{"id":646,"date":"2026-05-06T01:04:16","date_gmt":"2026-05-06T01:04:16","guid":{"rendered":"https:\/\/thecyberstaff.com\/?p=646"},"modified":"2026-05-06T01:08:28","modified_gmt":"2026-05-06T01:08:28","slug":"manager-hackthebox","status":"publish","type":"post","link":"https:\/\/thecyberstaff.com\/?p=646","title":{"rendered":"Manager- Hackthebox"},"content":{"rendered":"\n<p>I started with a full port scan using my Nmap automation script. <a href=\"https:\/\/github.com\/HutchSec\/portScan\">https:\/\/github.com\/HutchSec\/portScan<\/a><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"994\" height=\"799\" src=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2026\/05\/image.png\" alt=\"\" class=\"wp-image-647\" srcset=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2026\/05\/image.png 994w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2026\/05\/image-300x241.png 300w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2026\/05\/image-768x617.png 768w\" sizes=\"auto, (max-width: 994px) 100vw, 994px\" \/><\/figure>\n\n\n\n<p>The scan revealed several interesting services including SMB, MSSQL, WinRM, and HTTP.<br><\/p>\n\n\n\n<p><strong>SMB Enumeration \u2014 RID Cycling<\/strong><\/p>\n\n\n\n<p>Anonymous SMB access was enabled, which allowed RID cycling attacks using Impacket\u2019s <code>lookupsid.py<\/code>. This exposed valid domain usernames.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"660\" height=\"656\" src=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2026\/05\/image-1.png\" alt=\"\" class=\"wp-image-648\" srcset=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2026\/05\/image-1.png 660w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2026\/05\/image-1-300x298.png 300w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2026\/05\/image-1-150x150.png 150w\" sizes=\"auto, (max-width: 660px) 100vw, 660px\" \/><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p><strong>Password Spraying \u2014 User-as-Password<\/strong><\/p>\n\n\n\n<p>With a list of usernames, I performed a simple password spray using the classic <code>username:username<\/code> approach.<\/p>\n\n\n\n<p>This successfully identified valid credentials for the <code>operator<\/code> account.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"953\" height=\"359\" src=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2026\/05\/image-2.png\" alt=\"\" class=\"wp-image-649\" srcset=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2026\/05\/image-2.png 953w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2026\/05\/image-2-300x113.png 300w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2026\/05\/image-2-768x289.png 768w\" sizes=\"auto, (max-width: 953px) 100vw, 953px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"953\" height=\"359\" src=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2026\/05\/image-3.png\" alt=\"\" class=\"wp-image-650\" srcset=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2026\/05\/image-3.png 953w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2026\/05\/image-3-300x113.png 300w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2026\/05\/image-3-768x289.png 768w\" sizes=\"auto, (max-width: 953px) 100vw, 953px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"953\" height=\"359\" src=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2026\/05\/image-4.png\" alt=\"\" class=\"wp-image-651\" srcset=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2026\/05\/image-4.png 953w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2026\/05\/image-4-300x113.png 300w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2026\/05\/image-4-768x289.png 768w\" sizes=\"auto, (max-width: 953px) 100vw, 953px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"953\" height=\"359\" src=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2026\/05\/image-5.png\" alt=\"\" class=\"wp-image-652\" srcset=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2026\/05\/image-5.png 953w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2026\/05\/image-5-300x113.png 300w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2026\/05\/image-5-768x289.png 768w\" sizes=\"auto, (max-width: 953px) 100vw, 953px\" \/><\/figure>\n\n\n\n<p><strong>MSSQL Access<\/strong><\/p>\n\n\n\n<p>Using the discovered credentials, I authenticated to MSSQL with Impacket. While enumerating the server, I found a website backup archive containing application files.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"636\" height=\"222\" src=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2026\/05\/image-6.png\" alt=\"\" class=\"wp-image-653\" srcset=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2026\/05\/image-6.png 636w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2026\/05\/image-6-300x105.png 300w\" sizes=\"auto, (max-width: 636px) 100vw, 636px\" \/><\/figure>\n\n\n\n<p><strong>Configuration File Loot<\/strong><\/p>\n\n\n\n<p>Inside the backup, I discovered plaintext credentials stored in a configuration file.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"571\" height=\"230\" src=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2026\/05\/image-7.png\" alt=\"\" class=\"wp-image-654\" srcset=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2026\/05\/image-7.png 571w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2026\/05\/image-7-300x121.png 300w\" sizes=\"auto, (max-width: 571px) 100vw, 571px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"558\" height=\"369\" src=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2026\/05\/image-8.png\" alt=\"\" class=\"wp-image-655\" srcset=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2026\/05\/image-8.png 558w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2026\/05\/image-8-300x198.png 300w\" sizes=\"auto, (max-width: 558px) 100vw, 558px\" \/><\/figure>\n\n\n\n<p><strong>WinRM Access<\/strong><\/p>\n\n\n\n<p>The recovered credentials provided remote access over WinRM.