Administrator

ACL abuse chain on a Windows DC: pivot through AD users via GenericAll/ForceChangePassword, crack an FTP password vault, Kerberoast to DCSync, then Pass-the-Hash for full admin.

Administrator

Difficulty: Medium OS: Windows Category: Active Directory IP: 10.129.2.60


Overview

Administrator is a medium-difficulty Windows Active Directory machine. The attack chain involves exploiting a series of AD privilege relationships (ACL abuse) to pivot through multiple domain accounts, eventually gaining DCSync rights and dumping the domain's NTLM hashes. The path is:


Enumeration

Nmap

Clock skew of ~7 hours was noted — relevant for Kerberos, which requires time sync within 5 minutes. Keep in mind when using Kerberos-based attacks.

RID Brute-Force (User Enumeration)

Using NetExec with the provided starting credentials olivia:ichliebedich. This technique enumerates domain users and groups by iterating over Windows Security Identifiers (SIDs). Key accounts discovered:

Foothold — BloodHound ACL Abuse

Olivia → Michael (GenericAll)

BloodHound analysis revealed that Olivia holds GenericAll over the Michael account. GenericAll is effectively full control over an object, it includes the ability to reset the user's password without knowing the current one.

Michael → Benjamin (ForceChangePassword)

BloodHound further showed that Michael holds ForceChangePassword over Benjamin. This is a more targeted ACE (Access Control Entry) that specifically permits password resets.

Michael has no additional privileges beyond what Olivia already had — the sole purpose of this pivot is to reach Benjamin, who has FTP access.

FTP — Backup.psafe3

With Benjamin's credentials, logging into FTP reveals a single file:

Cracking the Password Safe

Backup.psafe3 is a Password Safe v3 database — an encrypted credential vault protected by a master password.

Step 1: Extract the hash with pwsafe2john Step 2: Crack with John the Ripper against rockyou.txt Step 3: Open the vault with the master password tekieromucho to retrieve Emily's credentials

now from this .psafe we can get emily's password i.e UXLCI5iETUsIBoFVTj8yQFKoHjXmb

User Flag — Emily via WinRM

Privilege Escalation

Emily → Ethan (Targeted Kerberoasting via GenericWrite)

BloodHound shows Emily has GenericWrite over the Ethan account. GenericWrite allows modification of most non-protected attributes of an AD object, including servicePrincipalName (SPN).

The attack — Targeted Kerberoasting:

The idea is to temporarily assign a fake SPN to Ethan's account. Any account with an SPN registered is eligible for Kerberoasting — the Domain Controller will issue a TGS (Ticket Granting Service) ticket encrypted with Ethan's NTLM hash, which can then be cracked offline.

Note: Shadow Credentials was also attempted (adding a key to msDSKeyCredentialLink), but failed because PKINIT (the Kerberos extension required for certificate-based authentication) was not available or not configured for this environment.

Step 1: Set a fake SPN on Ethan using bloodyAD who has GetChangesInFilteredSet, GetChanges, GetChangesAll on Step 2: Request the TGS ticket with impacket-GetUserSPNs. This returns a $krb5tgs$23$*ethan$... hash (RC4-encrypted Kerberos service ticket). Step 3: Crack with Hashcat:

Then, cracking this hash using hascat gave us the password limpbizkit

Ethan → Administrator (DCSync)

BloodHound shows Ethan holds three critical permissions on the administrator.htb domain object:

  • GetChanges

  • GetChangesAll

  • GetChangesInFilteredSet

Together, GetChanges + GetChangesAll are the exact permissions required to perform a DCSync attack. DCSync mimics the behavior of a Domain Controller replicating directory data — it lets an attacker request the NTLM hash of any account directly from the DC, without needing to touch LSASS or run code on the DC.

Key hashes retrieved:

Root Flag — Pass-the-Hash as Administrator

With the Administrator's NT hash, we perform a Pass-the-Hash attack. PTH works because Windows NTLM authentication accepts the raw hash in place of a password — there is no need to crack it.

Last updated