A detailed walkthrough of the HackTheBox 'Eighteen' machine running Windows Server 2025. Starting with MSSQL credentials, the attack chain involves MSSQL login impersonation to access a financial planner database, recovering and cracking a Werkzeug PBKDF2 hash, password spraying domain users to get a WinRM shell, and finally exploiting 'Bad Successor' (CVE-2025-53779) — a Windows Server 2025 vulnerability abusing the dMSA migration feature to inherit Administrator group memberships and achieve full domain admin access.

31m read timeFrom 0xdf.gitlab.io
Post cover image
Table of contents
Box InfoReconShell as adam.scottShell as rootBeyond Root

Sort: