Hokkaido 🔸
Enumeration


Using kerbrute, discover users.

Checking info/info.

We find a password inside sysvol.

Spraying it, we find:

discovery:Start123!
Connect to the db.

Show impersonations and activate it to see the database.

So we have hrapp-service:Untimed$Runny
Using bloodhound-python, we can now see the AD.

This user has GenericWrite over hazel.green, so we can execute a targeted kerberoast from hrapp-service.

Using hashcat:

So hazel.green:haze1988
We can see that hazel belongs to tier2-admins and this group can forcechangepassword of molly smith who can rdp to the DC machine.

Initial Access
RDP to the machine with molly.

Get the flag.

Privilege Escalation
Open powershell as administrator.

We are backup operator, so get sam and system (as we are in a DC, sam could contain domain admin hash mirrored from ntds.dit).

Post Exploitation
Get the flag.
