Hathor
Doing Sekhmet before this is super helpful, but still it is super hard. There are multiple different users we get shells as, and this writeup will divide them as follows instead of the usual.
Windcorp\web Shell
$ nmap -p- --min-rate 5000 10.129.71.218
Starting Nmap 7.93 ( https://nmap.org ) at 2023-05-11 11:28 EDT
Nmap scan report for 10.129.71.218
Host is up (0.0070s latency).
Not shown: 65516 filtered tcp ports (no-response)
PORT STATE SERVICE
53/tcp open domain
80/tcp open http
88/tcp open kerberos-sec
135/tcp open msrpc
139/tcp open netbios-ssn
389/tcp open ldap
445/tcp open microsoft-ds
464/tcp open kpasswd5
593/tcp open http-rpc-epmap
636/tcp open ldapssl
3268/tcp open globalcatLDAP
3269/tcp open globalcatLDAPssl
5985/tcp open wsman
9389/tcp open adws
49664/tcp open unknown
49668/tcp open unknown
49674/tcp open unknown
49696/tcp open unknown
49701/tcp open unknownWeb Enum -> Default Creds




Admin Panel -> Move RCE








Firewall + AppLocker Enum



GinaWild Shell
Bad Passwords -> User Creds

NTLM Ban -> Beatrice Ticket
SMB Enumeration -> DLL Hijack

Bpassrunner Shell
Recycle Bin -> PFX Crack
Script Hijack -> Shell



Root Shell
Get-ADReplAccount -> Hashes
Kerberos Ticket -> Shell

Last updated