Skip to content

Cicada Walkthrough

This lab demonstrates how multiple Active Directory misconfigurations, ranging from exposed services and weak credential handling to insecure AD CS and Kerberos abuse, can be chained together to escalate from a low-privileged domain user to full Domain Controller compromise.


We begin by identifying open ports and services to map potential attack paths.

image.png

  • Multiple services related to SMB, LDAP, and Kerberos are exposed, indicating that this is an Active Directory environment.

image.png

  • To simplify DNS resolution and support Kerberos-based attacks, we add the domain name and DNS domain name to the /etc/hosts file.

An HTTP service is running on port 80, so we enumerate it to look for an initial foothold.

image.png

  • The application appears to be the default IIS Windows Server page.
  • Directory brute-forcing using gobuster did not reveal any useful content.
  • Since no interesting endpoints were discovered, we move on to enumerate other exposed services.

Since NFS is open, we can now enumerate available file shares.

Note: NFS allows remote file access similar to local storage, making it a potential source of sensitive data.

image.png

image.png

image.png

image.png

Two image files were discovered:

  • One image names marketing.png contained credentials.
  • The other image did not contain useful information.
  • Initial credentials for the user rosie.powell were recovered from an image located inside the rosie.powell directory on the NFS share.

The discovered directory names were added to a user list and tested against the password obtained from marketing.png which is Cicada123

image.png

  • Attempted SMB authentication with these credentials resulted in a STATUS_NOT_SUPPORTED error.
  • As we cannot use this password through SMB!!. lets convert this into a TGT and try again !!

To resolve the authentication issue, we can manually request a Kerberos TGT for the user rosie.powell and retry SMB access.

image.png

image.png

Lets use the TGT we got for rosie.powell to access smb for interesting information

image.png

After successfully obtaining the TGT, authentication proceeds correctly.

image.png

  • As we can see there’s a CertEnroll folder its means there is some sort of AD CS involved lets Enumerate ADCS for more information also we seen user in certificates group.

To better understand privilege relationships and potential attack paths, we dump Active Directory object data.

image.png

The collected data is then ingested into BloodHound for analysis.

image.png

  • BloodHound reveals that rosie.powell is a member of the Certificate Service DCOM Access group.
  • This further confirms that AD CS abuse may be possible.

3. Privilege Escalation via Kerberos Relay (ESC8)

Section titled “3. Privilege Escalation via Kerberos Relay (ESC8)”

image.png

image.png

  • Further enumeration reveals an AD CS ESC8 vulnerability.
  • ESC8 is related to Kerberos authentication relaying to AD CS web enrollment endpoints.
  • While this vulnerability was unfamiliar to me at first, but publicly available good information on this attack and tooling help me to figure out and perform the attack.

Helpful resources:

Before executing the Kerberos relay attack, we must add a machine account to the domain.

  • This is achieved using [bloodyAD](https://github.com/CravateRouge/bloodyAD), which simplifies the process significantly compared to spinning up a Windows VM and manually joining it to the domain.

image.png

3.3 Setting Up Kerberos Relay with krbrelayx

Section titled “3.3 Setting Up Kerberos Relay with krbrelayx”

Next, we configure krbrelayx to relay Kerberos authentication and steal a certificate from the vulnerable AD CS service.

image.png

  • After setting up krbrelayx, we proceed to launch the attack to obtain a certificate.
  • This step involves relaying Kerberos authentication to a vulnerable AD CS service, allowing us to intercept the authentication flow and extract a valid certificate.

image.png

  • By successfully relaying the Kerberos ticket, we abuse the misconfigured certificate enrollment endpoint to obtain a malicious certificate, which can then be used for certificate-based authentication and further privilege escalation.

3.4 Certificate-Based Authentication as Administrator

Section titled “3.4 Certificate-Based Authentication as Administrator”

The stolen certificate can now be used to authenticate directly to Active Directory.

Using certipy-ad auth, we authenticate with the generated administrator.pfx file, which allows us to obtain a Kerberos TGT along with the RC4-HMAC (NTLM) hash for the Administrator account.

image.png

With a valid domain user hash, we can now dump credentials from the Domain Controller using impacket-secretsdump.

image.png

  • Note: Tried to access the administrator desktop using NT Hash using evil-winrm but it didnt work so lets try with TGT

Using the Administrator hash, we can request a Kerberos TGT via pass-the-hash

image.png

Root Flag Retrieval:

Authenticate to the target system using wmiexec and retrieve the flag!!…

image.png

The root flag was successfully obtained and submitted.


  • Enumerated services and identified an Active Directory environment
  • Discovered credentials for rosie.powell through NFS enumeration
  • Requested a Kerberos TGT for rosie.powell and accessed SMB shares
  • Identified AD CS and exploited ESC8 via Kerberos relay to obtain an Administrator certificate
  • Authenticated as Administrator, compromised the Domain Controller, and retrieved the root flag