Administrator Write-up - HTB

Recon

Starting of with nmap scan:

sudo nmap -sS -Pn -n -p- 10.10.11.42 -oN syn_all_port_scan.txt
PORT      STATE SERVICE
21/tcp    open  ftp
53/tcp    open  domain
88/tcp    open  kerberos-sec
135/tcp   open  msrpc
139/tcp   open  netbios-ssn
389/tcp   open  ldap
445/tcp   open  microsoft-ds
464/tcp   open  kpasswd5
593/tcp   open  http-rpc-epmap
636/tcp   open  ldapssl
3268/tcp  open  globalcatLDAP
3269/tcp  open  globalcatLDAPssl
5985/tcp  open  wsman
9389/tcp  open  adws
47001/tcp open  winrm
49664/tcp open  unknown
49665/tcp open  unknown
49666/tcp open  unknown
49667/tcp open  unknown
49669/tcp open  unknown
53573/tcp open  unknown
58810/tcp open  unknown
58821/tcp open  unknown
58826/tcp open  unknown
58829/tcp open  unknown
58842/tcp open  unknown

Now using these ports to run a vulnerability scan:

Seems to be a DC. Enumeration possible on FTP, LDAP and SMB.

Let's not forget this? "As is common in real life Windows pentests, you will start the Administrator box with credentials for the following account: Username: Olivia Password: ichliebedich"

I will use them on WinRM after quick enum.

Enumeration:

FTP:

Interesting.

SMB:

LDAP:

A lot of stuff showing up.

WinRM:

Tried port 47001, but refuses connection. Connected normally via wsman 5985. Will see later what happens on 47001.

I loaded up SharpHound.

Reset Michael's Password:

Verify it worked:

Get his groups:

He can WinRM.

Now, based on BloodHound we need to move once more to a new user, this time Benjamin.

Benjamin is a member of Share Moderators, interesting:

I tried running psexec, smbclient, seem KO.

Remember about FTP? Let's give it a try!

Let's crack the password!

Open the safe:

Extract Emily's password:

Emily is part of Remote Management Users:

JACKPOT!!!!!!!!!!!!!!!

We know we have GenericWrite, so let's do some Kerberoasting!

Loaded hashcat:

CrackeD!

Let's do DCSync!

Couldn't get easier than that!

Last updated