Haze - Hack The Box Season 7 - Windows Hard
by ShitWhiffler - Saturday March 29, 2025 at 06:59 PM
#11
evil-winrm -u 'mark.adams' -p 'Ld@p_Auth_Sp1unk@2k24' -i haze.htb
Reply
#12
did someone get anything?
Reply
#13
besides mark.adams being in gMSA_Managers, nothing.
Reply
#14
how did u get this password for paul ? seems uncrackable through hashcat

This forum account is currently banned. Ban Length: Permanent (N/A Remaining)
Ban Reason: Reposting hidden content for free
Reply
#15
(Mar 29, 2025, 09:33 PM)jaybit Wrote: besides mark.adams being in gMSA_Managers, nothing.

you can extract GMSA account hash, then that account can add owner to Support_Services group which i dont know tf i could do with this group
Reply
#16
(Mar 29, 2025, 09:55 PM)pop10189 Wrote:
(Mar 29, 2025, 09:33 PM)jaybit Wrote: besides mark.adams being in gMSA_Managers, nothing.

you can extract GMSA account hash, then that account can add owner to Support_Services group which i dont know tf i could do with this group

I was not able to do that. Can you tell how?
Reply
#17
(Mar 29, 2025, 10:05 PM)kyakeiuwu Wrote:
(Mar 29, 2025, 09:55 PM)pop10189 Wrote:
(Mar 29, 2025, 09:33 PM)jaybit Wrote: besides mark.adams being in gMSA_Managers, nothing.

you can extract GMSA account hash, then that account can add owner to Support_Services group which i dont know tf i could do with this group

I was not able to do that. Can you tell how?

look for GMSA section https://notes.qazeer.io/active-directory...exploiting

 Then extract the GMSA using netexec ldap -u mark... -p .... --gmsa
Reply
#18
(Mar 29, 2025, 10:12 PM)pop10189 Wrote:
(Mar 29, 2025, 10:05 PM)kyakeiuwu Wrote:
(Mar 29, 2025, 09:55 PM)pop10189 Wrote:
(Mar 29, 2025, 09:33 PM)jaybit Wrote: besides mark.adams being in gMSA_Managers, nothing.

you can extract GMSA account hash, then that account can add owner to Support_Services group which i dont know tf i could do with this group

I was not able to do that. Can you tell how?

look for GMSA section https://notes.qazeer.io/active-directory...exploiting

 Then extract the GMSA using netexec ldap -u mark... -p .... --gmsa

Account: Haze-IT-Backup$      NTLM:

I literally got this as the hash no NTLM
Reply
#19
(Mar 29, 2025, 10:16 PM)kyakeiuwu Wrote:
(Mar 29, 2025, 10:12 PM)pop10189 Wrote:
(Mar 29, 2025, 10:05 PM)kyakeiuwu Wrote:
(Mar 29, 2025, 09:55 PM)pop10189 Wrote:
(Mar 29, 2025, 09:33 PM)jaybit Wrote: besides mark.adams being in gMSA_Managers, nothing.

you can extract GMSA account hash, then that account can add owner to Support_Services group which i dont know tf i could do with this group

I was not able to do that. Can you tell how?

look for GMSA section https://notes.qazeer.io/active-directory...exploiting

 Then extract the GMSA using netexec ldap -u mark... -p .... --gmsa

Account: Haze-IT-Backup$      NTLM:

I literally got this as the hash no NTLM

First you need to add your self as a member to read Gmsa
Reply
#20
(Mar 29, 2025, 10:16 PM)kyakeiuwu Wrote:
(Mar 29, 2025, 10:12 PM)pop10189 Wrote:
(Mar 29, 2025, 10:05 PM)kyakeiuwu Wrote:
(Mar 29, 2025, 09:55 PM)pop10189 Wrote:
(Mar 29, 2025, 09:33 PM)jaybit Wrote: besides mark.adams being in gMSA_Managers, nothing.

you can extract GMSA account hash, then that account can add owner to Support_Services group which i dont know tf i could do with this group

I was not able to do that. Can you tell how?

look for GMSA section https://notes.qazeer.io/active-directory...exploiting

 Then extract the GMSA using netexec ldap -u mark... -p .... --gmsa

Account: Haze-IT-Backup$      NTLM:

I literally got this as the hash no NTLM


Set-ADServiceAccount -Identity "Haze-IT-Backup" -PrincipalsAllowedToRetrieveManagedPassword "mark.adams"
$user = Get-ADUser -Identity "mark.adams"
Set-ADServiceAccount -Identity "Haze-IT-Backup" -PrincipalsAllowedToRetrieveManagedPassword $user.DistinguishedName

then gMSADumper should work
Reply


Possibly Related Threads…
Thread Author Replies Views Last Post
  [FREE] 300+ Writeups PDF HackTheBox/HTB premium retired Tamarisk 386 96,329 3 hours ago
Last Post: Sulk4685
  [FREE] HackTheBox Academy - CBBH CDSA CPTS All Modules Flags Techtom 49 3,930 7 hours ago
Last Post: opium0221
  [FREE] CPTS 12 FLAGS pulsebreaker 87 3,378 Yesterday, 01:29 PM
Last Post: darth_sidious
  [MEGALEAK] HackTheBox ProLabs, Fortress, Endgame - Alchemy, 250 Flags, leak htb-bot htb-bot 98 9,213 May 07, 2026, 08:05 PM
Last Post: Zacker90
  SVCHOST Injector 2026 opsecmaster67 0 115 May 07, 2026, 01:41 PM
Last Post: opsecmaster67

Forum Jump:


 Users browsing this forum: 1 Guest(s)