Baby

This is not a writeup, just my notes about the machine.

Machine information

Operating System: Windows Server 2022 (Build 20348 x64)

Chain: False (standalone compromise)

Credentials

Username
Password
Method
Scope

Caroline.Robinson

BabyStart123!

LDAP

User description field (Expired Password)

✅ Valid Usernames

🔑 Passwords list

Enumeration

ICMP Check

Service enumeration

SMB

  • Null session allowed ✅

  • SMB Signing: True

  • SMBv1: Disabled

Initial Foothold

Identifying Leaked Initial Passwords in the User Description Field

Initial password for users: BabyStart123!

Running a Password Spraying attack

Changing the password caroline.robinson's Password

Compromise Domain Controller

Discovering Caroline.Robinson is member of backup operators group

User Info

  • Username: baby\caroline.robinson

  • Group Membership: Backup Operators

Privileges

  • SeBackupPrivilege

  • SeRestorePrivilege

  • SeMachineAccountPrivilege

Extracting the Registry Hives using impacket toolkit

Dumping ntds.dit using Robocopy

Extracting domain credentials

Last updated