Intelligence
Leveraged gMSA misconfiguration of a user to forge a Silver Ticket to become a Domain Admin.
Summary
15 ports open including SMB, LDAP, Kerberos, RPC β confirmed Active Directory Domain Controller.
Extracted usernames from PDF metadata.
Used a date-based filename wordlist to download documents and uncover default password.
Validated credentials with
crackmapexec
and found access to SMB shares.Discovered a PowerShell script scheduled to ping
web*
DNS entries β enabled ADIDNS attack.Created a fake DNS record pointing to attacker machine and captured NTLM hash with Responder.
Cracked the NTLMv2 hash to get credentials for a high-privileged user.
BloodHound revealed Ted.Graves had
ReadGMSAPassword
onsvc_int
account.Dumped gMSA password and created a Silver Ticket impersonating Administrator.
Used Silver Ticket with
wmiexec.py
to get Administrator shell.
π§΅ Let's Unpack
πEnumeration
Nmap Full Port Scan
The host is a Windows Domain Controller. Services of interest:
enum4linux
We confirmed guest access but got limited information.
We brute-forced document paths with a custom date wordlist script:
Found default creds inside one PDF:
π SMB Access
Confirmed valid credentials.
Found a file named downdetector.ps1
β a scheduled script that monitors web DNS records and emails status updates to Ted.Graves@intelligence.htb using authenticated web requests.
𧨠Exploiting ADIDNS via Responder
Authenticated users can modify DNS via dnstool.py
:
Run Responder to intercept NTLM hash:
Captured:
π Credential Cracking & BloodHound
Successfully cracked hash (or obtained cleartext creds):
Used bloodhound-python
for enumeration:
BloodHound revealed:
π§ͺ Ted.Graves
β ITSupport
β has ReadGMSAPassword
on svc_int
π¦ Dump gMSA Password and Generate Silver Ticket
Output:
π₯οΈ Administrator Shell via Silver Ticket
Last updated
Was this helpful?