Hokkaido
Last updated
Last updated
Using kerbrute for bruteforcing usernames:
We get usernames: Now bruteforcing passwords with the usernames: \
Now we can try kerberoasting with this account:
We get two hashes but they are uncrackable:
Now checking SYSVOL share for scripts: Now we get a password so spraying it: Now using discovery user we can login to Mssql:
Now checking for impersonation:
Now to impersonate:
Now checking:
Now with the creds we can run bloodhound:
Now checking databases:
Checking all tables:
Checking outbound transitive object control we have generic write over hazel. Doing a targeted kerberoast:
Only hazel's hash gets cracked.
We belong to Tier2-Admins and we have GenericWrite access over Administrators: But doesn't work for some reason