EscapeTwo

Recon

nmap_scan.log

As is common in real life Windows pentests, you will start this box with credentials for the following account: rose / KxEPkKe6R8su

Creds: rose:KxEPkKe6R8su

SMB (139/445)

For some reason you can't open excel files?... Unzip them and read contents manually.

Searching for domain we get many results and it looks like passwords too!

Writeup.png

First Name

Last Name

Email

Username

Password

Angela

Martin

angela

0fwz7Q4mSpurIt99

Oscar

Martinez

oscar

86LxLBMgEWaKUnBG

Kevin

Malone

kevin

Md9Wlq1E5bZnVDVo

NULL

NULL

sa

MSSQLP@ssw0rd!

MSSQL (1433)

We have command execution as MSSQL server.

Reverse Shell

Upload SharpHound and collect data about AD

Writeup-1.png

Shortest Path to Domain Admins shows:

Writeup-2.png

ryan seems to be our next target for priv esc.

Privilege Escalation (ryan)

User.txt

Privilege Escalation (ca_svc)

Writeup-3.png

Note: There's like cronjob which runs every 10 second or smth, if second command fails run first and then second again.

or use bloodyAD to reset password

Docs: https://github.com/CravateRouge/bloodyAD/wiki/User-Guidearrow-up-right

Password reset didn't work as intended and shadow credentials also had error about Kerberos not working.

Because kerberos doesn't work from external, we can try to do the attack internally with Whisker+Rubeus Binaries: https://github.com/jakobfriedl/precompiled-binariesarrow-up-right


From the future, typo in the domain name failed the whole shadow credentials attack from outside.... sooo.... yeah. sequel, not sequal !


Success

Note: Do not reset password with any commands, just shadow credentials attack the original password which will not change through the box.

Privilege Escalation (Administrator)

ESC4

https://github.com/ly4k/Certipy?tab=readme-ov-file#esc4arrow-up-righthttps://www.thehacker.recipes/ad/movement/adcs/access-controls#certificate-templates-esc4arrow-up-right

auth fails for some reason again due to kerberos...

Skill issue 💀 It should have been sequel, not sequal....................................................

Root.txt

Last updated