Heron (Chain)
This is not a writeup, just my notes about the machine.
Machine information

Credentials
Username
Password
Method
Scope
Information Gathering
Service Enumeration
10.10.231.37
SMB (enum4linux-ng)
HTTP:80

Initial foothold on Heron
Setting up a tunnel to reach the internal network
Discovering Valid users via Kerbrute user enumeration
Discoverign Asreproastable user
Cracking samuel.davies' hash
Discovering groups.xml within the sysvol share
Extracting the GPP Password using NetExec
Password Spraying attack
Remote command Execution via web.config

Discovering _local user credentials

Performing Password Spraying attack
Discovering adm_prju user credentials
Compromising FRAJMP Host
Privilege escalation to root
Obtaining the NT Hash FRAJMP computer account
Compromising Domain Controller (Heron.vl)

Abusing RBCD to compromise domain controller
Requesting TGT using S4U for MUCDC$
Performing DCSync Attack
Last updated