Bloodhound
If ldapdomaindump is consider to be a birdeye view over the target domain, bloodhound is like the war room table with strategies and tactics
┌──(kali㉿kali)-[~/…/htb/labs/active/bloodhound]
└─$ bloodhound-python -u SVC_TGS@active.htb -p GPPstillStandingStrong2k18 -ns $IP -d ACTIVE.HTB -dc dc.active.htb --zip -c All
INFO: Found AD domain: active.htb
INFO: Connecting to LDAP server: dc.active.htb
INFO: Found 1 domains
INFO: Found 1 domains in the forest
INFO: Found 1 computers
INFO: Connecting to LDAP server: dc.active.htb
INFO: Found 5 users
INFO: Found 41 groups
INFO: Found 0 trusts
INFO: Starting computer enumeration with 10 workers
INFO: Querying computer: DC.active.htb
INFO: Done in 00M 06S
INFO: Compressing output into 20230131114114_bloodhound.zip
bloodhound-python is a python implementation of the bloodhound ingestor, which allows the operation remotely. I can do so with the credential extracted earlier Ingestion complete
┌──(kali㉿kali)-[~/archive/htb/labs/active]
└─$ sudo neo4j console
[sudo] password for kali:
Directories in use:
home: /usr/share/neo4j
config: /usr/share/neo4j/conf
logs: /usr/share/neo4j/logs
plugins: /usr/share/neo4j/plugins
import: /usr/share/neo4j/import
data: /usr/share/neo4j/data
certificates: /usr/share/neo4j/certificates
licenses: /usr/share/neo4j/licenses
run: /usr/share/neo4j/run
Starting Neo4j.
2023-01-31 10:41:33.195+0000 INFO Starting...
┌──(kali㉿kali)-[~/archive/htb/labs/active]
└─$ bloodhound
Firing up neo4j and Bloodhound
Ingested data has been uploaded
According to Bloodhound, the
administrator
user is kerberoast-able.
The krbtgt
is by default kerberoast-able and disabled as it is the KDC.
But the administrator
user? This is very much an unusual case