A Windows penetration test walkthrough starting with MSSQL credentials. The attack path involves coercing NetNTLMv2 authentication from the MSSQL service account using xp_dirtree, cracking the hash, then forging Kerberos silver tickets with elevated group memberships (IT group RID) to gain sysadmin database privileges and

44m read timeFrom 0xdf.gitlab.io
Post cover image
Table of contents
Box InfoReconAuth as mssqlsvcShell as MSSQLMany Escalations

Sort: