Post

DarkZero

HackTheBox DarkZero machine writeup — reconnaissance and enumeration walkthrough.

DarkZero

🎯 Overview
DarkZero presents a sophisticated Active Directory environment with two separate domains connected via trust relationships. The attack chain involves exploiting MSSQL linked server misconfigurations, pivoting into an internal network using Ligolo-ng, escalating privileges through a kernel exploit, and finally capturing Kerberos tickets to compromise the domain controller.

What makes this machine unique?

  • Multihomed architecture with split-horizon DNS
  • Cross-domain trust exploitation
  • Modern pivoting techniques with Ligolo-ng
  • Real-world Kerberos ticket theft scenario

📡 Phase 1: Reconnaissance - Mapping the Attack Surface

Initial Port Scan

Let’s start by discovering what services are running:

1
nmap -p 1-65535 -T4 -A -v 10.10.11.89

🔍 What are we looking for?

  • Active Directory services (LDAP, Kerberos, DNS)
  • Database services (potential entry points)
  • Remote access services (WinRM, RDP)

Key Discoveries:

PortServiceWhy It Matters
1433MS-SQL ServerEntry point for command execution
88KerberosDomain authentication - ticket capture opportunity
389/636LDAP/LDAPSActive Directory queries
5985WinRMRemote shell access (if we get creds)
445SMBFile sharing, potential relay attacks

💡 Learning Moment: Notice port 1433 (MSSQL)? This is often overlooked but can be a goldmine. SQL servers frequently have elevated privileges and interesting configurations like linked servers.



🔒

Premium Content

The full exploitation walkthrough, privilege escalation, and flags are available exclusively for members.

Unlock Full Writeup →
This post is licensed under CC BY 4.0 by the author.