π―ACL Abuse Tactics
π HTB Academy: Active Directory Enumeration & Attacks
π Overview
π Attack Chain Overview
wley (compromised) β damundsen (password change) β Help Desk Level 1 (group membership) β Information Technology (nested groups) β adunn (GenericAll) β DCSync capabilitiesπ Step 1: Authentication Setup
Creating PSCredential Objects
Key Security Considerations
π Step 2: Password Manipulation Attack
Leveraging User-Force-Change-Password Rights
Alternative Linux Approach
Attack Validation
π₯ Step 3: Group Membership Manipulation
Preparing damundsen Credentials
Pre-Attack Group Enumeration
Group Membership Addition Attack
Attack Validation
Alternative Linux Approach
π― Step 4: Targeted Kerberoasting Attack
Creating Fake SPN for adunn
Kerberoasting Execution
Alternative Linux Approach
Hash Cracking with Hashcat
π§Ή Step 5: Cleanup Procedures
Critical Cleanup Order
Assessment Documentation Requirements
π¨ Detection and Remediation
Event Monitoring
Key Event IDs:
Event Analysis Example
Advanced Detection Techniques
PowerShell Logging
Sysmon Configuration
Defensive Recommendations
1. ACL Auditing and Remediation
2. Group Membership Monitoring
3. Enable Advanced Audit Policy
4. Implement LAPS (Local Administrator Password Solution)
5. Regular BloodHound Analysis
π― HTB Academy Lab Solution
Lab Question: "Set a fake SPN for the adunn account, Kerberoast the user, and crack the hash using Hashcat. Submit the account's cleartext password as your answer."
Step 1: Connect to Target
Step 2: Setup Attack Environment
Step 3: Execute Kerberoasting Attack
Step 4: Crack Hash with Hashcat
Step 5: Cleanup
π Complete HTB Academy Lab Execution
Step-by-Step Real Lab Commands:
π Key Takeaways
Attack Chain Mastery
Technical Skills Developed
Defensive Insights
Professional Considerations
Last updated