DarkZero

Machine info

Assumed breach scenario:

usernam:john.w

password:RFulUtONCOL!

Scanning

SMB

MSSQL

Connect to MSSQL using provided credentials:

User sa is disabled:

After running BloodHound and analyzed data collected, we can see that there is a Domain Trust with DarkZero.ext:

Running the following commands we can confirm command execution on linked server DC01.darkzero.ext:

Privilege Escalation (DARKZERO.EXT\svc_sql)

To obtain the reverse shell generate the payload:

and execute the generated payload inside MSSQL shell:

obtained meterpreter shell -> Powershell on DC02 as svc_sql:

Privilege Escalation

Upload WinPeas on DC02 using meterpreter session:

Last updated