Skip to content

Phantom -- Vulnlab (write-up)

Difficulty: Hard Box: Phantom (Vulnlab) Author: dsec Date: 2025-09-22


TL;DR

Base64-decoded creds from enumeration. Cracked VeraCrypt backup with custom wordlist. KeePass dump -> lateral movement to svc_sspr. ICT Security group has AddAllowedToAct on DC.


Target info

- Domain: Vulnlab chain

Enumeration

Nmap results

Nmap continued

Enum

Enum continued


Initial access

Copied base64 output from enumeration, decoded in CyberChef:

CyberChef decode

Found password: Ph4nt0m@5t4rt!

nxc spray

Valid: ibryant:Ph4nt0m@5t4rt!

Shell

Enum


VeraCrypt backup

Generated a custom wordlist based on the company name pattern (hint from Vulnlab wiki):

crunch 12 12 -t 'Phantom202%^' -o wordlist.txt

Cracked the VeraCrypt container:

hashcat -m 13721 IT_BACKUP_201123.hc ./wordlist.txt

hashcat

Password: Phantom2023!

Mounted


Lateral movement

KeePass

KeePass dump

Found: lstanley:gB6XTcqVP5MlP7Rc

BloodHound

Enum

Password reuse: svc_sspr:gB6XTcqVP5MlP7Rc

svc_sspr


Privilege escalation

All 3 users are members of ICT Security, which has AddAllowedToAct on the DC:

ICT Security


Lessons & takeaways

  • Custom wordlists with crunch based on company naming patterns are effective for VeraCrypt
  • Always check for password reuse across service accounts
  • AddAllowedToAct (RBCD) on a DC from a group membership = domain compromise