1433

Now trying mssql with discovery creds from [[445]]

nxc mssql hokkaido-aerospace.com -u discovery -p 'Start123!'

Now we can login to mssql:

Now we have a database called hrappdb which we can't access

Now checking for impersonation:

Now we are hrappdb-reader

Now checking databases:

Checking all tables:

Now verifying credentials: It is valid.

Now running bloodhound digestor:

Now in bloodhound checking outbound transitive object control for hrapp-service: We have genericWrite over hazel. Now to get hashes:

We got hashes for maintenence,hazel and discover

Trying to crack we got creds only for hazel:

RERUN BLOODHOUND AS HAZEL:

Now in bloodhound we can check hazel outbound transitive object control: We can see that Hazel is a member of TIER2-ADMINS and IT.

Checking member of IT: We have 3 members:

Molly.Smith:

Alexandra.Little:

We can see Molly has more rights.

Now checking Shortest path to domain admin:

Now resetting Molly's password:

Now we can use rdp:

Connect using xfreerdp: We are molly.smith now

Now running command prompt as administrator with molly's creds:

Now we can use our SeBackupPrivilege to Privesc:

Now we have sam and system in Temp directory.

Now start a python upload server on kali:

Now upload sam ans system by visiting edge on windows target.

Now use secretsdump.py:

Now we have hashes for administrator:

Now we have pwned it:

Now we can login with evil-winrm:

Last updated

Was this helpful?