Sendai
Last updated
Was this helpful?
Last updated
Was this helpful?
Using Rid bruteforce got the users:
Enumerating smb:
Using blank password we get 2 password must change: Now changing the password:
Using bloodhound:
Now following the path:
Now we can login to evil-winrm
Using privesccheck.ps1: We get the creds for a user called clifford.davey
Now using certipy:
We find an esc4 vulnerable certificate: Converting to ESC1 template:
Now requesting key:
Now generating a silver ticket with [[Silver Ticket Attack]] Using chisel to port forward 1433 to localhost.
Then using the ticket to login to mssql:
Now getting reverse shell we can execute juicypotato or GodPotato for admin