π―Skills Assessment Part I - Complete Walkthrough
π HTB Academy: Complete Assessment Walkthrough
π Overview
π Question 1: Initial Web Access
π― Task: "Submit the contents of the flag.txt file on the administrator Desktop of the web server"
π Solution Steps:
Step 1: Discover Web Shell
# Navigate to discovered upload directory
http://TARGET_IP/uploads/antak.aspx
# Credentials: admin:My_W3bsH3ll_P@ssw0rd!Step 2: Access First Flag
π« Question 2: Kerberoasting Discovery
π― Task: "Kerberoast an account with the SPN MSSQLSvc/SQL01.inlanefreight.local:1433 and submit the account name as your answer"
π Solution Steps:
Step 1: Establish Meterpreter Session
Step 2: Migrate to Stable Process
Step 3: Download PowerView
Step 4: Enumerate SPNs
π Question 3: Hash Cracking
π― Task: "Crack the account's password. Submit the cleartext value."
π Solution Steps:
Step 1: Extract Kerberos Hash
Step 2: Format Hash for Cracking
Step 3: Crack with Hashcat
π Question 4: Lateral Movement
π― Task: "Submit the contents of the flag.txt file on the Administrator desktop on MS01"
π Solution Steps:
Step 1: Setup Pivoting Infrastructure
Step 2: Configure Proxychains
Step 3: Network Discovery
Step 4: Access MS01 and Retrieve Flag
π€ Question 5: Credential Discovery
π― Task: "Find cleartext credentials for another domain user. Submit the username as your answer."
π Solution Steps:
Step 1: Dump LSA Secrets
Step 2: Identify Cleartext Credentials
π Question 6: Password Extraction
π― Task: "Submit this user's cleartext password."
π Solution Steps:
π― Question 7: Privilege Analysis
π― Task: "What attack can this user perform?"
π Solution Steps:
Step 1: Analyze tpetty Privileges
Step 2: Identify DCSync Rights
π Question 8: Domain Takeover
π― Task: "Take over the domain and submit the contents of the flag.txt file on the Administrator Desktop on DC01"
π Solution Steps:
Step 1: DCSync Attack
Step 2: Pass-the-Hash Attack
Step 3: Retrieve Final Flag
π οΈ Critical Troubleshooting Notes
β οΈ CrackMapExec + Proxychains Issues
π§ Proxychains Best Practices
β
Working Format:
β Problematic Format:
π SOCKS Proxy Stability
Common Issues:
Solutions:
π Complete Attack Chain Summary
π Assessment Flow:
π Key Skills Demonstrated:
π‘οΈ Defensive Lessons:
PreviousCross-Forest Trust Abuse - from LinuxNextSkills Assessment Part II - Advanced Professional Methodology
Last updated