A Windows penetration test walkthrough starting with MSSQL credentials. The attack path involves coercing NetNTLMv2 authentication from the MSSQL service account using xp_dirtree, cracking the hash, then forging Kerberos silver tickets with elevated group memberships (IT group RID) to gain sysadmin database privileges and
Sort: