xsspresso
xsspresso
Tags/ AD

AD

21 writeups tagged with AD

ADMediumWindows

HTB — Haze

Splunk misconfiguration leaks credentials. Active Directory enumeration reveals a privilege escalation path through ACL abuse to Domain Admin.

#Splunk#AD#ACL Abuse
Jan 10, 2026HackTheBox
ADMediumWindows

HTB — TombWatcher

Active Directory with ADCS misconfiguration. ESC1 certificate template abuse allows requesting a certificate as Domain Admin for full compromise.

#AD#ADCS#ESC1
Dec 1, 2025HackTheBox
ADMediumWindows

HTB — Signed

MSSQL with xp_cmdshell for initial RCE. Active Directory certificate abuse (ADCS) to impersonate Domain Admin.

#AD#MSSQL#ADCS
Nov 20, 2025HackTheBox
ADMediumWindows

HTB — NanoCorp

MSSQL enumeration with credential discovery, followed by Active Directory privilege escalation through ACL misconfigurations.

#MSSQL#AD#ACL Abuse
Nov 8, 2025HackTheBox
ADMediumWindows

HTB — DarkZero

Active Directory environment with Shadow Credentials and Resource-Based Constrained Delegation abuse to achieve full domain compromise.

#AD#Shadow Credentials#RBCD
Oct 6, 2025HackTheBox
ADEasyWindows

HTB — Puppy

AD enumeration with BloodHound reveals a password reset path. HR share credential reuse and GenericWrite abuse to reach Domain Admin.

#AD#BloodHound#GenericWrite
May 21, 2025HackTheBox
ADMediumWindows

HTB — TheFrizz

Active Directory machine exploiting misconfigured LAPS and ACL abuse chain to escalate from low-privileged user to Domain Admin.

#AD#LAPS#ACL Abuse
Mar 18, 2025HackTheBox
ADMediumWindows

HTB — StreamIO

SQLi on login page, LFI reveals PHP source. MSSQL xp_cmdshell for shell. Firefox DPAPI credential decryption leads to Domain Admin via ADCS.

#AD#SQLi#LFI
Jan 31, 2025HackTheBox
ADHardWindows

HTB — Blackfield

ASREPRoasting yields crackable hash. ForceChangePassword on account via BloodHound. Volatility lsass dump reveals backup operator for DCSync.

#AD#ASREPRoasting#BloodHound
Jan 23, 2025HackTheBox
ADEasyWindows

HTB — Support

Custom .NET info collector binary contains obfuscated LDAP password. GenericAll on DC via Resource-Based Constrained Delegation for Domain Admin.

#AD#RBCD#BloodHound
Jan 23, 2025HackTheBox
ADEasyWindows

HTB — Return

Network printer admin panel LDAP credential exfiltration via attacker-controlled server. Server Operators group membership for domain privilege escalation.

#AD#LDAP#Server Operators
Jan 22, 2025HackTheBox
ADEasyWindows

HTB — Timelapse

SMB share contains ZIP with password-protected PFX certificate. Cracked PFX used for WinRM. LAPS password read via LDAP for Administrator.

#AD#LAPS#PFX
Jan 21, 2025HackTheBox
ADHardWindows

HTB — Flight

LFI via lang parameter captures NTLM hash with Responder. Password spray, IIS WebDAV shell upload, RunasCs for lateral movement to Domain Admin.

#AD#LFI#NTLM
Jan 21, 2025HackTheBox
ADEasyWindows

HTB — Sauna

ASREPRoasting on user names enumerated from the bank website. DCSync attack via GenericAll rights for Domain Admin hash dump.

#AD#ASREPRoasting#DCSync
Jan 20, 2025HackTheBox
ADMediumWindows

HTB — Monteverde

Azure AD Connect with user enumeration via RPC. Password spraying finds default creds. Azure AD Sync password extraction for Domain Admin.

#AD#Azure AD#Password Spray
Jan 20, 2025HackTheBox
ADMediumWindows

HTB — EscapeTwo

MSSQL with xp_cmdshell after credential spraying. ADCS ESC4 template modification for certificate impersonation to gain Domain Admin.

#AD#MSSQL#ADCS
Jan 13, 2025HackTheBox
ADEasyWindows

HTB — Cicada

SMB guest access reveals default password in HR note. User enumeration + password spray, SeBackupPrivilege abuse for NTDS.dit extraction.

#AD#SMB#SeBackupPrivilege
Jan 9, 2025HackTheBox
ADMediumWindows

HTB — Certified

Shadow Credentials attack via WriteProperty on user object. ADCS ESC9 certificate template abuse to impersonate a privileged account.

#AD#ADCS#Shadow Credentials
Jan 9, 2025HackTheBox
ADMediumWindows

HTB — Administrator

FTP credentials from initial account. Targeted Kerberoasting via BloodHound paths, GenericWrite abuse, DCSync for Domain Admin hash.

#AD#Kerberoasting#BloodHound
Jan 8, 2025HackTheBox
ADMediumWindows

HTB — Escape

MSSQL Silver Ticket attack via SPN enumeration. Responder captures NTLMv2 hash from SQL query, certificate auth for Domain Admin.

#AD#MSSQL#Silver Ticket
Nov 19, 2024HackTheBox
ADEasyWindows

HTB — Active

SMB anonymous access to SYSVOL leaks GPP-encrypted password. Kerberoasting the Administrator SPN cracks the hash for full domain access.

#AD#GPP#Kerberoasting
Jan 10, 2023HackTheBox