Hackthebox - Active

  • Windows

Active

Nmap

SMB

enum4linux

Anonymous connect with smbclient

  • We can connect to a share anonymously

  • We have a group.xml file here

  • We can use gpp-decrypt to get the password

  • We can connect to a share with these creds

  • We can get the user flag

Privilege escalation

  • We can now try to kerberoast

  • I had to use ntpdate becase I was having this error [-] Kerberos SessionError: KRB_AP_ERR_SKEW(Clock skew too great) this corrected it: sudo ntpdate 10.10.10.100

  • This way we get a hash.

  • We need to crack it with john or hashcat

  • For hashcat I needed at least 4 gb of memory on my machine

  • With john it worked smoothly

  • We can now use smb and connect as Administrator

Resources

There is more than one way to do it :)

Hackthebox Active writeup - Rana Khalil Gitbook

Last updated