Home >

Huntress CTF > Medium Challenges

Back <> Next

We got our hands on an NTDS file, and we might be able to break into the Azure Admin account! Can you track it down and try to log in? They might have MFA set up though…

For this challenge, we are given a webserver to spin up, as well as NTDS.zip to download.

Once we extract the archive, we receive ntds.dit and SYSTEM. We can use dsinternals to assist with the analysis and the module can be installed by running the following command in a powershell window running as administrator:

Install-Module -Name DSInternals -Force

We can then get the account information from the active directory database (NTDS.dit) using the following command to output the result to a .txt file:

Get-ADDBAccount -All -DBPath .\ntds.dit -Bootkey "$(Get-BootKey -SystemHivePath .\SYSTEM)" > .\output.txt

We know we need to find an Azure admin, so we can search for that within the document, and we get one single result:

mfatigue1

We now know the username, and we can retrieve the password by cracking the NTLM hash. We used crackstation for this.

08e75cc7ee80ff06f77c3e54cadab42a = katlyn99

We can now spin up the webserver and try logging in with the credentials:

huntressctf\Jillian_Dotson

katlyn99

We are then taken to a screen and have to wait for the sign in request to be approved.

mfatigue2

However, if we remember the name of this challenge, we can keep sending push notifications, and eventually retrieve the flag!

mfatigue3

Back <> Next