HTB: Sauna

Hack The Box: Sauna

Machine IP: 10.10.10.175 OS: Windows Difficulty: Medium

Sauna is another pure AD box.

1. Reconnaissance

We enumerate usernames from the website about page (Fergus, Shaun, Hugo). We create a wordlist: fsmith, fergus.smith, etc.

2. Exploitation (ASREPRoast)

We check if any user has "Roastable" settings (Pre-Auth Disabled).

GetNPUsers.py sauna.htb/ -usersfile users.txt -format hashcat -outputfile hashes

Hit: fsmith. We crack the hash: Thestroke23.

3. Lateral Movement

We login as fsmith. We run WinPEAS or CreateDump to find secrets. We find explicit credentials for svc_loanmgr in the registry (Autologon configuration). Password: Moneymakestheworldgoround!

4. Privilege Escalation (DCSync)

svc_loanmgr is a member of...? We check Bloodhound. It's not explicitly Admin. But wait, Mimikatz -> lsadump::secrets. Or, we check for DCSync rights again via Bloodhound. Often, service accounts for financial apps have elevated rights. We DCSync the Administrator hash.

Conclusion

A solid workout in AD enumeration techniques.