NPUsers using impacket...
[-] No NPUsers found
[!] Enumerating UserSPNs using impacket...
[-] No UserSPNs found
[!] Collecting Bloodhound Files...
[+] Bloodhound saved to /home/kali/HackTheBox/platform/machines/Administrator/mastertul/10.10.11.42/bloodhound_results
[!] Enumerating LDAP...
[+] LDAP saved to /home/kali/HackTheBox/platform/machines/Administrator/mastertul/10.10.11.42/ldap_results
After collecting data with bloodhound and ldapdomaindump, I will enumerate the domain for possible Domain Escalation paths.
Looking at Bloodhound CE, User Olivia has GenericAll on Michael which means he can
Assign fake SPN and perform targeted Kerberoast attack