Skip to content

THM Enumerating Active Directory done

Enumerating_Active_Directory

OS:

Windows Active Directory

Technology:

Active Directory

Users and pass:

First creds from: http://distributor.za.tryhackme.com/creds
Username: phillip.reid
Password: Scooter1987

Lab schema

Setup VM - setup DNS

root@ip-10-10-70-177:~# systemd-resolve --interface enumad --set-dns 10.200.18.101 --set-domain za.tryhackme.com
root@ip-10-10-70-177:~# nslookup thmdc.za.tryhackme.com
Server:     127.0.0.53
Address:    127.0.0.53#53

Non-authoritative answer:
Name:   thmdc.za.tryhackme.com
Address: 10.200.18.101

Get first credentials

Open the webiste: http://distributor.za.tryhackme.com/creds
Your credentials have been generated: Username: phillip.reid Password: Scooter1987 

Login to thmjmp1.za.tryhackme.com

root@ip-10-10-70-177:~# ssh za.tryhackme.com\\[email protected]
The authenticity of host 'thmjmp1.za.tryhackme.com (10.200.18.248)' can't be established.
ECDSA key fingerprint is SHA256:HTvSA1Qt987SOP3SRopzSQ22Q8lPttrUzTwuTyGDLck.
Are you sure you want to continue connecting (yes/no)? yes
Warning: Permanently added 'thmjmp1.za.tryhackme.com,10.200.18.248' (ECDSA) to the list of known hosts.
za.tryhackme.com\[email protected]'s password: 

Microsoft Windows [Version 10.0.17763.1098]
(c) 2018 Microsoft Corporation. All rights reserved.

za\phillip.reid@THMJMP1 C:\Users\phillip.reid>

Force a network-based listing of the SYSVOL

root@ip-10-10-70-177:~# ssh za.tryhackme.com\\[email protected]
za.tryhackme.com\[email protected]'s password: 

Microsoft Windows [Version 10.0.17763.1098]
(c) 2018 Microsoft Corporation. All rights reserved.

za\phillip.reid@THMJMP1 C:\Users\phillip.reid>dir \\za.tryhackme.com\SYSVOL\ 
 Volume in drive \\za.tryhackme.com\SYSVOL is Windows 
 Volume Serial Number is 1634-22A9

 Directory of \\za.tryhackme.com\SYSVOL

02/24/2022  09:57 PM    <DIR>          .
02/24/2022  09:57 PM    <DIR>          ..
02/24/2022  09:57 PM    <JUNCTION>     za.tryhackme.com [C:\Windows\SYSVOL\domai
n]
               0 File(s)              0 bytes
               3 Dir(s)  51,587,862,528 bytes free

Connect via RDP to thmjmp1.za.tryhackme.com

root@ip-10-10-70-177:~# xfreerdp /u:phillip.reid /p:Scooter1987 /v:thmjmp1.za.tryhackme.com /cert-ignore
connected to thmjmp1.za.tryhackme.com:3389

Open MMC

Add three Active Directory Snap-in in MMC

Read description attribute of the t0_tinus.green

Check member of for aaron.harris account

net user aaron.harris /domain

Check how many account in "Tier 1 Admins"

net group "Tier 1 Admins" /domain

Check password policy

net accounts /domain

What is the value of the Title attribute of Beth Nolan (beth.nolan)?

Get-ADUser -Identity beth.nolan -Server za.tryhackme.com -Properties *

What is the value of the DistinguishedName attribute of Annette Manning (annette.manning)?

Get-ADUser -Identity annette.manning -Server za.tryhackme.com -Properties DistinguishedName

When was the Tier 2 Admins group created?

PS C:\Users\jasmine.stanley> Get-ADGroup -Identity "Tier 2 Admins" -Server za.tryhackme.com -Properties *


CanonicalName                   : za.tryhackme.com/Groups/Tier 2 Admins
CN                              : Tier 2 Admins
Created                         : 2/24/2022 10:04:41 PM
createTimeStamp                 : 2/24/2022 10:04:41 PM

What is the value of the SID attribute of the Enterprise Admins group?

PS C:\Users\jasmine.stanley> Get-ADGroup -Identity "Enterprise Admins" -Server za.tryhackme.com -Properties SID


DistinguishedName : CN=Enterprise Admins,CN=Users,DC=za,DC=tryhackme,DC=com 
GroupCategory     : Security
GroupScope        : Universal
Name              : Enterprise Admins
ObjectClass       : group
ObjectGUID        : 93846b04-25b9-4915-baca-e98cce4541c6
SamAccountName    : Enterprise Admins
SID               : S-1-5-21-3330634377-1326264276-632209373-519

Which container is used to store deleted AD objects?

PS C:\Users\jasmine.stanley> Get-ADDomain -Server za.tryhackme.com

AllowedDNSSuffixes                 : {}
ChildDomains                       : {}
ComputersContainer                 : CN=Computers,DC=za,DC=tryhackme,DC=com
DeletedObjectsContainer            : CN=Deleted Objects,DC=za,DC=tryhackme,DC=com
DistinguishedName                  : DC=za,DC=tryhackme,DC=com
DNSRoot                            : za.tryhackme.com
DomainControllersContainer         : OU=Domain Controllers,DC=za,DC=tryhackme,DC=com
DomainMode                         : Windows2012R2Domain

What command can be used to execute Sharphound.exe and request that it recovers Session information only from the za.tryhackme.com domain without touching domain controllers?

Sharphound.exe --CollectionMethods Session --Domain za.tryhackme.com --ExcludeDCs

Apart from the krbtgt account, how many other accounts are potentially kerberoastable?

4

How many machines do members of the Tier 1 Admins group have administrative access to?

2

How many users are members of the Tier 2 Admins group?

15