2.8 KiB
TryHackMe-THROWBACK-WS01 (10.200.34.222)
NMAP
No ports open on this machine
We can get user.txt
flag from here
And for root.txt
Since we have ran autoroute
on THROWBACK-WS01
we can access machines on the network as we were not able to run nmap scan on this machine
We can ssh into the machine with BlaireJ's plain text password
Now that we have gained inital foothold on WS-01 again we need to do some enumeration with Bloodhound
.
After installing it on kali machine we can the GUI interface on browser
Now we need to download a file called Sharphound.ps1
a powershell script to be transfered on WS-01 machine
https://github.com/BloodHoundAD/BloodHound/blob/master/Collectors/SharpHound.ps1
To run the script we need to disable antivirus or windows defender on the target machine
https://www.itechtics.com/enable-disable-windows-defender/
Set-MpPreference -DisableRealtimeMonitoring $true
Then run this command to get a map of the AD environment
Invoke-Bloodhound -CollectionMethod All -Domain THROWBACK.local -ZipFileName loot.zip
Now we need to get this 20210227114234_loot.zip
on our machine
I messed up with the credentials and didn't found a way to reset so I disabled the authentication
subl /etc/neo4j/neo4j.conf
Copy that zip file from the target to our local machine
Simply drag and drop to bloodhound GUI and run quries example get all admins
Run the query Map Domain Trusts
Run the query List all Kerberoastable Accounts
Run the query Find Shortest Paths to Domain Admins
Now in order to get kerbroast ticket we need the impacket version 0.9.19
https://github.com/SecureAuthCorp/impacket/releases/tag/impacket_0_9_19
Reason is if we run with latest version
We won't get the kerbroast ticket of SQLSERVICE account so on running with older version
On getting that kerbroast hash we need to crack it using hashcat