Logo
Overview
Attacktive Directory

Attacktive Directory

July 30, 2025
2 min read
index

Module: Attacktive Directory


1. INTRODUCTION

I completed the Attacktive Directory room on TryHackMe available here
https://tryhackme.com/room/attacktivedirectory. A fully practical room on Windows AD. The room is based off of the fact that 99% of corporate networks run off of AD. The central tool to the whole practical was impacket, but quite a number of tools were used. The allocated time was 75 minutes, it took me 240 minutes to complete.

2. CONNECTING

First, I connected to the TryHackMe network using their OpenVPN configuration. The access page confirms the connection.

screenshot
screenshot
screenshot

3. INSTALLING IMPACKET

screenshot
screenshot
screenshot

4. INSTALLING BLOODHOUND AND NEO4J

screenshot

5. GETTING STARTED

First, a ping to confirm the target is up.

screenshot

Then enumeration, NMAP.

screenshot
screenshot

6. KERBEROS

First, I downloaded Kerbrute and made the binary executable.

screenshot
screenshot
screenshot

Then I downloaded the User List and Password List.

screenshot

Then ran Kerbrute’s userenum command

screenshot
screenshot

7. ABUSING KERBEROS

Add AD domain to hosts file.

screenshot

Getting ticket

screenshot

Saving the hash in a file

screenshot

Checking hash type and mode

screenshot

Cracking the hash. First tried hashcat and ran into memory issues. Switched to john.

screenshot
screenshot

Enumerating for SMB shares

8. BACK TO BASICS — SMB SHARES

screenshot

Specific share: backup

screenshot

Decoding the hash

screenshot
screenshot

9. DOMAIN PRIVILEGE ESCALATION

Secrets

screenshot

Getting the shell

screenshot
screenshot

10. FLAGS

Listing users

screenshot
screenshot
screenshot
screenshot
screenshot

11. CONCLUSION

This felt like real ethical hacking. Quite a lot of concepts learned previously were put into practice. The room was especially helpful with hints, the author was fully aware of their target audience. I am quite selective on the type of practicals I put on my blog. This is one of the qualifying ones. SVCADMIN, BACKUP, ADMIN.

screenshot