Hutch

Apparently I did not do the expected method of solving this box but it worked out in the end

Nmap Scan

Initial Access

Enum4Linux

Null Credentials

Guest Credential

Enumerating LDAP

So we will first enumerate LDAP using this command

There is something interesting here:

We can see that the user fmcsorley has the password CrabSharkJellyfish192.

When we try to enumerate the share folder, we get back no interesting results.

Enumerating the Domain

The next step is to enumerate the domain using SharpHound. Since we cannot get a user shell, we will run SharpHound on linux to enumerate the domain.

After we import the data into bloodhound, we can see that the user we owned have the ReadLAPSPassword Privilege.

Reading LAPS password

So the next step would be to try to get the LAPS Password so that we are able to login as the administrator directly

After following the instructions in the repo to get the password, we are able to get the LAPS password for HUTCHDC$.

Next we will test if the password works and sure enough it works.

Lastly, we will just use impacket-psexec to get the Administrator shell.

Last updated