Cicada

Cicada HTB Detailed Walkthrough

Initial Enumeration with Nmap

sudo nmap -p- -sVC 10.129.190.226

Output: Ports open include:

  • 53 (DNS)

  • 88 (Kerberos)

  • 135, 139, 445 (SMB, RPC)

  • 389/636 (LDAP/LDAPS)

  • 3268/3269 (Global Catalog LDAP)

  • 5985 (WinRM)

  • 64827 (MSRPC)

Important service: LDAP Domain: cicada.htb, Host: CICADA-DC, OS: Windows Server 2022

Enumerate SMB Shares (Anonymous)

nxc smb 10.129.190.226 --shares

Error: STATUS_USER_SESSION_DELETED

Try with anonymous:

Output: Shares found: ADMIN$, C$, DEV, HR, IPC$, NETLOGON, SYSVOL

Access HR Share

File Content: Default password provided: Cicada$M6Corpb*@Lp#nZp!8

RID Brute Force Users

Discovered Users: john.smoulder, sarah.dantelia, michael.wrightson, david.orelious, emily.oscars, etc.

Prepare User List and Password Spray

Valid login: michael.wrightson

Enumerate More Users (with Valid Creds)

Found Note in Description: david.orelious: Just in case I forget my password is aRt$Lp#7t*VQ!3

Access DEV Share with david.orelious

Content Reveals Credentials: User: emily.oscars, Pass: Q!3@Lp#M6b*7t*Vt

Access C$ and Retrieve user.txt

Spawn Shell with Evil-WinRM

Dump Local Hashes (SAM & SYSTEM)

NT Hash Recovered: Administrator:2b87e7c93a3e8a0ea4a581937016f341

Confirm Administrator Access

Access Confirmed

Exploit SeBackupPrivilege (VSS Shadow Copy)

Create diskshadow script:

Convert & Upload:

Run diskshadow:

Copy ntds.dit:

Dump Domain Secrets

Confirms Administrator and domain user hashes.

Administrator WinRM Access & Root Flag

Root Flag: 8921a5862c5fb0324cac27bcd44a833c

Last updated