Sauna

I’ve got some creds that I know are allowed to Powershell in, but the powershell service seems to be down now even though it was open during port scan earlier… can’t even telnet in to that port. Might have to do a reset

EDIT: After a reset all worked fine, so I’ve got user and now on to root :slight_smile:

@VbScrub said:
I’ve got some creds that I know are allowed to Powershell in, but the powershell service seems to be down now even though it was open during port scan earlier… can’t even telnet in to that port. Might have to do a reset

working on my end, but the box is being raped by everyone atm

got user on to root
needed a git pull for the tool to connect

Type your comment> @madhack said:

got user on to root

can I pm? I am struck on getting pwd after finding username.

Type your comment> @5h1v4 said:

Type your comment> @madhack said:

got user on to root

can I pm? I am struck on getting pwd after finding username.

sure!

Got user after some guessing, now trying to use A******on creds.

Rooted. Enumerate, pretty standard windows stuff. Don’t overcomplicate it and you’ll be okay. Quite a few rabbitholes though.

@init5 said:
working on my end, but the box is being raped by everyone atm

yeah after a reset it was all good and I’ve got user :slight_smile:

For root I’m pretty sure I see what we’re meant to exploit but just trying to figure out how to do it without resorting to metasploit

Got user finally. It was harder than on other “easy” windows boxes, because most of the usual info sources were blocked. Root will have to wait until tomorrow :slight_smile:

Holy moly finally got user. I was having technical difficulties for sure. Made it much harder than it should have lol

Got user as well but now stuck on my way to root. One rabbit hole after the other…

rooted now

anybody tips for root, got shell for both users f…h and s…g .

Do I need a windows box to get KRB5AS-REP response? Or am I in a huge rabbit hole lol

Type your comment> @dezatino said:

Do I need a windows box to get KRB5AS-REP response? Or am I in a huge rabbit hole lol

no u don’t, google kerberos attack u will find it for win and lin

Been a pretty good box so far, for those of you struggling

the website has the breadcrumbs you need to derive the initial foothold - think very common account naming conventions and apply that to common AD enumeration techniques.

Rooted!

C:\Windows\System32>hostname && whoami
SAUNA
nt authority\system

Seems to be a problem with Powershell connections to this machine again (at least on the EU-Free-1 server). The box has been reset 4 times in the last 20 minutes but still not accepting PS connections, even though it was earlier. The PS port doesn’t even show as being open in an nmap scan now, but all the other ports still work fine. You can’t get the user flag or root flag in its current state as far as I can see.

I’ve raised it with HTB support so will see if they can do anything about it.

yeah, I’m done for the rest of the day. been in a rabbit hole trying to find the right combination for user using cewl. lol, need a break.

Hey guys is clock skew giving anyone problems ?