Skip to content

Hokkaido 🔸

Enumeration

Using kerbrute, discover users.

Checking info/info.

We find a password inside sysvol.

Spraying it, we find:

discovery:Start123!

Connect to the db.

Show impersonations and activate it to see the database.

So we have hrapp-service:Untimed$Runny

Using bloodhound-python, we can now see the AD.

This user has GenericWrite over hazel.green, so we can execute a targeted kerberoast from hrapp-service.

Using hashcat:

So hazel.green:haze1988

We can see that hazel belongs to tier2-admins and this group can forcechangepassword of molly smith who can rdp to the DC machine.

Initial Access

RDP to the machine with molly.

Get the flag.

Privilege Escalation

Open powershell as administrator.

We are backup operator, so get sam and system (as we are in a DC, sam could contain domain admin hash mirrored from ntds.dit).

Post Exploitation

Get the flag.