Description TombWatcher is a medium Hack The Box machine that features:
Initial access using an assumed breach scenario that leads in domain discovery Controlled user has WriteSPN permission over other user, allowing user pivoting with a targeted Kerberoast attack User is able to add itself to a group with the ReadGMSAPassword permission over a service account, allowing user pivoting Service account have ForceChangePassword permission over an user account, allowing changing the user password and user pivoting Next user account has WriteOwner permission over other user, allowing changing the owner, the permissions and the password of the user that is able of remotely access to the remote machine Active Directory Certificate Services deleted account recovery via the AD Recycle Bin One of the controlled users have GenericAll permission over the ADCS account, allowing full control Privilege Escalation via Active Directory Certificate Services ESC15 vulnerability Footprinting First, we are going to check with ping command if the machine is active and the system operating system. The target machine IP address is 10.129.44.254.
...