HTB: Blackfield
| ターゲット // Blackfield | |
|---|---|
| Platform | HTB |
| OS | Windows |
| Difficulty | Hard |
| IP | 10.129.229.17 |
Enumeration#
Nmap#
▶ Nmap output
PORT STATE SERVICE
53/tcp open domain
88/tcp open kerberos-sec
135/tcp open msrpc
389/tcp open ldap
445/tcp open microsoft-ds
593/tcp open ncacn_http
3268/tcp open ldap
5985/tcp open http
Domain: BLACKFIELD.LOCAL, DC01.
SMB - Null Access#
SMB null authentication gives access to two interesting shares:
profiles$ READ (user profile directories)
forensic (Forensic / Audit share - no access yet)
The profiles$ share contains hundreds of user profile directories – a ready-made username list for Kerberos enumeration.
Kerbrute#
Using the profile names as a wordlist:
| |
Foothold#
AS-REP Roasting → support#
The support account doesn’t require Kerberos pre-authentication:
| |
Crack it:
| |
Credentials: support:#00^BlackKnight – but no direct shell access.
Lateral Movement#
Stage 1: ForceChangePassword → audit2020#
Running BloodHound with support’s credentials reveals that support has ForceChangePassword rights over audit2020:
| |
Change audit2020’s password without knowing the original:
| |
Stage 2: LSASS Dump → svc_backup#
As audit2020, we now have access to the forensic share. Inside it – an lsass.DMP file. Extract credentials locally with pypykatz:
| |
The dump contains an NTLM hash for svc_backup:
Username: svc_backup
Domain: BLACKFIELD
NT: 9658d1d1dcd9250115e2205d9f48400d
The Administrator hash from the dump is stale, but svc_backup’s hash works – WinRM access confirmed.
Privilege Escalation#
SeBackupPrivilege → NTDS.dit#
svc_backup has SeBackupPrivilege and SeRestorePrivilege – enough to read any file on the system, including the AD database.
Create a disk shadow script to snapshot and expose the C: drive:
set verbose on
set metadata C:\Windows\Temp\meta.cab
set context clientaccessible
set context persistent
begin backup
add volume C: alias cdrive
create
expose %cdrive% E:
end backup
Execute the full chain:
| |
Dump everything locally:
| |
Pass-the-hash as Administrator:
| |
Proof#
whoami
nt authority\system
Key Takeaways#
- SMB shares with user profile directories are free username lists for Kerberos enumeration
- BloodHound’s
ForceChangePasswordedge is often overlooked – it doesn’t require knowing the current password - LSASS dumps from forensic shares are goldmines, but beware of stale hashes – always verify before assuming access
SeBackupPrivilegeis a domain compromise path: diskshadow + robocopy /b to grab NTDS.dit, then secretsdump offline