ROAHACKS Logo

CTF walkthroughs, security research, and hacking tutorials for aspiring ethical hackers.

Featured Walkthrough

EASY

HTB Writeup – Fluffy

Published • November 27, 2025 • 15 min read

A comprehensive walkthrough of the Fluffy machine from Hack The Box. This easy-rated Windows Active Directory machine demonstrates exploiting CVE-2025-24071 to capture NTLM hashes, performing shadow credentials attacks with BloodHound analysis, and leveraging ADCS ESC16 vulnerability for privilege escalation to Domain Administrator.

RECONNAISSANCE

Nmap scanning, SMB enumeration with j.fleischman creds, IT share discovery, CVE-2025-24071 identification

USER - SHADOW CREDENTIALS

NTLM capture via CVE-2025-24071, p.agila hash cracking, BloodHound analysis, shadow credentials on winrm_svc

ROOT - ADCS ESC16

Lateral movement to ca_svc, ESC16 exploitation, UPN modification, certificate request as administrator

KEY FINDINGS

#

CVE-2025-24071 exploited via malicious .library-ms file to capture p.agila's NTLM hash

#

BloodHound analysis revealed GenericAll on Service Accounts with GenericWrite on winrm_svc

#

Shadow credentials attack on winrm_svc and ca_svc for lateral movement

#

ESC16 vulnerability with disabled security extension allows UPN modification to administrator