Bruno
This is not a writeup, just my notes about the machine.

Credentials
Username
Password
Method
Scope
Information Gathering
Service Enumeration
FTP
DNS
SMB (enum4linux-ng)
HTTP
Kerberos enumeration
Performing Asreproasting Attack
Performing Kerberoasting with valid credentials
Discovering a read and write directory
Foothold via DLL hijacking

Attack Path
Crafting the malicious DLL
Abusing ZIP Path Traversal

Uploading the file
Obtaining a reverse shell through DLL Hijacking

Domain Compromise via Kerberos Relay Attack
Requirements:
Checking Available Port
Kerberos Relay Attack using KrbRelay
Adding a new malicious computer
Obtaining the malicious computer SID
Performing KrbRelay attack to compromise domain
Kerberos Relay Attack using KrbRelayUp (Linux path)
Performing Kerberos Relay attack with KrbRelayUp tool to compromise domain
Requesting the Service Ticket with s4u using impacket
Performing DCSync Attack to dump NTDS.dit
Kerberos Relay Attack using KrbRelayUp (Windows path)
Performing Kerberos Relay attack with KrbRelayUp tool to compromise domain
Requesting Ticket Granting Ticket for KRBRELAYUP$ user
Requesting Ticket Granting Service using S4U
Trying to perform DCSync attack using mimikatz
Downloading the files and perform DCSync Attack
CLSIDS working for Windows 2019/2022
Last updated