Mythical (Chain)
This is not a writeup, just my notes about the machine.

Credentials
Username
Password
Method
Scope
Information Gathering
Nmap Scan
Compromise DC01 Server
Initial Access

Checking the ARP table.
Scanning the internal network
Enumerating Rsync service and retrieving a keepass database
Cracking keepass database

Privilege escalation on DC01 via ESC4
Discovering the user domjoin can use ADSC

Discovering a vulnerable template to ESC4
Creating a computer account
Abusing of template ESC4
Abusing of template ESC1
Request TGT using administrator certificate
Obtain a shell as Administrator using pass the hash.

Compromising DC02
Initial Access
Discovering a Outbound trust relationship
Obtaining the trust hash accounts
Privilege escalation on DC02
Discovering a svc_ldap's plaintext credentials

Abusing Trustworthy Database
Initial foothold on DC02

Privilege escalation on DC02 via SeImpersonatePrivilege

Last updated