Sweep
This is not a writeup, just my notes about the machine.

Credentials
Username
Password
Method
Scope
Information Gathering
Service enumeration
DNS
SMB (enum4linux-ng)
LDAP
Username as password bruteforce
Bloodhound enumeration
Possible users with privilege escalation
HTTP

Exploitation
Capturing SSH credentials
Discovering SSH credentials stored in lansweeper

Mapping the SSH credentials to the Scan

Setting up a Fake SSH service.
Abusing the DACL to obtain Remote Access

Domain Compromise
Adding a new Map Credentials

Creating a new package deployment to obtain reverse shell.


Last updated