{"id":249,"date":"2025-10-18T19:09:00","date_gmt":"2025-10-18T19:09:00","guid":{"rendered":"https:\/\/thecyberstaff.com\/?p=249"},"modified":"2025-12-28T17:42:29","modified_gmt":"2025-12-28T17:42:29","slug":"administrator-hackthebox-lab","status":"publish","type":"post","link":"https:\/\/thecyberstaff.com\/?p=249","title":{"rendered":"Administrator- Hackthebox lab"},"content":{"rendered":"\n<p>This lab came with Active Directory creds to simulate an assumed breach assessment. I started by checking the credentials with Netexec to confirm they worked.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"69\" src=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/10\/Pasted-image-20251018144331-1024x69.png\" alt=\"\" class=\"wp-image-296\" srcset=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/10\/Pasted-image-20251018144331-1024x69.png 1024w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/10\/Pasted-image-20251018144331-300x20.png 300w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/10\/Pasted-image-20251018144331-768x52.png 768w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/10\/Pasted-image-20251018144331-1536x104.png 1536w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/10\/Pasted-image-20251018144331-2048x138.png 2048w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>Next I ran Bloodhound-ce-python to collect Active Directory data for Bloodhound. Looking at the user &#8220;Olivia&#8221; that was provided, I noticed they had an outbound &#8220;GenericAll&#8221; object control over the &#8220;Michael&#8221; user.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"313\" src=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/10\/Pasted-image-20251018144347-1024x313.png\" alt=\"\" class=\"wp-image-298\" srcset=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/10\/Pasted-image-20251018144347-1024x313.png 1024w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/10\/Pasted-image-20251018144347-300x92.png 300w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/10\/Pasted-image-20251018144347-768x235.png 768w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/10\/Pasted-image-20251018144347-1536x469.png 1536w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/10\/Pasted-image-20251018144347-2048x626.png 2048w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>I then used the command below to change the password for the &#8220;Michael&#8221; account.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"77\" src=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/10\/Pasted-image-20251018144353-1024x77.png\" alt=\"\" class=\"wp-image-299\" srcset=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/10\/Pasted-image-20251018144353-1024x77.png 1024w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/10\/Pasted-image-20251018144353-300x22.png 300w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/10\/Pasted-image-20251018144353-768x58.png 768w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/10\/Pasted-image-20251018144353-1536x115.png 1536w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/10\/Pasted-image-20251018144353.png 1708w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>Using Netexec, I check the new credentials to confirm they are working.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"66\" src=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/10\/Pasted-image-20251018144401-1024x66.png\" alt=\"\" class=\"wp-image-300\" srcset=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/10\/Pasted-image-20251018144401-1024x66.png 1024w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/10\/Pasted-image-20251018144401-300x19.png 300w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/10\/Pasted-image-20251018144401-768x50.png 768w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/10\/Pasted-image-20251018144401-1536x99.png 1536w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/10\/Pasted-image-20251018144401-2048x132.png 2048w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>Looking at the &#8220;Michael&#8221; user in Bloodhound, I see that he has the &#8220;ForceChangePassword&#8221; outbound object control over the &#8220;Benjamin&#8221; user.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"248\" src=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/10\/Pasted-image-20251018144408-1024x248.png\" alt=\"\" class=\"wp-image-301\" srcset=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/10\/Pasted-image-20251018144408-1024x248.png 1024w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/10\/Pasted-image-20251018144408-300x73.png 300w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/10\/Pasted-image-20251018144408-768x186.png 768w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/10\/Pasted-image-20251018144408-1536x372.png 1536w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/10\/Pasted-image-20251018144408-2048x496.png 2048w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>I changed the password for &#8220;Benjamin&#8221; with the command below.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"72\" src=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/10\/Pasted-image-20251018144414-1024x72.png\" alt=\"\" class=\"wp-image-302\" srcset=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/10\/Pasted-image-20251018144414-1024x72.png 1024w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/10\/Pasted-image-20251018144414-300x21.png 300w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/10\/Pasted-image-20251018144414-768x54.png 768w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/10\/Pasted-image-20251018144414-1536x108.png 1536w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/10\/Pasted-image-20251018144414.png 1704w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>Then confirmed the new creds worked.