Hathor - HTB [Discussion]
by - Thursday, January 1, 1970 at 12:00 AM
What also seems to work is using certain Powershell functions as the BM user:

$passwd = ConvertTo-SecureString 'RETRACTED' -AsPlainText -Force
$cred = New-Object System.Management.Automation.PSCredential('windcorp\RETRACTED', $passwd)
Get-ADComputer -Identity Hathor -Credential $cred
Reply
c:\Get-bADpasswords\Accessible\CSVs>type exported_windcorp-05102021-183949.csv

Activity;Password Type;Account Type;Account Name;Account SID;Account password hash;Present in password list(s)
active;weak;regular;BeatriceMill;S-1-5-21-3783586571-2109290616-3725730865-5992;9cb01504ba0247ad5c6e08f7ccae7903;'leaked-passwords-v7'

i got this. i cracked the hash. [!!!!ilovegood17] what is the next step?
Reply
(April 20, 2022, 12:33 PM)___user___ Wrote: c:\Get-bADpasswords\Accessible\CSVs>type exported_windcorp-05102021-183949.csv

Activity;Password Type;Account Type;Account Name;Account SID;Account password hash;Present in password list(s)
active;weak;regular;BeatriceMill;S-1-5-21-3783586571-2109290616-3725730865-5992;9cb01504ba0247ad5c6e08f7ccae7903;'leaked-passwords-v7'

i got this. i cracked the hash. [!!!!ilovegood17] what is the next step?


Read what meta have found! :D
think it's password spraying the next step but no luck
Reply
(April 20, 2022, 10:24 AM)meta Wrote: I found an AD user account with a non-empty description. The description is the same as the name of the HTB machine creator.


(April 20, 2022, 10:10 AM)cavour12 Wrote: I had found BM account and the password ! i tried go ldapsearch winrm and also kerberos ! nothing seems to be working ... also tried smb


This works for me:

ldapsearch -x -h 10.129.44.3 -D 'windcorp\RETRACTED' -w 'RETRACTED' -b "CN=Users,DC=windcorp,DC=htb"


how did u find this cred. i have tired password spraying but failed.
Reply
(April 20, 2022, 12:52 PM)___user___ Wrote:
(April 20, 2022, 10:24 AM)meta Wrote: I found an AD user account with a non-empty description. The description is the same as the name of the HTB machine creator.


(April 20, 2022, 10:10 AM)cavour12 Wrote: I had found BM account and the password ! i tried go ldapsearch winrm and also kerberos ! nothing seems to be working ... also tried smb


This works for me:

ldapsearch -x -h 10.129.44.3 -D 'windcorp\RETRACTED' -w 'RETRACTED' -b "CN=Users,DC=windcorp,DC=htb"


how did u find this cred. i have tired password spraying but failed.


It's the same cred you have. I simply replaced "BeatriceMill" with "RETRACTED" and the same for the password before posting here. I don't like posting passwords, SSH keys and such.
Reply
i enumerated all the users and i tried the same password for all ad users.... no luck also that wich name is similar to creator
Reply
any one know how to dump all the users,computer,domain for blood-hound.

i used bloodhound-python and ldapdomaindump both showing invalid cred
Reply
(April 20, 2022, 01:47 PM)___user___ Wrote: any one know how to dump all the users,computer,domain for blood-hound.

i used bloodhound-python and ldapdomaindump both showing invalid cred


I couldn't get bloodhound-python to work either.
But ldapdomaindump works with --authtype SIMPLE.
Reply
thnaks
Reply
(April 20, 2022, 02:13 PM)meta Wrote:
(April 20, 2022, 01:47 PM)___user___ Wrote: any one know how to dump all the users,computer,domain for blood-hound.

i used bloodhound-python and ldapdomaindump both showing invalid cred


I couldn't get bloodhound-python to work either.
But ldapdomaindump works with --authtype SIMPLE.


thanks man. did u find the next step?
Reply


 Users viewing this thread: Hathor - HTB [Discussion]: No users currently viewing.