# Active

**Date**: 27/06/2022

**Difficulty**: Easy

**CTF**: <https://app.hackthebox.com/machines/148>

***

Let’s start with the classic ping to test the connection with the target machine:

<figure><img src="https://3648139271-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FDU2KcTfFp1xEzUDMyoAe%2Fuploads%2Fgit-blob-ce2dfbeccd13d0fbc5bdc8707ec85ecb6ba5082a%2Factive0.png?alt=media" alt=""><figcaption></figcaption></figure>

1 packet emitted, 1 packet received. The ttl shows a value of 127 which in HTB means that we are probably against a Windows machine.

Let’s do a scan of the TCP ports to find which ones are open:

<figure><img src="https://3648139271-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FDU2KcTfFp1xEzUDMyoAe%2Fuploads%2Fgit-blob-73f6b291649439fa87183e5393efb9d1b80aea78%2Factive1.png?alt=media" alt=""><figcaption></figcaption></figure>

Wow, it shows a bunch of open TCP ports. Let’s do a further scan in these ports:

<figure><img src="https://3648139271-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FDU2KcTfFp1xEzUDMyoAe%2Fuploads%2Fgit-blob-06c3603d86d8cad5ebe9dcc47beaca9ebbe6a790%2Factive2.png?alt=media" alt=""><figcaption></figcaption></figure>

We have much information here. First of all we have kerberos, RPC and ldap services. We also have a DNS service in port 53 and a http service running on port 47001.

Let’s see if we can any info from the DNS service:

<figure><img src="https://3648139271-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FDU2KcTfFp1xEzUDMyoAe%2Fuploads%2Fgit-blob-eac640220115a1f1cf64ef6f07f83e4cfb70cdb5%2Factive3.png?alt=media" alt=""><figcaption></figcaption></figure>

Apparently nothing… Let’s see the http service:

<figure><img src="https://3648139271-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FDU2KcTfFp1xEzUDMyoAe%2Fuploads%2Fgit-blob-bbeea81010c0f2bfb4b0b688f46f1d6aa3f23d82%2Factive4.png?alt=media" alt=""><figcaption></figcaption></figure>

Ok, we also have the port 445 open which is usually used by SMB… Let’s try to obtain more info using crackmapexec:

<figure><img src="https://3648139271-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FDU2KcTfFp1xEzUDMyoAe%2Fuploads%2Fgit-blob-10876ef4c5cf3e076ffe159b62a8be56cf3e9225%2Factive5.png?alt=media" alt=""><figcaption></figcaption></figure>

<figure><img src="https://3648139271-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FDU2KcTfFp1xEzUDMyoAe%2Fuploads%2Fgit-blob-3a9d03325a68fcc180913858cbe38bfde4a2a430%2Factive6.png?alt=media" alt=""><figcaption></figcaption></figure>

If we search the Build version, we can find that the target server is a Windows Server 2008 R2, SP1.

Now we know that the domain is `active.htb` let’s add it to the `/etc/hosts`.

<figure><img src="https://3648139271-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FDU2KcTfFp1xEzUDMyoAe%2Fuploads%2Fgit-blob-622b05f0f789863e19593671df5cd718043a6ab4%2Factive7.png?alt=media" alt=""><figcaption></figcaption></figure>

<figure><img src="https://3648139271-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FDU2KcTfFp1xEzUDMyoAe%2Fuploads%2Fgit-blob-c4e4d72226698314b1d0782420ffd1d426540286%2Factive8.png?alt=media" alt=""><figcaption></figcaption></figure>

But the http service looks the same.

Let’s try to enumerate the smb:

<figure><img src="https://3648139271-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FDU2KcTfFp1xEzUDMyoAe%2Fuploads%2Fgit-blob-a139588489895f2cff6f40343b7b88439966d7df%2Factive9.png?alt=media" alt=""><figcaption></figcaption></figure>

We have READ permissions to the folder Replication. Let’s look inside!

<figure><img src="https://3648139271-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FDU2KcTfFp1xEzUDMyoAe%2Fuploads%2Fgit-blob-995cb60b54d64550278548d7afedcb9f555b5559%2Factive10.png?alt=media" alt=""><figcaption></figcaption></figure>

<figure><img src="https://3648139271-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FDU2KcTfFp1xEzUDMyoAe%2Fuploads%2Fgit-blob-7371b59cfa88c246b5ca3c4b0707cb3df3a55576%2Factive11.png?alt=media" alt=""><figcaption></figcaption></figure>

<figure><img src="https://3648139271-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FDU2KcTfFp1xEzUDMyoAe%2Fuploads%2Fgit-blob-e0cf79acc5b4ea580cc60fefa8c1718ec962b16e%2Factive12.png?alt=media" alt=""><figcaption></figcaption></figure>

Every folder at this level was empty.

