Active

Summary

  • Found anonymous SMB access and enumerated the Replication share.

  • Discovered a GroupPolicyPreferences file (groups.xml) with GPP-encrypted credentials for SVC_TGS.

  • Decrypted the password using gpp-decrypt, then authenticated to SMB and retrieved the user.txt flag.

  • Discovered the machine was vulnerable to Kerberoasting — used GetUserSPNs to extract an Administrator ticket.

  • Cracked the Kerberos TGS hash with John, recovered plaintext Administrator password.

  • Unable to login via WinRM or RPC, so accessed the Users share again via SMB to extract the root.txt flag.


Enumeration

sudo nmap -A -sC -sN -p- -oN active_tcp.nmap -T4 10.10.10.100

Discovered shares using enum4linux:

Shares available anonymously:
- Replication (READABLE)
- IPC$ (Accessible)

Initial Foothold

Anonymous SMB access on Replication share:

Found:

Decrypted using:

Result:

Credentials:


SMB Share Access (Authenticated)

Successfully accessed Users share and retrieved user.txt flag.


Privilege Escalation

Tried secretsdump (DCSync):

No luck. DCSync not permitted.

Tried BloodHound, but LDAP enumeration failed.


Kerberoasting Attack

Retrieved a service ticket for Administrator.

Cracked the TGS hash:

Recovered:

Tested access:

Success! Retrieved root.txt from Administrator’s directory via SMB share.

Last updated