Module: Attacktive Directory
1. INTRODUCTION
I completed the Attacktive Directory room on TryHackMe available here
https://tryhackme.com/room/attacktivedirectory. A fully practical room on Windows AD. The room is based off of the fact that 99% of corporate networks run off of AD. The central tool to the whole practical was impacket, but quite a number of tools were used. The allocated time was 75 minutes, it took me 240 minutes to complete.
2. CONNECTING
First, I connected to the TryHackMe network using their OpenVPN configuration. The access page confirms the connection.



3. INSTALLING IMPACKET



4. INSTALLING BLOODHOUND AND NEO4J

5. GETTING STARTED
First, a ping to confirm the target is up.

Then enumeration, NMAP.


6. KERBEROS
First, I downloaded Kerbrute and made the binary executable.



Then I downloaded the User List and Password List.

Then ran Kerbrute’s userenum command


7. ABUSING KERBEROS
Add AD domain to hosts file.

Getting ticket

Saving the hash in a file

Checking hash type and mode

Cracking the hash. First tried hashcat and ran into memory issues. Switched to john.


Enumerating for SMB shares
8. BACK TO BASICS — SMB SHARES

Specific share: backup

Decoding the hash


9. DOMAIN PRIVILEGE ESCALATION
Secrets

Getting the shell


10. FLAGS
Listing users





11. CONCLUSION
This felt like real ethical hacking. Quite a lot of concepts learned previously were put into practice. The room was especially helpful with hints, the author was fully aware of their target audience. I am quite selective on the type of practicals I put on my blog. This is one of the qualifying ones. SVCADMIN, BACKUP, ADMIN.
