huntress2023

Writeups for Huntress CTF 2023

View on GitHub

✅ MISCELLANEOUS - MFAtigue

Writeup by: @goproslowyo

Tags

Files:

Description

Author: Adam Rice

We got our hands on an NTDS file, and we might be able to break into the Azure Admin account! Can you track it down and try to log in? They might have MFA set up though… Download the file(s) below and press the Start button on the top-right to begin this challenge.

Writeup

We’re given an NTDS file and we can dump the NTLM hashes and then crack them. One or more will likely crack to point us in the next direction:

impacket-secretsdump -ntds ./ntds.dit -system ./SYSTEM -hashes lmhash:nthash LOCAL -outputfile ntlm-extract

Extract the hashes from NTDS

Glancing at the challenge website, we probably want to look at domain user hashes.

huntressctf.local Domain Users

There’s two ways to approach this. Try to crack all hashes at once (fastest) in Crackstation or guess which account and crack just one hash (slower). This latter method is slower but you can figure out which account is not locked out.

huntressctf domain users

Anyway, this is a CTF and the quicker way is to throw them all in Crackstation and pray and luckily huntressctf\JILLIAN_DOTSON cracks.

Jillian Dotson's Password

With the credentials huntressctf\JILLIAN_DOTSON:katlyn99 we just need to login and as the challenge name suggests fatigue the MFA-holder into approving our authentication requests.

Send a bunch of MFA requests

And get the flag:

Retrieve the Flag

flag{9b896a677de35d7dfa715a05c25ef89e}