Skip to content

Hokkaido 🔸

Enumeration

Using kerbrute discover users

Checking info/info

We find a password inside sysvol

Spraying it we find

discovery:Start123!

Connect to the db

Show impersionations and activate it to see the database

So we have hrapp-service:Untimed$Runny

Using bloodhound python we can now see the AD

This user has genericwrite over hazel.green so we can execute a targeted kerberoast from hrapp-service

Using hashcat

So hazel.green:haze1988

We can see that hazel belongs to tier2-admins and this group can forcechangepassword of molly smith who can rdp to the dc machine.

Initial Access

RDP to the machine with molly

Get the flag

Privilege Escalation

Open powershell as administrator

We are backup operator so get sam and system (as we are in a DC, sam could contain domain admin hash mirrored from ntdist)

Post Exploitation

Get the flag