Hybrid (Chain)
This is not a writeup, just my notes about the machine.
Machine information

Credentials
Username
Password
Method
Scope
Information Gathering
Nmap
Initial Enumeration
Enumerating the network file system
Mounting the network file system
Discovering leaked credentials into a files.
RoudCube enumeration
Discovering a vulnerable pluging

Exploitation
Modifying the user's email field to abuse the RCE.

Lateral Movement to peter.turner
Abusing UID Spoofing and NFS Share
Attack Path:
Privilege Escalation to root on mail01
Finding a Keepass database
Abusing the sudoers configuration
Compromising Domain controller
Discovering Domain Computers is vulnerable to ESC1
Extracting the Compromised Computer NT Hash to abuse the ESC1
Abusing the ESC1 to compromise domain controler.
Requesting administrator's Ticket Granting ticket TGT
Obtaining a shell as Administrator on DC01
Last updated