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"690\" height=\"238\" src=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2026\/05\/image-9.png\" alt=\"\" class=\"wp-image-656\" srcset=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2026\/05\/image-9.png 690w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2026\/05\/image-9-300x103.png 300w\" sizes=\"auto, (max-width: 690px) 100vw, 690px\" \/><\/figure>\n\n\n\n<p><strong>Privilege Escalation \u2014 AD CS ESC7<\/strong><\/p>\n\n\n\n<p>Enumeration revealed a vulnerable Active Directory Certificate Services configuration vulnerable to ESC7 abuse.<\/p>\n\n\n\n<p>I added the raven account as a Certificate Authority officer.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"922\" height=\"142\" src=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2026\/05\/image-10.png\" alt=\"\" class=\"wp-image-657\" srcset=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2026\/05\/image-10.png 922w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2026\/05\/image-10-300x46.png 300w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2026\/05\/image-10-768x118.png 768w\" sizes=\"auto, (max-width: 922px) 100vw, 922px\" \/><\/figure>\n\n\n\n<p>Next, I approved the pending certificate request and retrieved a certificate for the Administrator account.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"143\" src=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2026\/05\/image-11-1024x143.png\" alt=\"\" class=\"wp-image-658\" srcset=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2026\/05\/image-11-1024x143.png 1024w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2026\/05\/image-11-300x42.png 300w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2026\/05\/image-11-768x108.png 768w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2026\/05\/image-11.png 1499w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"236\" src=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2026\/05\/image-12-1024x236.png\" alt=\"\" class=\"wp-image-659\" srcset=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2026\/05\/image-12-1024x236.png 1024w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2026\/05\/image-12-300x69.png 300w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2026\/05\/image-12-768x177.png 768w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2026\/05\/image-12.png 1463w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p><strong>Kerberos Time Synchronization<\/strong><\/p>\n\n\n\n<p>When attempting certificate authentication, Kerberos rejected the request due to clock skew.<\/p>\n\n\n\n<p>I synchronized my attack VM\u2019s time with the domain controller. After syncing time, I authenticated with the generated Administrator certificate and extracted the NTLM hash.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"912\" height=\"447\" src=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2026\/05\/image-13.png\" alt=\"\" class=\"wp-image-660\" srcset=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2026\/05\/image-13.png 912w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2026\/05\/image-13-300x147.png 300w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2026\/05\/image-13-768x376.png 768w\" sizes=\"auto, (max-width: 912px) 100vw, 912px\" \/><\/figure>\n\n\n\n<p><strong>Root Access<\/strong><\/p>\n\n\n\n<p>Using the recovered Administrator hash, I obtained full administrative access to the target and completed the box.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"225\" src=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2026\/05\/image-14-1024x225.png\" alt=\"\" class=\"wp-image-661\" srcset=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2026\/05\/image-14-1024x225.png 1024w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2026\/05\/image-14-300x66.png 300w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2026\/05\/image-14-768x169.png 768w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2026\/05\/image-14.png 1034w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>I started with a full port scan using my Nmap automation script. https:\/\/github.com\/HutchSec\/portScan The scan revealed several interesting services including SMB, MSSQL, WinRM, and HTTP. SMB Enumeration \u2014 RID Cycling Anonymous SMB access was enabled, which allowed RID cycling attacks using Impacket\u2019s lookupsid.py. This exposed valid domain usernames. Password Spraying [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":664,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3,4],"tags":[],"class_list":["post-646","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","category-pentesting"],"brizy_media":[],"_links":{"self":[{"href":"https:\/\/thecyberstaff.com\/index.php?rest_route=\/wp\/v2\/posts\/646","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/thecyberstaff.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/thecyberstaff.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/thecyberstaff.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/thecyberstaff.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=646"}],"version-history":[{"count":1,"href":"https:\/\/thecyberstaff.com\/index.php?rest_route=\/wp\/v2\/posts\/646\/revisions"}],"predecessor-version":[{"id":663,"href":"https:\/\/thecyberstaff.com\/index.php?rest_route=\/wp\/v2\/posts\/646\/revisions\/663"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/thecyberstaff.com\/index.php?rest_route=\/wp\/v2\/media\/664"}],"wp:attachment":[{"href":"https:\/\/thecyberstaff.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=646"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/thecyberstaff.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=646"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/thecyberstaff.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=646"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}