MENU

Fun & Interesting

HackTheBox - Administrator

IppSec 11,551 4 weeks ago
Video Not Working? Fix It Now

00:00 - Introduction, assumed breach box 00:58 - Start of nmap 03:00 - Checking out what the credentials we are given go to, see WinRM but it doesn't give us much 06:50 - Running python bloodhound as olivia 09:45 - Looking at the json output manually to discover non-default groups 14:50 - Examining Olivia's outbound controls to see there is a chain to Benjamin, who has FTP Access 18:00 - Using Net RPC to change Michael and Benjamin's password 20:00 - Downloading the Password Safe database off the FTP Server, then cracking it 24:20 - Extracting the passwords from the password safe and then spraying to find Emily's is still valid 26:15 - Going back to Bloodhound, discovering Emily has GenericWrite over Ethan, who can DCSync. 28:25 - Running TargetedKerberoast to take advantage over GenericWrite and make Ethan's account kerberoastable and then crack it 30:15 - Running SecretsDump then talking about other flags like PasswordHistory

Comment