June 14, 2024, 9:10 p.m. | Sourav Bhamare

System Weakness - Medium systemweakness.com

Attacktive Directory — TryHackMe Write-Up

Reconnaissance

Let’s start with the nmap scan.

nmap outputnmap output

We can see AD is running with the domain name THM-AD and DC name spookysec.local. Let’s use Kerbrute to brute force and enumerate valid AD accounts through Kerberos Pre-Authentication.

Before starting Kerbrute, first add the domain name to /etc/hosts file.

Kerbrute

Kerbrute syntax

Let’s start with enumerating usernames:

~/Downloads/kerbrute_linux_amd64 userenum -d spookysec.local --dc spookysec.local userlist.txt -o kerb_users.txt
  1. userenum is the command to enumerate …

accounts active directory authentication brute can cybersecurity directory domain domain name downloads etc file hosts kerberos kerbrute local name nmap penetration testing running scan start thm tryhackme tryhackme-walkthrough usernames valid write-up

Information Technology Specialist I: Windows Engineer

@ Los Angeles County Employees Retirement Association (LACERA) | Pasadena, California

Information Technology Specialist I, LACERA: Information Security Engineer

@ Los Angeles County Employees Retirement Association (LACERA) | Pasadena, CA

Solutions Expert

@ General Dynamics Information Technology | USA MD Home Office (MDHOME)

Physical Security Specialist

@ The Aerospace Corporation | Chantilly

System Administrator

@ General Dynamics Information Technology | USA VA Newington - Customer Proprietary (VAC395)

Microsoft Exchange & 365 Systems Engineer - TS/SCI with Polygraph

@ General Dynamics Information Technology | USA VA Chantilly - 14700 Lee Rd (VAS100)