Active
Found anonymous SMB access and enumerated the Replication share.
Discovered a GroupPolicyPreferences file (groups.xml) with GPP-encrypted credentials for SVC_TGS.
Decrypted the password using gpp-decrypt, then authenticated to SMB and retrieved the user.txt flag.
Discovered the machine was vulnerable to Kerberoasting — used GetUserSPNs to extract an Administrator ticket.
Cracked the Kerberos TGS hash with John, recovered plaintext Administrator password.
Unable to login via WinRM or RPC, so accessed the Users share again via SMB to extract the root.txt flag.
sudo nmap -A -sC -sN -p- -oN active_tcp.nmap -T4 10.10.10.100
Discovered shares using enum4linux:
Shares available anonymously:
- Replication (READABLE)
- IPC$ (Accessible)
Anonymous SMB access on Replication share:
Found:
Decrypted using:
Result:
Credentials:
SMB Share Access (Authenticated)
Successfully accessed Users share and retrieved user.txt flag.
Privilege Escalation
Tried secretsdump (DCSync):
No luck. DCSync not permitted.
Tried BloodHound, but LDAP enumeration failed.
Kerberoasting Attack
Retrieved a service ticket for Administrator.
Cracked the TGS hash:
Recovered:
Tested access:
Success! Retrieved root.txt from Administrator’s directory via SMB share.
Last updated