Retro2
This is not a writeup, just my notes about the machine.
Machine information

Credentials
Username
Password
Method
Scope
Information Gathering
Service enumeration
DNS
SMB (enum4linux-ng)
Initial Enumeration
Discovering a Microsoft Access Database protected with password
Brute-forcing the database hash and obtaining the plain text credentials
Moving the file to my machine and viewered the content
Exploitation
Path: Zerologon
Abusing the zerologon vulnerability
Performing DCSync attack
Obtaining a shell as Administrator
Path: DACLs
Visualizing the attack path

Discovering a pre-Windows 2000 computer account
Changing the default password
Abusing GenericWrite over ADMWS01$
Adding ldapreader user to Remote Desktop Users

Privilege Escalation
RpcEptMapper exploit

Last updated