Certified

Certified HTB Walkthrough

Initial Nmap Scan

nmap -p- -sVC 10.129.231.186

Notable Ports and Services:

  • 53 (DNS)

  • 88 (Kerberos)

  • 389/636/3268/3269 (LDAP)

  • 135, 139, 445 (SMB, NetBIOS)

  • 5985 (WinRM)

  • 9389 (.NET Message Framing)

  • Various high RPC ports

SMB Authentication Attempt

nxc smb certified.htb -u judith.mader -p judith09

Result:

  • Successful login: certified.htb\judith.mader

Enumerating Shares (First Attempt Fails)

Result:

  • STATUS_USER_SESSION_DELETED

WinRM Login Attempt

Result:

  • Login failed

Enumerating Shares (Successful)

Result:

  • ADMIN$

  • C$

  • IPC$

  • NETLOGON

  • SYSVOL

BloodHound

Owner SID Modification

Result:

  • OwnerSid of Domain Admins modified successfully

DACL Permission Injection

Result:

  • DACL modified successfully

Add User to Group

Result:

  • Successfully added

Shadow Credentials Attack with Certipy (1st Attempt Fail)

Result:

  • Clock skew error

Shadow Credentials Attack with Correct Time Sync

Result:

  • NT hash for management_svc retrieved: a091c1832bcdd4677c28b5a6a1295584

Confirm Access with NT Hash

Enumerate Shares and Users

Confirm WinRM Access

Evil-WinRM Shell Access

Identify ADCS Server

Shadow Credentials on ca_operator

Result:

  • NT hash retrieved: b4b86f45c6018f1b664f70805f45d8f2

Modify UPN to Administrator

Request Certificate with Administrator UPN

Result:

  • Certificate issued with UPN: administrator

  • Saved as administrator.pfx

Authenticate as Administrator with Certificate

Result:

  • NT hash retrieved: aad3b435b51404eeaad3b435b51404ee:0d5b49608bbce1751f708748f67e2d34

Last updated