A detailed walkthrough of the HackTheBox machine DarkZero, a Windows assume-breach scenario involving two Active Directory forests connected by a bidirectional cross-forest trust. Starting with provided credentials, the path involves enumerating MSSQL on DC01, discovering a linked server to DC02 in the other forest where the mapped account has sysadmin privileges, enabling xp_cmdshell to get a shell as the SQL service account. Four privilege escalation paths to SYSTEM on DC02 are demonstrated: named pipe impersonation to recover SeImpersonatePrivilege, ADCS certificate enrollment with RunAsCS, NTLM reflection via CMTI DNS record trick, and CVE-2024-30088. Finally, cross-forest TGT delegation abuse is used to capture DC01's machine account TGT and dump all domain hashes.

56m read timeFrom 0xdf.gitlab.io
Post cover image
Table of contents
Box InfoReconShell as darkzero-ext\svc_sql on DC02Shell as system on DC02Shell as Administrator on DC01

Sort: