A Windows domain controller penetration test walkthrough demonstrating multiple attack techniques. Starting with guest SMB access, NTLM theft lure files are dropped to capture a NetNTLMv2 hash for a domain user. After cracking the hash, BloodHound reveals a Kerberoastable MSSQL service account whose hash is also cracked. Both
Sort: