# TryHackMe-THROWBACK-WS01 (10.200.34.222)
## NMAP
```
No ports open on this machine
```
We can get `user.txt` flag from here
And for `root.txt`
Since we have ran `autoroute` on `THROWBACK-WS01` we can access machines on the network as we were not able to run nmap scan on this machine
We can ssh into the machine with BlaireJ's plain text password
Now that we have gained inital foothold on WS-01 again we need to do some enumeration with `Bloodhound`.
After installing it on kali machine we can the GUI interface on browser
Now we need to download a file called `Sharphound.ps1` a powershell script to be transfered on WS-01 machine
https://github.com/BloodHoundAD/BloodHound/blob/master/Collectors/SharpHound.ps1
To run the script we need to disable antivirus or windows defender on the target machine
https://www.itechtics.com/enable-disable-windows-defender/
`Set-MpPreference -DisableRealtimeMonitoring $true`
Then run this command to get a map of the AD environment
`Invoke-Bloodhound -CollectionMethod All -Domain THROWBACK.local -ZipFileName loot.zip`
Now we need to get this `20210227114234_loot.zip` on our machine
I messed up with the credentials and didn't found a way to reset so I disabled the authentication
`subl /etc/neo4j/neo4j.conf`
Copy that zip file from the target to our local machine
Simply drag and drop to bloodhound GUI and run quries example get all admins
Run the query `Map Domain Trusts`
Run the query `List all Kerberoastable Accounts`
Run the query `Find Shortest Paths to Domain Admins`
Now in order to get kerbroast ticket we need the impacket version 0.9.19
https://github.com/SecureAuthCorp/impacket/releases/tag/impacket_0_9_19
Reason is if we run with latest version
We won't get the kerbroast ticket of SQLSERVICE account so on running with older version
On getting that kerbroast hash we need to crack it using `hashcat`