Puppy Write-Up - HTB

Creds: levi.james / KingofAkron2025!; IP: 10.129.232.75

Recon:

Started with an all port syn scan:

sudo nmap -sS -Pn -n -p- 10.129.232.75 -oN all_syn.txt
OUTPUT:
PORT      STATE SERVICE
53/tcp    open  domain
88/tcp    open  kerberos-sec
111/tcp   open  rpcbind
135/tcp   open  msrpc
139/tcp   open  netbios-ssn
389/tcp   open  ldap
445/tcp   open  microsoft-ds
464/tcp   open  kpasswd5
593/tcp   open  http-rpc-epmap
636/tcp   open  ldapssl
2049/tcp  open  nfs
3260/tcp  open  iscsi
3268/tcp  open  globalcatLDAP
3269/tcp  open  globalcatLDAPssl
5985/tcp  open  wsman
9389/tcp  open  adws
49664/tcp open  unknown
49667/tcp open  unknown
49669/tcp open  unknown
49676/tcp open  unknown
49691/tcp open  unknown
63983/tcp open  unknown

Piping it into a vulnerability scan:

Enumeration:

SMB:

SMB Null Session seems to be off:

WinRM Logon:

Tried RM-ing via given user, but seems to be KO too:

BloodHound:

To quickly go through LDAP, I ran bloodhound-python:

Added myself to the Developers groups

Check:

How were we able to do so?

Going deeper in BloodHound I could not find anything useful from this point. So let's take a different route now.

*Something was missing, so I went a little back and realized I didn't query SMB with creds*.

Back to SMB:

Downloaded:

Foothold:

Seems to be of big value.

Let's go through recovery.kdbx:

Best tool to do so:

Because:

Password:

Open recovery.kdbx

We have a couple of passwords in there.

I went back in bloodhound and ran a few Cipher Queries. The most promising path is:

Cipher Query I used:

Due to the fact that Adam Silver has a disabled account, we will enable it. I found that the easiest tool nowadays to do ldap changes seems to be BloodyAD.

Now, using our rights we will change the password:

Started enumerating the endpoint and could notice:

Unzipped, catted:

Sweet!

Unlucky for us, mr. Cooper does not re-use his password...

After enumerating the endpoint and going back to AD enumeration, nothing showed up.

Privilege Escalation:

After a while I found:

Moved to kali box and decrypted:

And we got it!

Last updated