Administrator Windows (Medium)
Administrator is a medium-difficulty Windows machine designed around a complete domain compromise scenario, where credentials for a low-privileged user are provided.
This machine was given in a asume breach sceanrio the credentials were provided for the user Olivia
Olivia : ichliebedichNmap scan
PORT STATE SERVICE VERSION
21/tcp open ftp Microsoft ftpd
| ftp-syst:
|_ SYST: Windows_NT
53/tcp open domain Simple DNS Plus
88/tcp open kerberos-sec Microsoft Windows Kerberos (server time: 2025-01-07 14:58:55Z)
135/tcp open msrpc Microsoft Windows RPC
139/tcp open netbios-ssn Microsoft Windows netbios-ssn
389/tcp open ldap Microsoft Windows Active Directory LDAP (Domain: administrator.htb0., Site: Default-First-Site-Name)
445/tcp open microsoft-ds?
464/tcp open kpasswd5?
593/tcp open ncacn_http Microsoft Windows RPC over HTTP 1.0
636/tcp open tcpwrapped
3268/tcp open ldap Microsoft Windows Active Directory LDAP (Domain: administrator.htb0., Site: Default-First-Site-Name)
3269/tcp open tcpwrapped
Service Info: Host: DC; OS: Windows; CPE: cpe:/o:microsoft:windows
Host script results:
| smb2-time:
| date: 2025-01-07T14:59:09
|_ start_date: N/A
| smb2-security-mode:
| 3:1:1:
|_ Message signing enabled and required
|_clock-skew: 7h00m00sSince SMB was available i checked what were the available shares
These were almost the default shares so i checked if i can access through winrm
Ran a bloodhound enum
In the bloodhound we saw that olivia has genericall permissions for michael so we changes his password and got access

Then we saw that michael has ForceChangePassword over Benjamin

I tried to winrm i dint have access so since there was ftp running aswell in the beggining i checked if i could access that
Got a file tried to crack it through hashcat
With the cracked password i downloaded and installed safepass and opened the file where i was given a few passwords
I try all passwords and get a hit for emilys
I check how emily can priv esc and i saw she has GenericWrite over ethan

Im going to run a Kerberoast as emily and this is what i got
So new creds are

I can do a dcsync with ethan to get administrator so i run secrets dump and with that i can get the admin hash
Tester gained Administraive access via a Pass The Hash
Last updated