A Windows domain controller penetration test walkthrough demonstrating multiple attack techniques. Starting with guest SMB access, NTLM theft lure files are dropped to capture a NetNTLMv2 hash for a domain user. After cracking the hash, BloodHound reveals a Kerberoastable MSSQL service account whose hash is also cracked. Both

26m read timeFrom 0xdf.gitlab.io
Post cover image
Table of contents
Box InfoReconAuth as Julia.WongAuth as svc_mssqlShell as SYSTEM

Sort: