๐Ÿ•Fluffy

https://app.hackthebox.com/machines/662

Machine Information

As is common in real life Windows pentests, you will start the Fluffy box with credentials for the following account: j.fleischman / J0elTHEM4n1990!

Recon

Using crackmap to check smb

We can access some shares

User/Root

Checking these vulns we getting a hash using this CVE

And cracking the hash

Checking with bloodhound this user

ADCS + Shadow Credentials + Certificate Abuse chain starting with adding agila to the service accounts

Adding malicious KeyCredential to victim using GenericWrite

Authenticating as victim using certificate, setting UPN to administrator@domain(Spoofing) and requesting certificate with UPN=administrator(ESC1)

Now we can get the user-flag at winrm_svc, which could have been taken before when we were adding the svc.

Last updated