Authority
Recon
SMB
We have access to SMB with non authorized user. There's Development share we have read access to so let's dump that.

Creds:
T0mc@tAdm1n:T0mc@tR00t
Defaults contain some kind of ansible credentials.

Creds:
!@#$%^&*:!@#$%^&*
https://www.bengrewell.com/cracking-ansible-vault-secrets-with-hashcat/
Creds:
svc_pwm:pWm_@dm!N_!23
Password:
DevT3st@123
HTTPs (8443)

PWM is an open source password self-service application for LDAP directories.
From dropdown arrow we see version is PWM v2.0.3 bc96802e, it's few versions behind at the moment https://github.com/pwm-project/pwm/releases
Credentials from SMB doesn't work.

Second ansible credentials is also incorrect.
Password pWm_@dm!N_!23 logs us in.

We can download the configuration file which contains some kind of password.

There's additional username, but can't login with found credentials.
Hash is not going to crack any time soon so Im giving up on that.
There are too many settings and it's overwhelming to explore, more down you go the less you understand and most of it is left to defaults AFAIK. Connection contains LDAP Proxy Password, but it's protected. We are able to add LDAP URLs, so we could try adding ourselves and see what we get.

Add ldap://10.10.14.113:636 to urls and then test, wait for callback:
New credentials.. but looks like password starts after DC TLD.
Creds:
svc_ldap:lDaP_1n_th3_cle4r!
WinRM
User.txt
Privilege Escalation
We could try the default enumeration with winpeas + bloodhound, but considering the name we are 110% dealing with misconfigured certificates.
https://github.com/ly4k/Certipy?tab=readme-ov-file#esc1https://www.thehacker.recipes/ad/movement/adcs/certificate-templates#esc1-template-allows-sanhttps://ppn.snovvcrash.rocks/pentest/infrastructure/ad/ad-cs-abuse/esc1
'AUTHORITY.HTB\Domain Computers' can enroll, enrollee supplies subject and template allows client authentication
To abuse this we need a computer on a network and we should be able to create one.
https://www.thehacker.recipes/ad/movement/builtins/machineaccountquota#create-a-computer-account
Verify that it was created:
Perform the ESC1 attack
https://www.thehacker.recipes/ad/movement/schannel/passthecert
Path 1
One option is to add yourself to domain and add yourself to and groups. or add existing pwned users to any groups.
Note: We could have added ourself to
Administratorsand then usedpsexecfromimpacket
Path 2
We can also abuse the delegations
Now we can request the Silver Ticket
Root.txt
Last updated