Reflection
Last updated
Last updated
Enumerating the smb shares of machine #3 we find creds:
Using these creds to login to mssql on machine #3 we get other creds:
Now doing NTLM Relay attack we get hash for an account:
Now checking if message signing is disabled:
So starting an ntlm relay:
Now we can access shares
Now password spraying all passwords we have with the users:
Now we can try to get laps password
With this password we can try to password spray:
We got the administrator on ms01
Now password spraying we find other accounts with same password:
It is false
Now get new creds:
Now we can check with mssql on the dc: We get passwords from the prod database on DC.
Now trying responder: We get another user. We cant use nlm relaying as it doesnt work
Now we can use bloodhound:
But checking MachineAccountQuota: