BloodHound


Using the TGT of the ldap account, I am able to authenticate to the target KDC to run the ingestor for bloodhound

Ingestion


┌──(kali㉿kali)-[~/…/htb/labs/support/bloodhound]
└─$ KRB5CCNAME=../ldap@dc.support.htb.ccache bloodhound-python -d SUPPORT.HTB -u ldap -no-pass -k -dc dc.support.htb --dns-tcp -ns $IP --zip -c All 
INFO: Found AD domain: support.htb
INFO: Using TGT from cache
INFO: Found TGT with correct principal in ccache file.
INFO: Connecting to LDAP server: dc.support.htb
INFO: Found 1 domains
INFO: Found 1 domains in the forest
INFO: Found 2 computers
INFO: Connecting to LDAP server: dc.support.htb
INFO: Found 21 users
INFO: Found 53 groups
INFO: Found 0 trusts
INFO: Starting computer enumeration with 10 workers
INFO: Querying computer: Management.support.htb
INFO: Querying computer: dc.support.htb
INFO: Ignoring host dc.support.htb since its reported name  does not match
INFO: Done in 00M 14S
INFO: Compressing output into 20231004101352_bloodhound.zip

Ingestion complete

Prep


┌──(kali㉿kali)-[~/…/htb/labs/support/bloodhound]
└─$ sudo neo4j console
directories in use:
home:         /usr/share/neo4j
config:       /usr/share/neo4j/conf
logs:         /usr/share/neo4j/logs
plugins:      /usr/share/neo4j/plugins
import:       /usr/share/neo4j/import
data:         /usr/share/neo4j/data
certificates: /usr/share/neo4j/certificates
licenses:     /usr/share/neo4j/licenses
run:          /usr/share/neo4j/run
Starting Neo4j.
 
┌──(kali㉿kali)-[~/…/htb/labs/support/bloodhound]
└─$ bloodhound

Starting neo4j and bloodhound

Ingested Domain data uploaded

support


The support account being part of the Share Support Accounts group grants the transitive GenericAll access to the DC host, which is the direct route to compromise the entire domain. This makes the account a valuable target

As discovered through LDAPDomainDump, the support account is also part of the Remote Management Users group, allowing the account to initiate a WinRM session to the DC host

However, attempting to check for the Shortest Paths to Here from Owned option This means that there is no direct route to the support account from the compromised ldap account I’d need to look elsewhere

management$


The machine account, management$, is rather interesting While it doesn’t have any delegation right, it has some SPNs configured for it