
HTB Box - Escape (Windows) Writeup
Escape is a Windows Machine. I utilise techniques such as MSSQL Relay Attack, plain-text credential search, misconfigured Active Directory Certificate Services exploit and pass-the-hash attack to gain root to this system. Initial Foothold The standard nmap scan reveals that this is another Domain Controller of an Active Directory. My methodology leads me to check the SMB network share. I quickly found that there is a folder named Public that contains a manual for the MSSQL server on the machine. ...