Ahh try evil-winrm psexec is only good if you have admin creds
Can Michaelās hash be cracked by Hashcat? It returns no results.
Edit
Oh I get hash again.
Any hint after get michael credential?
All the people lost in the process, it is all about AD.
If something feel odd, go back to Bloodhound and will tell you how to procede.
sudo ntpdate 10.x.x.x(IP DC) or administrator.htb (DNS only will owrk if you add the hostaname to /etc/hosts). Run this command at leat 2 times I dont know why sometimes does not work at first
yeah im lost, been at this all day and I cant get anything to work, I have to be missing one small thing thats causing it all not to work. If anyone could give suggestions it would be great. Gonna check back when I wake up.
what you need bro?
Anyone else getting errors like socket ssl wrapping error: [Errno 104] Connection reset by peer
when trying to poke around for initial foothold with the provided credentials? Canāt tell if thereās an issue with my tools or if this is by design due to some setting on the target.
Guys, I poked around on Bloodhound, and I got Michael and Benjamin users starting from Olivia. I cracked the password of some sort of password management stuff, but I donāt know how to use it. I did some spraying but nothing. At this point the path seem clear to me, the Em user to Eth user to Admin, but I cannot get Em user, any hint? I searched for any type of connection based on the users I already owned but Iām stuck.
Iām having an issue with this as well. Got a hash but rockyou
isnāt, well, rocking today with either hashcat
or john
.
after you cracked the file and enter in password management, the password is already in clear text. You can follow this comment right here Official Administrator Discussion - #43 by MEGAZORDII
Any tips or hints for this one?
this one what, bro?
Try get hash again, I do it and get another hash and crack it very quickly
Daaamn, I donāt know why I forgot I cracked a password management database. LOL. Thanks for the hint.
Continuing the discussion from Official Administrator Discussion:
Hello, i got the root flag. But somehow i didnāt see the userflag.
Can someone give me a tip where to look, or is it in the same as root.txt?
Finished! That was so much fun and I felt well-prepared for it especially following Certified. For user, I was a little surprised I needed to do something that normally, in my experience, is frowned upon at HTB as it can mess with others targeting the same target VM as you. I looked for other ways around this but, after sanity-checking it with someone else who had finished it and learning it was actually required for this target, I moved right along at a good pace. Root was pretty easy after everything Iād done to get to that point.
Turns out I must have been at a different place than you were, looking at a hash for a different account. Thatās why it wasnāt working.
Is it possible to kerberoast over evil-winRM? I keep getting this error:
Exception calling ".ctor" with "1" argument(s): "The
NetworkCredentials provided were unable to create a Kerberos credential, see inner execption for
details."
Iām starting to wonder if this is the right approach for lateral movement from the olivia user?
Really liked this box. If youāre enumerating AD thoroughly with the usual AD tools it will be a breeze! Feel free to pm if you need a nudge!