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"69\" src=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/10\/Pasted-image-20251018144419-1-1024x69.png\" alt=\"\" class=\"wp-image-303\" srcset=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/10\/Pasted-image-20251018144419-1-1024x69.png 1024w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/10\/Pasted-image-20251018144419-1-300x20.png 300w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/10\/Pasted-image-20251018144419-1-768x52.png 768w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/10\/Pasted-image-20251018144419-1-1536x103.png 1536w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/10\/Pasted-image-20251018144419-1-2048x138.png 2048w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>Having access to the three accounts, I enumerated their groups and settings. I saw that Michael was part of the &#8220;Remote Management Users&#8221; group.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"262\" src=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/10\/Pasted-image-20251018144423-1024x262.png\" alt=\"\" class=\"wp-image-283\" srcset=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/10\/Pasted-image-20251018144423-1024x262.png 1024w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/10\/Pasted-image-20251018144423-300x77.png 300w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/10\/Pasted-image-20251018144423-768x196.png 768w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/10\/Pasted-image-20251018144423-1536x392.png 1536w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/10\/Pasted-image-20251018144423.png 1652w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>Using evil-winrm I connected as &#8220;Michael&#8221; and looked for privilege escalation opportunities such as looking for files and running WinPEAS. I did not find anything good here.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"194\" src=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/10\/Pasted-image-20251018144443-1024x194.png\" alt=\"\" class=\"wp-image-284\" srcset=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/10\/Pasted-image-20251018144443-1024x194.png 1024w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/10\/Pasted-image-20251018144443-300x57.png 300w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/10\/Pasted-image-20251018144443-768x145.png 768w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/10\/Pasted-image-20251018144443.png 1040w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>After getting stuck, I realized I forgot to do a port scan! I got too excited about the Active Directory stuff.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"583\" src=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/10\/Pasted-image-20251018152735-1024x583.png\" alt=\"\" class=\"wp-image-285\" srcset=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/10\/Pasted-image-20251018152735-1024x583.png 1024w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/10\/Pasted-image-20251018152735-300x171.png 300w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/10\/Pasted-image-20251018152735-768x438.png 768w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/10\/Pasted-image-20251018152735.png 1055w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>I was able to get access to FTP with the &#8220;Benjamin&#8221; account credentials and pulled down a file called &#8220;Backup.psafe3&#8221;. This is a database for a password manager called Password Safe.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"539\" height=\"492\" src=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/10\/Pasted-image-20251018152855.png\" alt=\"\" class=\"wp-image-286\" srcset=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/10\/Pasted-image-20251018152855.png 539w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/10\/Pasted-image-20251018152855-300x274.png 300w\" sizes=\"auto, (max-width: 539px) 100vw, 539px\" \/><\/figure>\n\n\n\n<p>Using pwsafe2john I got the hash for the master password for the vault.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"61\" src=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/10\/Pasted-image-20251018153139-1024x61.png\" alt=\"\" class=\"wp-image-287\" srcset=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/10\/Pasted-image-20251018153139-1024x61.png 1024w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/10\/Pasted-image-20251018153139-300x18.png 300w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/10\/Pasted-image-20251018153139-768x46.png 768w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/10\/Pasted-image-20251018153139.png 1225w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>I used john to crack the password hash and got the cleartext master password.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"776\" height=\"196\" src=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/10\/Pasted-image-20251018153150.png\" alt=\"\" class=\"wp-image-288\" srcset=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/10\/Pasted-image-20251018153150.png 776w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/10\/Pasted-image-20251018153150-300x76.png 300w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/10\/Pasted-image-20251018153150-768x194.png 768w\" sizes=\"auto, (max-width: 776px) 100vw, 776px\" \/><\/figure>\n\n\n\n<p>In the vault, I found credentials for the &#8220;Emily&#8221; account.