BloodHound
┌──(kali㉿kali)-[~/…/htb/labs/sauna/bloodhound]
└─$ KRB5CCNAME=../fsmith.ccache bloodhound-python -u fsmith -d EGOTISTICAL-BANK.LOCAL -k -ns $IP -dc sauna.egotistical-bank.local --dns-tcp --zip -no-pass -c All
password:
info: Found AD domain: egotistical-bank.local
info: Using TGT from cache
info: Found TGT with correct principal in ccache file.
info: Connecting to LDAP server: sauna.egotistical-bank.local
info: Found 1 domains
info: Found 1 domains in the forest
info: Found 1 computers
info: Connecting to LDAP server: sauna.egotistical-bank.local
info: Found 7 users
info: Found 52 groups
info: Found 3 gpos
info: Found 1 ous
info: Found 19 containers
info: Found 0 trusts
info: Starting computer enumeration with 10 workers
info: Querying computer: SAUNA.EGOTISTICAL-BANK.LOCAL
info: Done in 00M 05S
info: Compressing output into 20230325185415_bloodhound.zip
Using the TGT of the fsmith
user, I am able to authenticate to the target KDC to run the ingestor for bloodhound
The -no-pass
flag of bloodhound-python doesn’t seem to be functional
┌──(kali㉿kali)-[~/archive/htb/labs/sauna]
└─$ sudo neo4j console
[sudo] password for kali:
directories in use:
home: /usr/share/neo4j
config: /usr/share/neo4j/conf
logs: /usr/share/neo4j/logs
plugins: /usr/share/neo4j/plugins
import: /usr/share/neo4j/import
data: /usr/share/neo4j/data
certificates: /usr/share/neo4j/certificates
licenses: /usr/share/neo4j/licenses
run: /usr/share/neo4j/run
Starting Neo4j.
┌──(kali㉿kali)-[~/archive/htb/labs/sauna]
└─$ bloodhound
Firing up neo4j and bloodhound
Upload complete
Kerberoast-able Accounts
These 2 users are Kerberoast-able accounts
While the
krbtgt
user is disabled, the hsmith
user isn’t.
I should be able to kerberoast the hsmith
user
fsmith
The
fsmith
user is able to WinRM into the DC host
This was already enumerated through ldapdomaindump
hsmith
The user doesn’t have much going on
svc_loanmgr
The
svc_loadmgr
user is a high-value target as the user has the DCSync privileges over the domain, let alone being able to WinRM directly into the DC host