AD Enumeration & Attacks Skills Assessment Part II

Feb 10, 2025    #htb   #cybersec  

Question 1 - Obtain a password hash for a domain user account that can be leveraged to gain a foothold in the domain. What is the account name?

Image
Image

Question 2 - What is this user’s cleartext password?

Question 3 - Submit the contents of the C:\flag.txt file on MS01.

Image
Image
Image
Image

Question 4 & 5 - Use a common method to obtain weak credentials for another user. Submit the username for the user whose credentials you obtain & What is this user’s password?

Image

change/add the proxychains config to use socks4

Image
Image

Question 6 - Locate a configuration file containing an MSSQL connection string. What is the password for the user listed in this file?

Question 7 - Submit the contents of the flag.txt file on the Administrator Desktop on the SQL01 host.

Image
Image
Image

Question 8 - Submit the contents of the flag.txt file on the Administrator Desktop on the MS01 host.

Image
Image

Image
Image

Question 9 - Obtain credentials for a user who has GenericAll rights over the Domain Admins group. What’s this user’s account name?

Image

Question 10 - Crack this user’s password hash and submit the cleartext password as your answer.

Image
Image

Question 11 - Submit the contents of the flag.txt file on the Administrator desktop on the DC01 host.

Image

Question 12 - Submit the NTLM hash for the KRBTGT account for the target domain after achieving domain compromise.

Image

Note: This is not a straight process. Like I just know to do these things, It’s a mix of Reconnaissance, trail and error and more..