β‘Bleeding Edge Vulnerabilities
π― HTB Academy: Active Directory Enumeration & Attacks
π Overview
π Attack Chain Context
Standard User Access β Bleeding Edge Exploitation β Domain Controller Compromise β Full Domain Control
(Initial Access) (Recent CVEs) (SYSTEM/Admin Rights) (Enterprise Owned)π¨ Attack Techniques Overview
1. NoPac (SamAccountName Spoofing)
2. PrintNightmare
3. PetitPotam (MS-EFSRPC)
π NoPac (SamAccountName Spoofing)
Vulnerability Overview
CVE Breakdown
CVE
Description
Impact
Attack Methodology
Prerequisites and Environment Setup
Tool Installation
Attack Requirements
Vulnerability Assessment
Scanning for NoPac Vulnerability
Key Vulnerability Indicators
Exploitation Methods
Method 1: Interactive Shell Access
Method 2: DCSync Attack
Post-Exploitation Considerations
Ticket Management
OPSEC Considerations
π¨οΈ PrintNightmare
Vulnerability Overview
CVE Details
CVE
Description
Impact
Attack Prerequisites
Environment Setup and Dependencies
Tool Installation
Service Enumeration
Exploit Execution Workflow
Step 1: Payload Generation
Step 2: SMB Share Hosting
Step 3: Metasploit Handler Configuration
Step 4: Exploit Execution
Step 5: SYSTEM Shell Access
Windows Defender Considerations
Detection Challenges
Evasion Strategies
π« PetitPotam (MS-EFSRPC)
Vulnerability Overview
CVE-2021-36942 Details
Attack Prerequisites
Attack Architecture
Attack Flow Diagram
Exploitation Workflow
Step 1: NTLM Relay Setup
Step 2: Authentication Coercion
Step 3: Certificate Retrieval
Certificate-to-TGT Conversion
Step 4: TGT Request with PKI Authentication
Step 5: Environment Configuration and DCSync
Alternative Attack Paths
Method 1: Direct Hash Extraction with getnthash.py
Method 2: Windows Rubeus Pass-the-Ticket
π― HTB Academy Lab Solutions
Lab Environment Details
π Question 1: "Which two CVEs indicate NoPac.py may work? (Format: ####-#####&####-#####, no spaces)"
CVE Research and Answer
π Question 2: "Apply what was taught in this section to gain a shell on DC01. Submit the contents of flag.txt located in the DailyTasks directory on the Administrator's desktop."
Complete Solution Walkthrough
π‘οΈ Defensive Measures and Mitigations
NoPac Mitigations
Immediate Actions
Long-term Hardening
PrintNightmare Mitigations
Service Hardening
Group Policy Configuration
PetitPotam Mitigations
Certificate Services Hardening
Network Controls
π Key Takeaways
Technical Mastery Achieved
Professional Skills Developed
Attack Methodology Mastery
Defensive Insights
Last updated