Sendai
This is not a writeup, just my notes about the machine.

Credentials
Username
Password
Method
Scope
Information Gathering
Service enumeration
DNS
SMB (enum4linux-ng)
HTTP

Exploitation
Users with STATUS_PASSWORD_MUST_CHANGE
Changing the Users password
Path 1: Foothold via DACL

Path 2: Foothold via DNS Poisoning
Checkig the MachineAccountQuota
Creating a fake computer
Adding a malicious DNS
Capturing the NTLMv2 hash
Cracking the NTLMv2 hash
Post Exploitation
Path 1: Domain Compromise via MSSQL
Creating the tunnel
Finding sqlsvs plain text credentials credentials
Obtaining SID domain account
Retrieving nt hash through plaintext password
Crafting silver ticket
Connecting and enable xp_cmdshell
Abusing seImpersonatePrivilege to compromise domain

Path 2: Domain Compromise via ADCS
Finding clifford.davey plaintext credentials
Attacking ESC4 Misconfiguration (Automatic)
Retrieving Adminsitrator's certificate
Retrieving Administrator's NT hash
Requesting an Ticket Granting Ticket to kerberos authentication
Performing DCSync Attack agains domain controller.
Last updated