Sauna HTB writeup

Sauna was my very first windows box, so don't expect this writeup to be super technical or with a lot of knowledge of what's going. Even though, the box was easy to do.
Recon
First nmap scan showed the box was an AD with kerberos and a web site running on port 80.
FSmith user
Browsing the web site I've found a list of possible usernames at http://10.10.10.175/about.html
Then did a wordlist of possible usernames.
Next step is to try get TGTs from users who have 'Do not require Kerberos preauthentication' set on kerberos
This gave me an Kerberos 5 AS-REP hash from FSmith user.
Cracked the password with hashcat
As winrm was enabled on the server I could easily connect using evil-winrm using FSmith and just cracked credentials.
First thing I did was to run winPEAS.exe which gave me default credentials for svc_loanmgr user
With this user now I can dump secrets with impacket.
I've first had some errors about time not synced with the server, so first updated my local type with the box date.
Now got a ticket from kerberos as Adminstrator user using his NTLM hash
Set an environment variable with ticket file.
Now added sauna to etc/hosts and exec into the box
I have system rooted at this point.
This was my first windows box, I was a bit lost and not fully understand yet all the steps I did, need to learn more about how kerberos works.
Regards
Last updated
Was this helpful?