π§Miscellaneous Misconfigurations
π― HTB Academy: Active Directory Enumeration & Attacks
π Overview
π Attack Chain Context
Standard Techniques β Miscellaneous Misconfigurations β Additional Attack Vectors β Comprehensive Coverage
(Core Methods) (Diverse Vulnerabilities) (Edge Cases) (Complete Assessment)π§ Exchange Related Group Membership
Exchange Security Model Overview
Critical Exchange Groups
Group Name
Privileges
Attack Potential
Exchange Windows Permissions Exploitation
Attack Methodology
Privilege Escalation via Exchange Groups
Common Attack Vectors
Exchange Server Compromise Impact
π PrivExchange Attack
Vulnerability Overview
Attack Methodology
LDAP Relay Attack
Prerequisites
Exploitation Process
π¨οΈ Printer Bug (MS-RPRN)
MS-RPRN Protocol Vulnerability
Technical Details
Attack Prerequisites
Exploitation Methods
Method 1: LDAP Relay for DCSync
Method 2: RBCD (Resource-Based Constrained Delegation)
Vulnerability Assessment
Enumeration with SecurityAssessment.ps1
Alternative Detection Tools
Cross-Forest Attack Applications
π« MS14-068 Kerberos Vulnerability
Kerberos PAC Forging Vulnerability
Technical Background
Exploitation Process
Exploitation Tools
Python Kerberos Exploitation Kit (PyKEK)
Impacket Toolkit
Defense and Remediation
π Sniffing LDAP Credentials
Application and Device Vulnerabilities
Common Credential Storage Locations
Attack Methodology
Method 1: Cleartext Credential Discovery
Method 2: Test Connection Exploitation
Method 3: Full LDAP Server Simulation
Credential Privilege Assessment
π Enumerating DNS Records
DNS Enumeration with adidnsdump
Tool Overview
Why DNS Enumeration Matters
Practical DNS Enumeration
Basic DNS Enumeration
Analyzing Initial Results
Advanced Resolution with -r Flag
Strategic Value of DNS Enumeration
π Other Misconfigurations
Password in Description Field
Common Administrative Oversight
Enumeration with PowerView
Analysis and Exploitation
PASSWD_NOTREQD Field Analysis
UserAccountControl Attribute
Enumeration and Testing
Testing Strategy
Credentials in SMB Shares and SYSVOL Scripts
SYSVOL Share Enumeration
Script Discovery
Script Analysis Example
Credential Validation
π Group Policy Preferences (GPP) Passwords
GPP Vulnerability Overview
Historical Context
Vulnerable File Types
File Name
Purpose
Credential Risk
GPP Password Extraction
Manual Decryption
Automated Tools
Alternative Tools
Strategic Considerations
π« ASREPRoasting
Kerberos Pre-Authentication Bypass
Technical Background
Pre-Authentication vs. ASREPRoasting
Account Enumeration
PowerView Enumeration
Active Directory Module
AS-REP Extraction
Method 1: Rubeus (Windows)
Method 2: Kerbrute (Automatic Discovery)
Method 3: GetNPUsers.py (Linux)
Password Cracking
Hashcat Offline Cracking
Forced ASREPRoasting
ποΈ Group Policy Object (GPO) Abuse
GPO Security Model Overview
GPO Attack Potential
Common GPO Abuse Techniques
Attack Type
Method
Impact
GPO Enumeration
PowerView GPO Discovery
Built-in PowerShell Cmdlets
GPO Permission Analysis
Domain Users Group Rights Assessment
GPO GUID to Name Resolution
BloodHound GPO Analysis
GPO Exploitation Tools
SharpGPOAbuse
OPSEC Considerations
π― HTB Academy Lab Solutions
Lab Environment Details
π Question 1: "Find another user with the passwd_notreqd field set. Submit the samaccountname as your answer. The samaccountname starts with the letter 'y'."
Complete Solution Walkthrough:
π« Question 2: "Find another user with the 'Do not require Kerberos pre-authentication setting' enabled. Perform an ASREPRoasting attack against this user, crack the hash, and submit their cleartext password as your answer."
Complete Solution Walkthrough:
π Key Takeaways
Technical Mastery Achieved
Professional Skills Developed
Attack Methodology Excellence
Defensive Insights
Last updated