A detailed walkthrough of the Proving Grounds Practice 'Nagoya' box, a hard-rated Windows Active Directory machine. The process covers NMAP scanning, username enumeration from a website, password spraying via CrackMapExec, SMB share enumeration to find a ResetPassword.exe binary analyzed with Ghidra, Kerberoasting to obtain service account hashes, cracking them with hashcat, abusing helpdesk privileges to reset a user password for WinRM access, tunneling with Chisel to reach internal MSSQL, forging a silver ticket with impacket-ticketer, enabling xp_cmdshell, deploying a reverse shell via msfvenom, and finally exploiting SeImpersonatePrivilege with PrintSpoofer to achieve Administrator access.

9m read timeFrom infosecwriteups.com
Post cover image

Sort: