louie.rocks

Home

❯

Boxes

❯

HTB Active

HTB-Active

Apr 01, 20241 min read

  • gpp-cached-password
  • kerberoast

Find open ports

Pasted image 20240830134649

Access the Replication SMB share and identify a cached GPP encrypted password for svc_tgs user

List the shares (anonymous authentication allowed)

Pasted image 20240830140355

Download all files within the Replication share:

Pasted image 20240830140323

Find the cached GPP password within the downloaded files:

Pasted image 20240830140113

Decrypt the password for svc_tgs user (GPPstillStandingStrong2k18)

Pasted image 20240830141054

Obtain user.txt by accessing Users share with svc_tgs credentials

Download all available files (which includes user.txt within the user’s Desktop):

Pasted image 20240830154811

Pasted image 20240830154902

Find that the Administrator user is running a service

Find that it exists (as expected):

Pasted image 20240830155343

Obtain password hash for Administrator by requesting a TGS for the service:

Pasted image 20240830155442

Crack the Administrator user's password (Ticketmaster1968)

Pasted image 20240830155526

Obtain shell as root user using Adminstator's password

Pasted image 20240830155628

Obtain root.txt

Pasted image 20240830155949


Created with Quartz v4.5.0 © 2025

  • GitHub
  • Discord Community