Ledger - Tryhackme
Ledger - Tryhackme - Active Directory Hard Room

Ledger - Tryhackme

Nmap Enumeration

We are definitely facing a Domain Controller.

Article content
Domain Controller

After digging into ports 80 and 443, we didn't find anything valuable.

User Enumeration

It took me some time to retrieve the full list of users from the Domain Controller. Additionally, I had to clean up the file to use it for enumeration purposes.

Article content
Gathering users from DC.

Extracting Kerberos pre-authentication users: I obtained 5 hashes from 5 different users in total. Unfortunately, I couldn't crack them.

Article content
GetNPUsers Impacket Tool
Article content
One of the hashes I got

After some investigation I discovered that recent researches have shown that an AS-REP-roastable user can be leveraged to perform Kerberoasting, without pre-authentication. So I gave it a chance. I used the hash of 'SHELLEY_BEARD', one of the users without pre-authentication that I identified earlier. For some reason, I couldn't crack the hash again. LET'S MOVE ON.

Article content
Ticket Granting Service - I couldn't crack it.

LDAP Enumeration

Trying to get all the information from LDAP - CN=Common Names of users/groups, DN=distinguished names, sAMAccountName=usernames, objectClass, description

This took me a while. The report I got was huge, but finally I got a potential password.

Article content
Getting relevant information from LDAP, and retrieving all description results.
Article content
Potential Passwords.

Password-Spraying

The password matched with 2 users: IVY_WILLIS and SUSANNA_MCKNIGHT

Article content
Password-Spraying attack

Bloodhound Enumeration

Article content
Bloodhound-python
Article content
neo4j

SUSANNA_MCKNIGHT belongs to REMOTE MANAGEMENT USERS

Article content
Bloodhound enumeration

RDP connection using xfreerdp and first flag

Article content
establishing connection
Article content
First flag.

Some User Enumeration

A quick 'whoami /all' revealed that user SUSANNA_MCNIGHT belongs to 'Certificate Service DCOM Access' group. Let's abuse it.

Article content
Certificate Service DCOM Access group

Privilege Escalation using certipy-ad Tool

Article content
Looking for vulnerable Certificates with 'certipy-ad' tool

Certificate Name Flag: EnrolleeSuppliesSubject (ESC1)

Vulnerability: ESC1

Article content
We found a vulnerability that we can abuse.

Essentially, this allows anyone to enroll in this template and specify an arbitrary Subject Alternative Name. Meaning that, we could authenticate as a Domain Administrator by exploiting this attack path. However, we tried with Administrator and we couldn't get a shell. Fortunately, there were more users who were members of the admin group. One of this users was BRADLEY_ORTIZ.

Article content
Generating BRADLEY_ORTIZ pfx file.

Requesting a Ticket Granting Ticket and extracting the NT hash for the user

Article content
Requesting a Ticket Granting Ticket and extracting the NT hash for the user

Getting ROOT flag.

Article content


To view or add a comment, sign in

More articles by Eduardo Cochella

  • Billing

    Enumeration: After running a simple service - version scan, we discovered three ports open. Port 22-ssh, 80-http…

  • You Got Mail

    Enumeration Let's start this room by running Nmap. We can see the smtp, pop3 and imap are in the server.

  • Lookup - TryHackMe

    Basic Scan: SSH and HTTP are running. NMAP basic scan Analyzing the Web Application: We had to deal with a login page.

  • Cheese CTF

    NMAP enumeration It seems the all ports are running. Checking port 80, we found that a web application is running.

    1 Comment
  • Attacktive Directory

    NMAP enumeration shows up an Active Directory environment - Kerberos Port 88 DNS_Domain_Name: spookysec.local User…

  • Injectics

    Enumeration Ports 22 and 80 are open Web Application running on port 80 Checking the source code, we found an…

  • New York Flankees

    Enumeration Port 22 and 8080-http are open Checking the request, we found a script function that leaks a token. Custom…

  • CyberLens

    Enumeration Don't forget to manually define the IP addresses associated with the specific hostname After a deep…

  • CREATIVE

    Enumeration Ports 22 and 80 are open Web App Analysis - Nothing interesting Let's look for some subdomains -…

  • Hack Smarter Security

    Enumeration Ports 21, 22, 80, 1311, and 3389 are open Checking port 21 we found some Credit Cards and a Stolen Passport…

    1 Comment

Insights from the community

Others also viewed

Explore topics