Leveraged gMSA misconfiguration of a user to forge a Silver Ticket to become a Domain Admin.
Summary
15 ports open including SMB, LDAP, Kerberos, RPC — confirmed Active Directory Domain Controller.
Extracted usernames from PDF metadata.
Used a date-based filename wordlist to download documents and uncover default password.
Validated credentials with crackmapexec and found access to SMB shares.
Discovered a PowerShell script scheduled to ping web* DNS entries — enabled ADIDNS attack.
Created a fake DNS record pointing to attacker machine and captured NTLM hash with Responder.
Cracked the NTLMv2 hash to get credentials for a high-privileged user.
BloodHound revealed Ted.Graves had ReadGMSAPassword on svc_int account.
Dumped gMSA password and created a Silver Ticket impersonating Administrator.
Used Silver Ticket with wmiexec.py to get Administrator shell.
🧵 Let's Unpack
🔍Enumeration
Nmap Full Port Scan
The host is a Windows Domain Controller. Services of interest:
enum4linux
We confirmed guest access but got limited information.
📁 File-Based Enumeration
We brute-forced document paths with a custom date wordlist script:
Found default creds inside one PDF:
🔐 SMB Access
Confirmed valid credentials.
Found a file named downdetector.ps1 — a scheduled script that monitors web DNS records and emails status updates to Ted.Graves@intelligence.htb using authenticated web requests.
🧨 Exploiting ADIDNS via Responder
Authenticated users can modify DNS via dnstool.py: