A detailed walkthrough of the HackTheBox machine DarkZero, a Windows assume-breach scenario involving two Active Directory forests connected by a bidirectional cross-forest trust. Starting with provided credentials, the path involves enumerating MSSQL on DC01, discovering a linked server to DC02 in the other forest where the mapped account has sysadmin privileges, enabling xp_cmdshell to get a shell as the SQL service account. Four privilege escalation paths to SYSTEM on DC02 are demonstrated: named pipe impersonation to recover SeImpersonatePrivilege, ADCS certificate enrollment with RunAsCS, NTLM reflection via CMTI DNS record trick, and CVE-2024-30088. Finally, cross-forest TGT delegation abuse is used to capture DC01's machine account TGT and dump all domain hashes.
Table of contents
Box InfoReconShell as darkzero-ext\svc_sql on DC02Shell as system on DC02Shell as Administrator on DC01Sort: