Home CTFs | HackTheBox | Machines | Active
Post
Cancel

CTFs | HackTheBox | Machines | Active

Active

image

Enumeration

First of all, we can start by running an nmap scan:

image

The nmap scan doesn’t give much clue on what to do now, but there is an SMB share. Let’s have a look:

image

As we can see, we have access to a Replication share. Let’s get its content:

image

As we can see, we have three folders. There is nothing interesting in DfsrPrivate and in scripts, but we can find a Group.xml file in the Policies folder.

image

We can download it locally:

image

We now have a username and a ciphered password. This kind of password is a Group Policy Preferences (GPP) Passwords. We have a command that can get its clear text value:

image

User.txt

Now that we have a user, we can try accessing other shares:

image

As we can see, we have now access to the Users share. Let’s have a look:

image

It looks like a classic Windows Users folder. We can try going into the SVC_TGS desktop folder:

image

We get here the user flag:

image

Privilege Escalation

We can now use the script GetUserSPNs.py (of Impacket) to see if we can get any user information:

image

As we can see, there is the Administrator user, we can try recovering its kerberos TGS ticket:

image

We can now try to crack it using Hashcat:

image

image

Root.txt

Now that we have the Administrator credentials, we can connect to the SMB using them to get the files located in the Users share.

image

Now we can go to the desktop of the Administrator and… Voilà. We have the root.txt file that just waits for us to download it:

image

image

This post is licensed under CC BY 4.0 by the author.