πBaby
Easy machine
Enumeration
Nmap

Ldapsearch

Domain = baby.vl
I have now a lot of results that can be useful to analyse
About users (& a password inside the description of an user β οΈ):
SMB
Access denied in guest
We will try with our new creds: Teresa.Bell:**********
RPC
Try to enum domain users but Iβm getting an access denied
Trying also with my new creds but not successful
Kerbrute
After trying a password spraying through all the users, I found the real creds:

Compromised user = Caroline.Robinson@baby.vl:**********
Crackmapexec
We need to change the password to connect to this user
We can use smbpasswd
We have now: Caroline.Robinson':'Makito123!'
Domain Enumeration
Doing some domain enumeration with Bloodhound & PowerShell


We can confirm that the user Caroline.Robinson can backup files and so, we can gat the SAM & SYSTEM files to possibly crack or pass the Admin hash
Hashes
But we can do nothing with the Admin hash because itβs a local admin so we canβt use this account to connect to the DC
We need also this ntds.dit
After following the blog, I can login with the hash with Evil-WinRM and get the root flag
PWNED π
Last updated

