๐ŸถPuppy

https://app.hackthebox.com/machines/Puppy

Machine Information


As is common in real life pentests, you will start the Puppy box with credentials for the following account: levi.james / KingofAkron2025!

Recon

Using the given credentials we perform some recon on smb

Adding dc.puppy.htb to our hosts-file

Adding the ip to out dns resolver

Performing some bloodhoudn enumeration

Checking the shares

User

We are adding levi to the developer group

Getting the recovery.kdbx

As long keepass2john isn't supporting this version we use keepass4brute.

Now we optimize our user-file with these information and starting a brute-force attack

Checking again with bloodhound which priviliges we got

With some digging we find out that we can force a password change of the use Adam Silver.

The Account is disabled but we can activate it again with as Edward

And we got the userflag

Root

Checking for other files we found a backup

We find some keyfiles and to copy them we gonna use a share

Now copying the files to the share using the evil-winrm connection from before

Decrypting the key

Decrypting the blob-file

With that pass we can dump

And we got our flag

Last updated