HTB - Administrator

Description
The administrator is a medium machine difficulty with the assume breach methodology, in which you start the machine with a low-privileged user.
Enumeration
Nmap Scan
Summary
hosts file
Foothold
I'm in the habit of searching and using new tools released, So I will start my enumeration process this time with cicada-masterful
After collecting data with bloodhound and ldapdomaindump, I will enumerate the domain for possible Domain Escalation paths.
Looking at Bloodhound CE, User
OliviahasGenericAllonMichaelwhich means he canAssign fake SPN and perform targeted Kerberoast attack
Reset the password of that user
Perform Shadow Credentials (Need PKINIT authentication)

And Michael Can ForceChangePassword of Benjamin

To perform this attack completely from Linux, I will use the following commands
Now, I have Benjamin account and he is a member in Share Moderators group

When I looked at the shares for juicy files, I didn't find anything useful

I will then move toftp with the two new accounts I have using FileZilla. Michael's account doesn't have any files but benjamin does

After downloading the file, it seems to be encrypted by the master password by default.
I used this tool to get the password hash of the database
Using john the ripper, I cracked this hash successfully
Then, I downloaded this program to my Windows machine to open it and exported all the passwords to .txt file

Privilege Escalation
User
EmilyhasGenericWriteonEthan, So she can do the followingTargeted Kerberoast attack
Shadow Credentials

User Ethan has DCSync rights, So I can dump ntds database with this account

Abuse GenericWrite privileges

Dump administrator hash

Root Flag: b42e8a0a9a5c81e4b7f8xxxxxxxxxxxxx
Last updated