HackTheBoxActiveDirectoryWindowsVulnLabs

Active

Easy level AD box on HTB

Nmap gave the following ports to be open 53, 88, 135, 139, 389, 445, 464, 593, 636, 3268, 3269, 49152, 49153, 49154, 49155, 49157, 49158, 49165

Now, Running nmap in -sCV to get service and version information, and we get

PORT      STATE SERVICE       VERSION
53/tcp    open  domain        Microsoft DNS 6.1.7601 (1DB15D39) (Windows Server 2008 R2 SP1)
| dns-nsid: 
|_  bind.version: Microsoft DNS 6.1.7601 (1DB15D39)
88/tcp    open  kerberos-sec  Microsoft Windows Kerberos (server time: 2026-02-28 05:00:12Z)
135/tcp   open  msrpc         Microsoft Windows RPC
139/tcp   open  netbios-ssn   Microsoft Windows netbios-ssn
389/tcp   open  ldap          Microsoft Windows Active Directory LDAP (Domain: active.htb, Site: Default-First-Site-Name)
445/tcp   open  microsoft-ds?
464/tcp   open  kpasswd5?
593/tcp   open  ncacn_http    Microsoft Windows RPC over HTTP 1.0
636/tcp   open  tcpwrapped
3268/tcp  open  ldap          Microsoft Windows Active Directory LDAP (Domain: active.htb, Site: Default-First-Site-Name)
3269/tcp  open  tcpwrapped
49152/tcp open  msrpc         Microsoft Windows RPC
49153/tcp open  msrpc         Microsoft Windows RPC
Service Info: Host: DC; OS: Windows; CPE: cpe:/o:microsoft:windows_server_2008:r2:sp1, cpe:/o:microsoft:windows

Host script results:
| smb2-time: 
|   date: 2026-02-28T05:01:10
|_  start_date: 2026-02-28T04:56:29
| smb2-security-mode: 
|   2:1:0: 
|_    Message signing enabled and required
|_clock-skew: -1s

This confirms SMB anonymous access is enabled

Now accessing Users was denied, but Replication was allowed. After going through the folder, I found an interesting file Groups.xml

Now this gives a gpp encrypted cpassword, i.e : edBSHOwhZLTjt/QS9FeIcJ83mjWA98gw9guKOhJOdcqh+ZGMeXOsQbCpZ3xUjTLfCuNH8pG5aSVYdYw/NglVmQ

To Decrypt it, we'll use this script

and it gave us the password: GPPstillStandingStrong2k18 and the username from xml file, SVC_TGS Now using it we'll access the Users folder in smb, and it gave us user flag

Now, using this command we'll check for any kerberoastable account

and we get

Now we can crack this hash with hashcat using the following command

and we got the password: Ticketmaster1968

Now log in as Administrator in SMB and get the root flag

Last updated