Sidecar (Chain)
This is not a writeup, just my notes about the machine.

Credentials
Username
Password
Method
Scope
Information Gathering
Service Enumeration
10.10.220.53
DNS
SMB (Enum4linux-ng)
10.10.220.54
SMB (Enum4linux-ng)
Compromising WS01
Discovering a share folder with excessive permission
Initial foothold on WS01
Bypassing Windows Defender using DSViper
Creating shellcode using msfvenom
Using DSViper to create final payload
Creating malicious Lnk files
Upload malicious files and obtaing a reverse shell on WS01

Compromising WS01 as Administrator
Enumerating Security Protections on WS01
Obtaining reverse shell using sliver
Turning On WebDav
NTLM Relay attack via WebDav + Shadows Credentials
1. Bypassing AMSI
2. Evaluating the environment to choise the attack path
3. Starting Responder to generate a valid NetBIOS
Addinjg a Malicious DNS
Running ntlmrelayx to redirect the authentication
Coercing the authentication against domain controller
Requesting a Kerberos TGT Using Certificate-Based Authentication (PKINIT)
Retrieving NT hash WS01$ computer account
Obtaining Domain Controller SID
Crafting Silver ticket for Local Administrator via S4U
Dumping local SAM Hashes LSA Secrets on WS01
Obtaining a shell as Administrator

Compromising domain controller
Initial Foothold on DC01
Discovering a valid user domain

Cracking svc_deploy's NTLM hash
Compromise Domain controler via SeTcbPrivilege
Discovering SeTcbPrivilege token privilege enabled
Abusing of SeTcbPrivilege via TcbElevation

Last updated