Reflection (Chain)
This is not a writeup, just my notes about the machine.

Credentials
Username
Password
Method
Scope
Information Gathering
Service enumeration
10.10.241.133
SMB
DNS
10.10.241.134
SMB (enum4linux-ng)
10.10.241.135
SMB
Compromising MS01
Discovering a valid credentials
Connecting to MSSQL and discovering a valid user credentiales
NTLM Relay Attack via socks proxy
Setting up the ntlmrelayx tool to initiate a interactive shell.
Triggering the authentication to perform the relay
Downloading the database production user.
Discovering users credentiales on MSSQL table
Reading LAPS password on MS01

Dumping DPAPI and LSA credentials on MS01
Compromising WS01

Abusing Resource Based Constrained Delegation
Requesting Ticket Granting Ticket via S4U
Authenticating into WS01 as NT Authority System
Dumping SAM and LSA Secrets
Compromising Domain Controller (DC01)

Performing DCSync attack to compromise reflection.vl
Last updated