Enumeration

Nmap

Nmap scan results showed services like LDAP, which are commonly used in Active Directory. This indicates the target is likely a Domain Controller.

00 - nmap output

SMB

Performed SMB enumeration without credentials (SMB NULL session) and discovered a readable share, which could contain useful information for further access.

01 - smbmap output

Inside the accessible SMB share, I found a Groups.xml file. It contained a user account name along with an encrypted password—commonly associated with Group Policy Preferences (GPP) in older Windows environments.

02 - get Groups xml

03 - password

Exploitation

After researching, I learned that Group Policy Preferences (GPP) passwords are encrypted with a well-known key. This makes them easy to decrypt using publicly available tools or simple Python scripts. More details can be found on: https://attack.mitre.org/techniques/T1552/006/

04 - get GPP Password

After decrypting the GPP password, I re-ran smbmap using the recovered credentials. This granted read access to the Users share, where I found the user’s desktop folder containing the user flag.

05 - user flag

Privilege Escalation

To escalate privileges, I used the GetUserSPN script with the discovered user credentials. This allowed me to request a Ticket Granting Service (TGS) ticket for the administrator account, opening the door for offline password cracking. More details on this technique can be found in CrowdStrike’s Kerberoasting overview: https://www.crowdstrike.com/en-us/cybersecurity-101/cyberattacks/kerberoasting/

06 - SPN

I used Hashcat with module 13100 (Kerberos 5 TGS-REP etype 23) to crack the captured TGS ticket and successfully recovered the administrator’s password.

07 - cracking

08 - cracked

With the administrator credentials in hand, I gained full control over the machine — the target was completely pwned.

09 - pwned


<
Previous Post
IoT Firmware Extraction
>
Next Post
Forest - Hack The Box