HTB Forest
Hack the box notes
LDAP 389/TCP - ldapsearch
Anonymous (NULL) Bind
# ldapsearch null bind
(-x ) simple (anonymous) authentication, otherwise MD5
(-s ) scope
(-b ) basedn .. base domain name
ldapsearch -H ldap://10.129.95.210 -x -s base
ldapsearch -H ldap://10.129.95.210:389 -x -b "dc=htb,dc=local"
# Account policy
[+] Password Info for Domain: HTB
[+] Minimum password length: 7
[+] Account Lockout Threshold: None
# Accounts enumeration
ldapsearch -H ldap://10.129.95.210:389 -x -b DC=htb,DC=local "(objectClass=person)" | grep "sAMAccountName:"
...
sAMAccountName: sebastien
sAMAccountName: lucinda
sAMAccountName: andy
sAMAccountName: mark
sAMAccountName: santiRemote Management Users
Windapsearch
Kerberos - 88/TCP
kerbrute
Kerberoasting
Hashcat - Cracking Kerberos ticket
Johne The Ripper - Cracking Kerberos ticket
Crackmapexec - Test login to account

WinRM



Evil-WinRM


DSYNC Attack thhrough - Exchange Trusted Subsystem group
Create domain account

Impacket NTLM Relay
DSYNC attack - Dump Administrator LM/NT hash
PSEXEC - Login as administrator using hash

BloodHound Kali - igestor based on impacket

BloodHound and Neo4j
Initial setup


Start




Last updated

