Reflection

Enumerating the smb shares of machine #3 we find creds:

Using these creds to login to mssql on machine #3 we get other creds:

mssqlclient.py web_staging:'Washroom510'@10.10.143.69

Now password spraying we find other accounts with same password:

Now doing NTLM Relay attack we get hash for an account:

Now checking if message signing is disabled:

It is false

So starting an ntlm relay:

Now we can access shares

Now get new creds:

Now we can check with mssql on the dc: We get passwords from the prod database on DC.

Now trying responder: We get another user. We cant use nlm relaying as it doesnt work

Now password spraying all passwords we have with the users:

Now we can use bloodhound:

But checking MachineAccountQuota:

Now we can try to get laps password

With this password we can try to password spray:

We got the administrator on ms01

Last updated

Was this helpful?