// htb writeup 2026-02-25
Hercules
HackTheBox Insane
root obtained // PWNED

Hercules — HTB Seasonal (Windows) — Teaser

Difficulty: Insane
Skills: AD ACL abuse, PowerShell / PowerView, PKI & AD CS, Cert enrollment (on-behalf-of), Kerberos (PKINIT, ccaches, S4U/S4U2Proxy), Impacket/Impacket-style tooling, WinRM lateral movement.
Box type: Windows (Active Directory / PKI / Kerberos / WinRM)

Short pitch

Hercules is a brutal, identity-first Active Directory puzzle that rewards careful enumeration and creative abuse of AD permissions and certificates. You’ll weave ACL modifications, certificate enrollment, and Kerberos trickery into an identity choreography that turns low-privilege access into domain control.

What you’ll do (high level, non-spoiler)

Why it’s fun / what you’ll learn

This box is a deep dive into modern AD identity mechanics. You’ll practice:

Gentle hints

Path outline (non-spoilery sequence)

  1. Enumerate AD, SPNs and certificate infrastructure; find where delegated rights exist.
  2. Use delegated rights to enable or reset an account and obtain a fresh TGT/ccache.
  3. Request a certificate (possibly on-behalf-of another user) and export it to a PFX.
  4. Convert PFX → PEM → PKINIT to get a usable ccache / TGT, or use the PFX to auth direct to WinRM.
  5. Use the ticket/cert to access WinRM, pivot, then abuse S4U or service account flows to impersonate higher-privilege principals and get the domain flag.

Starting hints (CTF)

Example tooling you’ll probably use

PowerView / PowerShell, Certipy, Impacket (GetTGT/GetST/changepasswd), kinit / klist, evil-winrm (cert or Kerberos), and small PowerShell helpers for ACL changes.

Final note

Hercules is designed for players who enjoy thinking in identities and permissions. If you like AD puzzles where the exploit surface is permission/attribute choreography (not just CVEs), this box will reward patient, methodical play. Bring your Kerberos and PKI playbooks — you’ll need them.