<figure><img src="https://3648139271-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FDU2KcTfFp1xEzUDMyoAe%2Fuploads%2Fgit-blob-eb409bdcae6cf9779daed833bad0b88348fcf04a%2Factive13.png?alt=media" alt=""><figcaption></figcaption></figure>

<figure><img src="https://3648139271-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FDU2KcTfFp1xEzUDMyoAe%2Fuploads%2Fgit-blob-3f24dd0c199d4a021b76cc3caa46ae73d1a01226%2Factive14.png?alt=media" alt=""><figcaption></figcaption></figure>

It seems like it may have interesting files… let’s download all the folder to navigate more quickly:

`smbget -R smb://10.129.81.48/Replication`

<figure><img src="https://3648139271-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FDU2KcTfFp1xEzUDMyoAe%2Fuploads%2Fgit-blob-7973550991c245a84121183dd6917047ef0f67d7%2Factive15.png?alt=media" alt=""><figcaption></figcaption></figure>

<figure><img src="https://3648139271-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FDU2KcTfFp1xEzUDMyoAe%2Fuploads%2Fgit-blob-60f90970b692f36eafdbd6fecc024b4d379e2d63%2Factive16.png?alt=media" alt=""><figcaption></figcaption></figure>

<figure><img src="https://3648139271-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FDU2KcTfFp1xEzUDMyoAe%2Fuploads%2Fgit-blob-5e966a008893c76c2a56390076e3a47d8e67ea15%2Factive17.png?alt=media" alt=""><figcaption></figcaption></figure>

<figure><img src="https://3648139271-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FDU2KcTfFp1xEzUDMyoAe%2Fuploads%2Fgit-blob-bd3f3e432a674a708a37cf49a747120f29bf451b%2Factive18.png?alt=media" alt=""><figcaption></figcaption></figure>

<figure><img src="https://3648139271-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FDU2KcTfFp1xEzUDMyoAe%2Fuploads%2Fgit-blob-0a3288ff3840861ab36a2672db8417be7782ed7e%2Factive19.png?alt=media" alt=""><figcaption></figcaption></figure>

<figure><img src="https://3648139271-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FDU2KcTfFp1xEzUDMyoAe%2Fuploads%2Fgit-blob-a575efb7303a0087d9180a6a51218a5a8a90f990%2Factive20.png?alt=media" alt=""><figcaption></figcaption></figure>

<figure><img src="https://3648139271-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FDU2KcTfFp1xEzUDMyoAe%2Fuploads%2Fgit-blob-abcb9fa02025525977ec936e102fc72ef0db7b1e%2Factive21.png?alt=media" alt=""><figcaption></figcaption></figure>

Maybe we have credentials here?

`active.htb\SVC_TGS : edBSHOwhZLTjt/QS9FeIcJ83mjWA98gw9guKOhJOdcqh+ZGMeXOsQbCpZ3xUjTLfCuNH8pG5aSVYdYw/NglVmQ`

<figure><img src="https://3648139271-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FDU2KcTfFp1xEzUDMyoAe%2Fuploads%2Fgit-blob-39de0a8a275fc7ca86a83d79863671ef6680a87d%2Factive22.png?alt=media" alt=""><figcaption></figcaption></figure>

Is not that simple… Let’s see if the username at least is valid using kerbrute:

<figure><img src="https://3648139271-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FDU2KcTfFp1xEzUDMyoAe%2Fuploads%2Fgit-blob-41f1264ecbfc3395b0545beb7271bd7930db4e06%2Factive23.png?alt=media" alt=""><figcaption></figcaption></figure>

Yes, it is. So we have a valid username but not its password I guess.

Doing some research, I found [this](https://vk9-sec.com/exploiting-gpp-sysvol-groups-xml/):

<figure><img src="https://3648139271-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FDU2KcTfFp1xEzUDMyoAe%2Fuploads%2Fgit-blob-778106a07e3ad08d2bdbe546dd0a462112d2f9cd%2Factive24.png?alt=media" alt=""><figcaption></figcaption></figure>

So the password seems to be encrypted in AES-256 and we can crack it using gpp-decrypt.

<figure><img src="https://3648139271-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FDU2KcTfFp1xEzUDMyoAe%2Fuploads%2Fgit-blob-c28718135da06e37ceacddd40b302ec4422c852b%2Factive25.png?alt=media" alt=""><figcaption></figcaption></figure>

Let’s save this credential in a file.

<figure><img src="https://3648139271-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FDU2KcTfFp1xEzUDMyoAe%2Fuploads%2Fgit-blob-878827134fe975f06d4786093897393574bbd7d8%2Factive26.png?alt=media" alt=""><figcaption></figcaption></figure>

And now let’s test it:

<figure><img src="https://3648139271-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FDU2KcTfFp1xEzUDMyoAe%2Fuploads%2Fgit-blob-c2702062e55d243f1bcf8cd2f50aa2640d591e63%2Factive27.png?alt=media" alt=""><figcaption></figcaption></figure>

Yes, it’s valid!

