๐ถPuppy
https://app.hackthebox.com/machines/Puppy

Machine Information
As is common in real life pentests, you will start the Puppy box with credentials for the following account: levi.james / KingofAkron2025!
Recon
Using the given credentials we perform some recon on smb
Adding dc.puppy.htb to our hosts-file
Adding the ip to out dns resolver
Performing some bloodhoudn enumeration

Checking the shares
User
We are adding levi to the developer group
Getting the recovery.kdbx
As long keepass2john isn't supporting this version we use keepass4brute.
Now we optimize our user-file with these information and starting a brute-force attack
Checking again with bloodhound which priviliges we got

With some digging we find out that we can force a password change of the use Adam Silver.
The Account is disabled but we can activate it again with as Edward
And we got the userflag
Root
Checking for other files we found a backup
We find some keyfiles and to copy them we gonna use a share
Now copying the files to the share using the evil-winrm connection from before
Decrypting the key
Decrypting the blob-file
With that pass we can dump
And we got our flag
Last updated
