Trusted (Chain)

This is not a writeup, just my notes about the machine.

Machine information

Operating System: Windows

Chain: True (2 Machines)

Credentials

Username
Password
Method
Scope

root

SuperSecureMySQLPassw0rd1337.

Exfiltration file

Internal Database on 10.10.222.118

✅ Valid Usernames

🔑 Passwords list

Information Gathering

10.10.222.117

10.10.222.118

Service enumeration

10.10.90.117

SMB (enum4linux-ng)

  • LDAP/s: timed out

  • SMB: time out

DNS

  • Not vulnerable to AXFR

10.10.90.118

SMB (enum4linux-ng)

  • LDAP/s: timed out

  • SMB: time out

DNS

  • Not vulnerable to AXFR

HTTP

Initial Foothold

Discovering File Path Traversal

Path: http://10.10.222.118/dev/index.html?view=../../../../../../../../../../../../../../xampp/apache/logs/access.log

Poisoning the User-Agent header.

Poison the logs

Verifying the Success of the attack

Exploiting to obtain a reverse shell.

Compromise parent domain

During the enumeration the tester discovered that the domains has a Bidirectional Trust.

Automatic ExtraSids Attack

Manual ExtraSids Attack

Extracting krbtgt's NTLM

Extracting Current Domain SID

Extracting Enterprise Admins SID Group

Crafting Golden Ticket

Performing DCSync Attack against trusted.vl

Privilege escalation on labdc via DLL Hijacking

During enumeration, the tester found a custom binary named KasperskyRemovalTool.exe in C:\AVTest. Upon analysis, it was discovered that when the binary is executed, it attempts to load KasperskyRemovalToolENU.dll from the current directory. Since the DLL is not present, this behavior leads to a DLL hijacking opportunity.

To exploit this vulnerability:

  1. Create a malicious DLL

  2. Transfer the DLL to C:\AVTest

  3. Execute the binary

Last updated