HTB Active Writeup — Kerberoasting & GPP Passwords (2026)
My first AD box ever. Null session on SMB → GPP password in SYSVOL → Kerberoasting the Administrator → Domain Admin.
My first AD box ever. Null session on SMB → GPP password in SYSVOL → Kerberoasting the Administrator → Domain Admin.
Hard AD box. AS-REP Roasting → BloodHound → ForceChangePassword → lsass.DMP → SeBackupPrivilege → VSS snapshot → NTDS.dit → Domain Admin.
Second AD box. AS-REP Roasting with no creds, BloodHound attack path through 5 nested groups, ACL abuse to DCSync.
Active Directory box — password spraying → Azure AD Connect credential extraction → Domain Admin.
SMB guest access → Excel macro with MSSQL creds → Responder hash steal via xp_dirtree → xp_cmdshell → reverse shell.
Proving Grounds box — anonymous FTP, SmarterMail on a weird port, .NET deserialization RCE straight to SYSTEM. No privesc needed.