Intelligence

Leveraged gMSA misconfiguration of a user to forge a Silver Ticket to become a Domain Admin.

Summary

  • 15 ports open including SMB, LDAP, Kerberos, RPC — confirmed Active Directory Domain Controller.

  • Extracted usernames from PDF metadata.

  • Used a date-based filename wordlist to download documents and uncover default password.

  • Validated credentials with crackmapexec and found access to SMB shares.

  • Discovered a PowerShell script scheduled to ping web* DNS entries — enabled ADIDNS attack.

  • Created a fake DNS record pointing to attacker machine and captured NTLM hash with Responder.

  • Cracked the NTLMv2 hash to get credentials for a high-privileged user.

  • BloodHound revealed Ted.Graves had ReadGMSAPassword on svc_int account.

  • Dumped gMSA password and created a Silver Ticket impersonating Administrator.

  • Used Silver Ticket with wmiexec.py to get Administrator shell.

🧵 Let's Unpack


🔍Enumeration

Nmap Full Port Scan

The host is a Windows Domain Controller. Services of interest:

enum4linux

We confirmed guest access but got limited information.


📁 File-Based Enumeration

We brute-forced document paths with a custom date wordlist script:

Found default creds inside one PDF:


🔐 SMB Access

Confirmed valid credentials.

Found a file named downdetector.ps1 — a scheduled script that monitors web DNS records and emails status updates to Ted.Graves@intelligence.htb using authenticated web requests.


🧨 Exploiting ADIDNS via Responder

Authenticated users can modify DNS via dnstool.py:

Run Responder to intercept NTLM hash:

Captured:


🔑 Credential Cracking & BloodHound

Successfully cracked hash (or obtained cleartext creds):

Used bloodhound-python for enumeration:

BloodHound revealed: 🧪 Ted.GravesITSupport → has ReadGMSAPassword on svc_int


📦 Dump gMSA Password and Generate Silver Ticket

Output:


🖥️ Administrator Shell via Silver Ticket



Last updated