Active Directory Hacking with Kali: Attackative Directory

Introduction

For my fifth machine in the Active Directory hacking with Kali series, I’ll be pwning attackative directory from tryhackme. Attackative directory is an easy active directory machine that teaches the basics of active directory enumeration and ASREPROASTING attacks.

Recon

Initial Nmap scan

Detailed Nmap Scan

SMB Enumeration

Crackmapexec RID brute

Found some domain users

Save users into a text file

Try ASREPROAST on discovered users

We discover the user svc-admin is Asreproasteble and save the obtained hash into a file to be cracked

Exploitation

SVC-Admin’s password cracked with john

Let’s spray this password with crackmapexec, we have access to SMB

Enumerate share access with SMB Map

We have access to three shares, backups is a non-default share so lets check it out first

Interesting a credentials file… download locally and open

decode the base64 text

Try evil-winrm with back creds …

No luck..

Try dumping secrets with Impacket-SecretDump.py

We get admin hash!

Use evil-winrm to pass the hash and profit

Leave a Reply

Your email address will not be published. Required fields are marked *