[TryHackMe][CompTIA_Pentest+][Active_Directory_Basics]
- 3 minsSummary:
Learn the basics of Active Directory and how it is used in the real world today.
Tasks
- Setup
- Welcome to Attacktive Directory
- Enumerating Users via Kerberos
- Abusing Kerberos
- Back to the Basics
- Elevating Privileges within the Domain
- Flag Submission Panel
Setup
# apt install bloodhound neo4j -y
# sudo git clone https://github.com/SecureAuthCorp/impacket.git /opt/impacket
# sudo pip3 install -r /opt/impacket/requirements.txt
# cd /opt/impacket/
# sudo pip3 install .
# sudo python3 setup.py installWelcome to Attacktive Directory
Question : What tool will allow us to enumerate port 139/445?
Answer : enum4linuxQuestion : What is the NetBIOS-Domain Name of the machine?
Answer : THM-ADQuestion : What invalid TLD do people commonly use for their Active Directory Domain?
Answer : .localEnumerating Users via Kerberos
Question : What command within Kerbrute will allow us to enumerate valid usernames?
Answer : userenumQuestion : What notable account is discovered? (These should jump out at you)
Answer : svc-adminQuestion : What is the other notable account is discovered? (These should jump out at you)
Answer : backupAbusing Kerberos
Question : We have two user accounts that we could potentially query a ticket from. Which user account can you query a ticket from with no password?
Answer : svc-adminQuestion : Looking at the Hashcat Examples Wiki page, what type of Kerberos hash did we retrieve from the KDC? (Specify the full name)
Answer : Kerberos 5 AS-REP etype 23Question : What mode is the hash?
Answer : 18200Question : Now crack the hash with the modified password list provided, what is the user accounts password?
Answer : management2005Back to the Basics
Question : What utility can we use to map remote SMB shares?
Answer : smbclientQuestion : Which option will list shares?
Answer : -LQuestion : How many remote shares is the server listing?
Answer : 6Question : There is one particular share that we have access to that contains a text file. Which share is it?
Answer : backupQuestion : What is the content of the file?
Answer : YmFja3VwQHNwb29reXNlYy5sb2NhbDpiYWNrdXAyNTE3ODYwQuestion : Decoding the contents of the file, what is the full contents?
Answer : backup@spookysec.local:backup2517860Elevating Privileges within the Domain
Question : What method allowed us to dump NTDS.DIT?
Answer : DRSUAPIQuestion : What is the Administrators NTLM hash?
Answer : 0e0363213e37b94221497260b0bcb4fcQuestion : What method of attack could allow us to authenticate as the user without the password?
Answer : Pass The HashQuestion : Using a tool called Evil-WinRM what option will allow us to use a hash?
Answer : -HFlag Submission Panel
Question : svc-admin
Answer : TryHackMe{K3rb3r0s_Pr3_4uth}Question : backup
Answer : TryHackMe{B4ckM3UpSc0tty!}Question : Administrator
Answer : TryHackMe{4ctiveD1rectoryM4st3r}