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"829\" height=\"622\" src=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/10\/Pasted-image-20251018153513.png\" alt=\"\" class=\"wp-image-289\" srcset=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/10\/Pasted-image-20251018153513.png 829w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/10\/Pasted-image-20251018153513-300x225.png 300w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/10\/Pasted-image-20251018153513-768x576.png 768w\" sizes=\"auto, (max-width: 829px) 100vw, 829px\" \/><\/figure>\n\n\n\n<p>I performed a targeted Kerberost attack with the targetedKerberost.py tool. This provided the kerberos hash for the &#8220;Ethan&#8221; user.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"158\" src=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/10\/Pasted-image-20251018154031-1024x158.png\" alt=\"\" class=\"wp-image-290\" srcset=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/10\/Pasted-image-20251018154031-1024x158.png 1024w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/10\/Pasted-image-20251018154031-300x46.png 300w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/10\/Pasted-image-20251018154031-768x118.png 768w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/10\/Pasted-image-20251018154031-1536x237.png 1536w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/10\/Pasted-image-20251018154031.png 1901w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>I cracked their password hash with Hashcat.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"648\" height=\"356\" src=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/10\/Pasted-image-20251018154203.png\" alt=\"\" class=\"wp-image-291\" srcset=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/10\/Pasted-image-20251018154203.png 648w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/10\/Pasted-image-20251018154203-300x165.png 300w\" sizes=\"auto, (max-width: 648px) 100vw, 648px\" \/><\/figure>\n\n\n\n<p>Then I ran a DC-Sync attack with impacket-secretsdump and got the output below including the &#8220;Administrator&#8221; accounts password hash.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"966\" height=\"805\" src=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/10\/Pasted-image-20251018154358.png\" alt=\"\" class=\"wp-image-293\" srcset=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/10\/Pasted-image-20251018154358.png 966w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/10\/Pasted-image-20251018154358-300x250.png 300w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/10\/Pasted-image-20251018154358-768x640.png 768w\" sizes=\"auto, (max-width: 966px) 100vw, 966px\" \/><\/figure>\n\n\n\n<p>I used the &#8220;Administrator&#8221; accounts password hash to connect to the box with evil-winrm and gained full administrative access.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"200\" src=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/10\/Pasted-image-20251018154442-1024x200.png\" alt=\"\" class=\"wp-image-294\" srcset=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/10\/Pasted-image-20251018154442-1024x200.png 1024w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/10\/Pasted-image-20251018154442-300x59.png 300w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/10\/Pasted-image-20251018154442-768x150.png 768w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/10\/Pasted-image-20251018154442.png 1033w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>This lab came with Active Directory creds to simulate an assumed breach assessment. I started by checking the credentials with Netexec to confirm they worked. Next I ran Bloodhound-ce-python to collect Active Directory data for Bloodhound. Looking at the user &#8220;Olivia&#8221; that was provided, I noticed they had an outbound [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":250,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3,4],"tags":[],"class_list":["post-249","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","category-pentesting"],"brizy_media":[],"_links":{"self":[{"href":"https:\/\/thecyberstaff.com\/index.php?rest_route=\/wp\/v2\/posts\/249","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/thecyberstaff.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/thecyberstaff.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/thecyberstaff.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/thecyberstaff.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=249"}],"version-history":[{"count":4,"href":"https:\/\/thecyberstaff.com\/index.php?rest_route=\/wp\/v2\/posts\/249\/revisions"}],"predecessor-version":[{"id":304,"href":"https:\/\/thecyberstaff.com\/index.php?rest_route=\/wp\/v2\/posts\/249\/revisions\/304"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/thecyberstaff.com\/index.php?rest_route=\/wp\/v2\/media\/250"}],"wp:attachment":[{"href":"https:\/\/thecyberstaff.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=249"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/thecyberstaff.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=249"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/thecyberstaff.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=249"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}