Pirate — Hard Windows (Active Directory, ADFS, Hyper-V Pivot)
Pirate is a Hard-rated Windows Domain Controller that simulates a real-world internal penetration test engagement — you start with low-privileged domain credentials and must chain together gMSA password abuse, ADFS DKM key extraction, Hyper-V guest pivoting, NTLM relay with RBCD, and constrained delegation SPN hijacking to achieve Domain Admin. The sheer number of convincing-but-wrong paths makes this box genuinely difficult: expect to enumerate deeply, get excited about several rabbit holes, and ultimately succeed through a surprisingly simple network observation that seven sessions of complex tunneling failed to surface.
Overview
The target is DC01.pirate.htb, a Windows Server 2019 Domain Controller that also runs Hyper-V hosting an ADFS web server (WEB01 at 192.168.100.2). Our starting credentials (pentest:p3nt3st2025!&) come from the box page, simulating an engagement hand-off. The ADFS infrastructure, gMSA accounts, and a locked-but-active user session on WEB01 are all attack surface — but reaching them requires careful pivoting and a series of non-obvious chained techniques.
Attack Chain at a Glance
This box chains together six distinct phases across two hosts and two network segments:
- Kerberos bootstrapping — Working around shell metacharacters in the starting password to get a TGT
- gMSA password extraction — Kerberoasting → machine account creds → reading managed service account NTLM hashes
- ADFS infrastructure compromise — WinRM as gMSA → DKM key from LDAP → ADFS token signing certificate from WID
- Hyper-V guest pivot — Tunneling into the internal 192.168.100.0/24 network to reach the ADFS web server
- NTLM relay + RBCD — Coercing WEB01 authentication → relaying to DC01 LDAPS → resource-based constrained delegation → secretsdump on WEB01
- SPN hijacking + constrained delegation — Abusing WriteSPN to move a service principal between machine accounts, then leveraging constrained delegation with protocol transition to forge a Domain Admin ticket for DC01
Tools used: impacket (getTGT, getST, secretsdump, ntlmrelayx, wmiexec), netexec, Coercer, BloodHound, Ligolo-ng, ADFSpoof, custom Python scripts
Full Writeup
The detailed walkthrough is encrypted while this box is active on HackTheBox.
Enter the root flag to unlock the full writeup.
Incorrect flag. Try again.