Lustrous (Chain)
This is not a writeup, just my notes about the machine.
Machine information

Credentials
Username
Password
Method
Scope
Information Gathering
Service Enumeration
10.10.205.53
FTP
DNS
SMB (enum4linux-ng)
HTTP:80

Kerberos
Compromising LUSMS
Initial foothold on LUSMS
Discovering Users within FTP Service
Discovering users via kerberos user enumeraiton
Cracking the ben.cox password using hashcat
Discovering kerberoastable users using the valid credentials
Cracking ticket grating service for svc_web
Privilege Escalation to Administrator
Retrieving the administrator credentials
Authenticating as Administrator in LUSMS
Compromising Domain Controller (lustrous.vl)
Authenticating into lusdc.lustrous.vl website with valid credentials

Discovering a high valuable target using Bloodhound

Crafting silver ticket for tony.ward using mimikatz.exe
Requesting to the web application and discovering tony.ward credentials
Abusing Backup operator to compromise domain controller
Dumping Registry Hives using BackupOperatorToDA
Dumping the Local Security Authority
Performing DCSync Attack
Authenticating as Administrator
Privilege escalation from Administrator to NT Autority System

Last updated