HTB — ¶
Obsidian Writeup¶
Primary writeup lives here:
- /home/b7h30/Documents/obsidian/docs/CTF/HTB/<MachineName>.md
Target Info¶
- OS: Windows / Linux
- Role: (DC / Member Server / Web Server / Workstation)
- IP(s):
- Domain (if any):
Artifact Index¶
Recon / Scans¶
nmap/tcp_full.nmap— full TCP scantcp_full.gnmaptcp_full.xml- Notes:
- Initial exposed services: SMB, LDAP, Kerberos, WinRM
Enumeration¶
logs/nxc_smb_shares.txtldap_enum.txtkerberos_enum.txt- Key findings:
- AS-REP roastable users discovered
- Accessible SMB shares: forensic, profiles$
Foothold¶
loot/support_asrep.hash- Access gained:
- User: support
- Method: AS-REP roast → crack
Privilege Escalation¶
logs/rpc_password_reset.txt- Technique:
- ForcePasswordChange abuse over RPC
- Escalated to:
- User: audit2020
Proof / Evidence¶
evidence/audit2020_smb_access.pngpassword_reset_success.png- What this proves:
- Unauthorized password change
- Privilege escalation path confirmed
Timeline / Decision Points¶
- Recon → SMB + LDAP identified → pursue AD attack path
- Enum → AS-REP roast viable → cracked support
- Foothold → SMB shares revealed forensic artifacts
- Decision → ForcePasswordChange identified → RPC password change
- Escalation → audit2020 access gained
Lessons Learned (High Signal)¶
- NT_STATUS_PASSWORD_RESTRICTION indicates policy failure, not permission failure
- Windows password resets often fail silently on success
- ForcePasswordChange ≠ full Reset Password rights
- AD privilege escalation is frequently policy + ACL based, not exploit based