VOIDREAD
VOIDREAD
Home Posts Writeups
VOIDREAD
Notes from the fog. Records from the breach.
Recent
HTB . 03

CCTV - HTB

Easy Linux CCTV machine abusing ZoneMinder and MotionEye flaws through SQL injection and escalation. [Unintended]

HTB . 29

Pirate - HTB

Windows Active Directory challenge centered on delegation, Kerberos, and privilege escalation workflows.

AD . 17

Valid User (No Password)

Valid User (No Password) techniques and commands for Active Directory security assessment.

AD . 16

Trusts

Trusts techniques and commands for Active Directory security assessment.

Wandering
HTB . 23

Imagery - HTB

Medium Linux box using blind XSS for admin session theft, LFI to source read, ImageMagick command injection for RCE, pyAesCrypt backup decryption, and Charcol cron abuse for root.

HTB . 41

Voleur - HTB

Voleur is a medium-difficulty Windows machine designed around an assumed breach scenario, where the attacker is provided with low-privileged user credentials. The machine features an Active Directory environment, and NTLM authentication is disabled. After Kerberos configuration and network enumeration, a password-protected Excel file is found on an exposed SMB share. We extract its password hash, crack it to recover the password, and use that password to access the spreadsheet. Enumeration reveals a service account with WriteSPN rights, which enables a targeted Kerberoasting attack that recovers credentials and grants remote access to the host. A previously deleted domain user is restored using group privileges, and a DPAPI-protected credential blob is recovered, which is decrypted with the user’s password to reveal a higher-privilege account. These credentials lead to discovering an SSH private key for a backup service account, allowing access to a Linux subsystem over a nonstandard port. From this, the NTDS.dit, SYSTEM, and SECURITY backup files are extracted and used to recover the Administrator’s NT hash, ultimately allowing access as the Administrator.

AD . 15

SCCM

SCCM techniques and commands for Active Directory security assessment.

HTB . 36

Sorcery - HTB

Insane Linux target that chains a graph query flaw with internal service abuse, then pivots through social engineering and credential harvesting into a multi-step privilege escalation path.