Reflection
Enumerating the smb shares of machine #3 we find creds: 
Using these creds to login to mssql on machine #3 we get other creds:
mssqlclient.py web_staging:'Washroom510'@10.10.143.69
Now password spraying we find other accounts with same password: 
Now doing NTLM Relay attack we get hash for an account:

Now checking if message signing is disabled:
It is false
So starting an ntlm relay:
Now we can access shares
Now get new creds: 
Now we can check with mssql on the dc:
We get passwords from the prod database on DC. 
Now trying responder:
We get another user. We cant use nlm relaying as it doesnt work
Now password spraying all passwords we have with the users:
Now we can use bloodhound: 
But checking MachineAccountQuota: 
Now we can try to get laps password

With this password we can try to password spray:

We got the administrator on ms01
Last updated
Was this helpful?