Published: Sep 9, 2025 • Author: Devaraj Govindhan
This assessment targeted the Active Directory (AD) forest within the 172.25.170.0/24 range, with exclusions at 172.25.170.1. The goal was to identify Domain Controllers, enumerate users, and escalate privileges leveraging Kerberos-based attacks (Silver Ticket, Golden Ticket, Kerberoasting). Ultimately, administrator-level access was achieved and multiple user/admin flags were extracted from key hosts.
Step | Activity |
---|---|
Recon | SMB brute force identified valid credentials for cpent:XXX on 172.25.170.110. |
Discovery | Full subnet scan revealed potential Domain Controllers at 172.25.170.80 and 172.25.170.190. |
Enumeration | Verified domain login via crackmapexec and extracted AD users with GetADUsers . |
Password Spray | Pattern-based spraying confirmed that the Administrator account shared the same password. |
Privilege Escalation | Dumped NTDS.dit via impacket-secretsdump , recovering domain hashes and Kerberos keys. |
Access | SMB access confirmed with Administrator hash, enabling retrieval of sensitive flags from both DC and member hosts. |
Access was achieved through SMB brute forcing against 172.25.170.110, yielding valid credentials for:
nmap -A 172.25.170.0/24
identified Kerberos (88/tcp) and LDAP (389/tcp) services on the following:
To confirm domain access, LDAP/SMB authentication was tested against the Domain Controller:
crackmapexec smb 172.25.170.80 -u cpent -p 'XXX' --shares
This step verified that cpent could authenticate against the DC and allowed enumeration of all domain users.
impacket-GetADUsers ECC.LOCALNET/cpent -dc-ip 172.25.170.80 -all
With one known working password, spraying against AD accounts revealed Administrator reused the same credential.
Domain hashes and Kerberos keys were dumped via impacket-secretsdump
from DC:
52838ab3f0_XXX_080b52043d2cb0f
276e4020f8a27_XXX_0636764
Host | Flag | Screenshot |
---|---|---|
DC (172.25.170.80) | WS_XXX_-USER |
![]() |
172.25.170.110 (User) | WS_XXX_USER |
![]() |
172.25.170.110 (Admin) | ouble_XXX_nFLAGTWO |
![]() |
NTDS.dit
extraction.krbtgt
, to prevent persistence via Golden Ticket attacks.The engagement successfully demonstrated compromise of both Domain Controllers and member hosts within the AD forest. Weak password practices and lack of monitoring allowed escalation from a low-privileged local user to full domain administrator, enabling sensitive data extraction and persistent access opportunities. Strengthening password policies, reducing service exposure, and improving monitoring would significantly reduce attack surface.