<figure><img src="https://3648139271-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FDU2KcTfFp1xEzUDMyoAe%2Fuploads%2Fgit-blob-f93554bb5d83c9314f718ec38fe3b95763aa1631%2Factive28.png?alt=media" alt=""><figcaption></figcaption></figure>

Now, using this credentials we have access to more folders. Let’s look into `Users`:

<figure><img src="https://3648139271-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FDU2KcTfFp1xEzUDMyoAe%2Fuploads%2Fgit-blob-12f503a202b2f10dc44a3ea884541ca2bb34beac%2Factive29.png?alt=media" alt=""><figcaption></figcaption></figure>

Can we list the Administrator folder?

<figure><img src="https://3648139271-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FDU2KcTfFp1xEzUDMyoAe%2Fuploads%2Fgit-blob-1a7ae3bec591ea2689f25e6f4285844f0a2607d1%2Factive30.png?alt=media" alt=""><figcaption></figcaption></figure>

Nope. Let’s try with the rest:

<figure><img src="https://3648139271-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FDU2KcTfFp1xEzUDMyoAe%2Fuploads%2Fgit-blob-59ea08953fce8a8baafcdf7f41229dd8bd5aa484%2Factive31.png?alt=media" alt=""><figcaption></figcaption></figure>

Apparently the userflag is in `Users/SVC_TGS/Desktop` path. Let’s download it!

<figure><img src="https://3648139271-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FDU2KcTfFp1xEzUDMyoAe%2Fuploads%2Fgit-blob-bb5d52570e9f14acd869a9b1d621782339818de6%2Factive32.png?alt=media" alt=""><figcaption></figcaption></figure>

After enumerate the SMB I have found nothing else interesting, let’s try to do a `ldapdomaindumpH`

<figure><img src="https://3648139271-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FDU2KcTfFp1xEzUDMyoAe%2Fuploads%2Fgit-blob-4029461aeb847cb067a0aa5913201552d1d54e97%2Factive33.png?alt=media" alt=""><figcaption></figcaption></figure>

<figure><img src="https://3648139271-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FDU2KcTfFp1xEzUDMyoAe%2Fuploads%2Fgit-blob-62af70606c58bae0cc3be27955af4cb7ba6e652a%2Factive34.png?alt=media" alt=""><figcaption></figcaption></figure>

As we saw earlier it is a Windows Server 2008 R2 SP1.

<figure><img src="https://3648139271-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FDU2KcTfFp1xEzUDMyoAe%2Fuploads%2Fgit-blob-a787bf1996c30d1eb82b6e73f98f8426a9671a0a%2Factive35.png?alt=media" alt=""><figcaption></figcaption></figure>

Apparently there are only 4 users

* SVC\_TGS: we have its credentials
* krbtgt: Key Distribution Center Service Account
* Guest
* Administrator

Let’s try a Kerberoast attack:

`❯ sudo python3 /home/angellm/THM/CTF/Relevant/impacket/build/scripts-3.9/GetUserSPNs.py active.htb/SVC_TGS:GP#################18 -dc-ip 10.129.104.47 -request`

<figure><img src="https://3648139271-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FDU2KcTfFp1xEzUDMyoAe%2Fuploads%2Fgit-blob-b7d8e5f9f9803cca9a29e7493f0b906c821f096e%2Factive36.png?alt=media" alt=""><figcaption></figcaption></figure>

Let’s now try to crack the hash using hashcat:

`hashcat -m 13100 -a 0 kerberoast_result /usr/share/wordlists/rockyou.txt`

<figure><img src="https://3648139271-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FDU2KcTfFp1xEzUDMyoAe%2Fuploads%2Fgit-blob-6fe1b9fc975ec817deeb8e6b37a3fccebfab4464%2Factive37.png?alt=media" alt=""><figcaption></figcaption></figure>

Cracked!

Let’s see if this credentials are correct:

<figure><img src="https://3648139271-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FDU2KcTfFp1xEzUDMyoAe%2Fuploads%2Fgit-blob-923b41bc0f0e688ff4b8a627565cef4f0aac8ae2%2Factive38.png?alt=media" alt=""><figcaption></figcaption></figure>

Yeah, Pwned! Let’s go for the root flag:

<figure><img src="https://3648139271-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FDU2KcTfFp1xEzUDMyoAe%2Fuploads%2Fgit-blob-0f3876cac4afe541987b1409762a729a672f8e2f%2Factive39.png?alt=media" alt=""><figcaption></figcaption></figure>

<figure><img src="https://3648139271-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FDU2KcTfFp1xEzUDMyoAe%2Fuploads%2Fgit-blob-4f5e9b310ba1e621188e49c397a81a37be43cc9c%2Factive40.png?alt=media" alt=""><figcaption></figcaption></figure>

Done!
