Difficulty: Hard OS: Windows Release: HTB Season 10
An Active Directory box that takes you through RODC abuse from start to finish. The early chain is straightforward BloodHound enumeration work — the interesting part starts when you land on the RODC and have to understand what makes a Read-Only Domain Controller’s krbtgt key different, and how the Key List attack turns RODC-level access into full domain compromise. Not many boxes make you touch this corner of AD.

scriptPath WRITE permissionForceChangePassword abuse for lateral movementkrbtgt_XXXX account and AES256 key extraction via MimikatzmsDS-RevealOnDemandGroup and msDS-NeverRevealGroup manipulationasktgs /keyList) — using RODC TGT to extract main krbtgt materialsecretsdump.pyFoothold
User
ForceChangePassword edge over another account. Use it — that account has WinRM access.Root
krbtgt key (numbered, not the main one). Mimikatz can dump it once you’re SYSTEM on the RODC.msDS-RevealOnDemandGroup before you start. You need to add the Administrator account there and clear the never-reveal list.scriptPath WRITE abuse — how logon scripts work in ADkrbtgt_XXXX is and why it differs from the main krbtgtgolden /rodcNumber — RODC Golden Ticket syntaxasktgs /enctype:aes256 /keyList — the Rubeus documentation is the best sourcemsDS-RevealOnDemandGroup and msDS-NeverRevealGroup — RODC attribute documentationsecretsdump.py -k — Kerberos-authenticated secrets dump