Manager

Recon

nmap_scan.log

DNS (53)

HTTP (80)

Writeup.png

The site is serving static html, no subdomain was found with ffuf

SMB

Bruteforce the passwords with usernames

Enumerate DC

Writeup-1.png

Raven can winrm in to the machine, so the account is desired target.

MSSQL

Bloodhound didn't show any outbound permissions, but we have access to MSSQL

Command execution is disabled

Hash caught by responder is not crackable

We became sysadmin by netexec, but still no permissions to enable xp_cmdshell

Enumerate with xp_dirtree

We can download the backup file available on webserver.

Writeup-2.png

Creds: raven:R4v3nBe5tD3veloP3r!123

WinRM

User.txt

Privilege Escalation

Still nothing from Bloodhound

Writeup-3.png

Enumerate certificates on DC

https://github.com/ly4k/Certipy?tab=readme-ov-file#esc7arrow-up-righthttps://www.thehacker.recipes/ad/movement/adcs/access-controls#certificate-authority-esc7arrow-up-right

Get the NTLM hash for user and fix clock skew

Root.txt

Last updated