THM Enumerating Active Directory done
Enumerating_Active_Directory
OS:
Windows Active Directory
Technology:
Active Directory
Users and pass:
First creds from: http://distributor.za.tryhackme.com/creds
Username: phillip.reid
Password: Scooter1987
Lab schema
Setup VM - setup DNS
root@ip-10-10-70-177:~# systemd-resolve --interface enumad --set-dns 10.200.18.101 --set-domain za.tryhackme.com
root@ip-10-10-70-177:~# nslookup thmdc.za.tryhackme.com
Server: 127.0.0.53
Address: 127.0.0.53#53
Non-authoritative answer:
Name: thmdc.za.tryhackme.com
Address: 10.200.18.101
Get first credentials
Open the webiste: http://distributor.za.tryhackme.com/creds
Your credentials have been generated: Username: phillip.reid Password: Scooter1987
Login to thmjmp1.za.tryhackme.com
root@ip-10-10-70-177:~# ssh za.tryhackme.com\\[email protected]
The authenticity of host 'thmjmp1.za.tryhackme.com (10.200.18.248)' can't be established.
ECDSA key fingerprint is SHA256:HTvSA1Qt987SOP3SRopzSQ22Q8lPttrUzTwuTyGDLck.
Are you sure you want to continue connecting (yes/no)? yes
Warning: Permanently added 'thmjmp1.za.tryhackme.com,10.200.18.248' (ECDSA) to the list of known hosts.
za.tryhackme.com\[email protected]'s password:
Microsoft Windows [Version 10.0.17763.1098]
(c) 2018 Microsoft Corporation. All rights reserved.
za\phillip.reid@THMJMP1 C:\Users\phillip.reid>
Force a network-based listing of the SYSVOL
root@ip-10-10-70-177:~# ssh za.tryhackme.com\\[email protected]
za.tryhackme.com\[email protected]'s password:
Microsoft Windows [Version 10.0.17763.1098]
(c) 2018 Microsoft Corporation. All rights reserved.
za\phillip.reid@THMJMP1 C:\Users\phillip.reid>dir \\za.tryhackme.com\SYSVOL\
Volume in drive \\za.tryhackme.com\SYSVOL is Windows
Volume Serial Number is 1634-22A9
Directory of \\za.tryhackme.com\SYSVOL
02/24/2022 09:57 PM <DIR> .
02/24/2022 09:57 PM <DIR> ..
02/24/2022 09:57 PM <JUNCTION> za.tryhackme.com [C:\Windows\SYSVOL\domai
n]
0 File(s) 0 bytes
3 Dir(s) 51,587,862,528 bytes free
Connect via RDP to thmjmp1.za.tryhackme.com
root@ip-10-10-70-177:~# xfreerdp /u:phillip.reid /p:Scooter1987 /v:thmjmp1.za.tryhackme.com /cert-ignore
connected to thmjmp1.za.tryhackme.com:3389
Open MMC
Add three Active Directory Snap-in in MMC
Read description attribute of the t0_tinus.green
Check member of for aaron.harris account
net user aaron.harris /domain
Check how many account in "Tier 1 Admins"
net group "Tier 1 Admins" /domain
Check password policy
net accounts /domain
What is the value of the Title attribute of Beth Nolan (beth.nolan)?
Get-ADUser -Identity beth.nolan -Server za.tryhackme.com -Properties *
What is the value of the DistinguishedName attribute of Annette Manning (annette.manning)?
Get-ADUser -Identity annette.manning -Server za.tryhackme.com -Properties DistinguishedName
When was the Tier 2 Admins group created?
PS C:\Users\jasmine.stanley> Get-ADGroup -Identity "Tier 2 Admins" -Server za.tryhackme.com -Properties *
CanonicalName : za.tryhackme.com/Groups/Tier 2 Admins
CN : Tier 2 Admins
Created : 2/24/2022 10:04:41 PM
createTimeStamp : 2/24/2022 10:04:41 PM
What is the value of the SID attribute of the Enterprise Admins group?
PS C:\Users\jasmine.stanley> Get-ADGroup -Identity "Enterprise Admins" -Server za.tryhackme.com -Properties SID
DistinguishedName : CN=Enterprise Admins,CN=Users,DC=za,DC=tryhackme,DC=com
GroupCategory : Security
GroupScope : Universal
Name : Enterprise Admins
ObjectClass : group
ObjectGUID : 93846b04-25b9-4915-baca-e98cce4541c6
SamAccountName : Enterprise Admins
SID : S-1-5-21-3330634377-1326264276-632209373-519
Which container is used to store deleted AD objects?
PS C:\Users\jasmine.stanley> Get-ADDomain -Server za.tryhackme.com
AllowedDNSSuffixes : {}
ChildDomains : {}
ComputersContainer : CN=Computers,DC=za,DC=tryhackme,DC=com
DeletedObjectsContainer : CN=Deleted Objects,DC=za,DC=tryhackme,DC=com
DistinguishedName : DC=za,DC=tryhackme,DC=com
DNSRoot : za.tryhackme.com
DomainControllersContainer : OU=Domain Controllers,DC=za,DC=tryhackme,DC=com
DomainMode : Windows2012R2Domain
What command can be used to execute Sharphound.exe and request that it recovers Session information only from the za.tryhackme.com domain without touching domain controllers?
Sharphound.exe --CollectionMethods Session --Domain za.tryhackme.com --ExcludeDCs
Apart from the krbtgt account, how many other accounts are potentially kerberoastable?
4
How many machines do members of the Tier 1 Admins group have administrative access to?
2
How many users are members of the Tier 2 Admins group?
15