πPrivileged Access
π HTB Academy: Active Directory Enumeration & Attacks
π Overview
π Attack Chain Progression
ACL Enumeration β ACL Abuse β DCSync β Privileged Access β Full Infrastructure Control
(Discovery) (Exploit) (Extract) (Lateral Move) (Domain Domination)π§ Privileged Access Concepts
Types of Remote Access Rights
1. WinRM/PSRemote Access
2. RDP Access Rights
3. SQL Server Administrative Access
4. Local Administrator Rights
Why Privileged Access Matters
π©Έ BloodHound for Privileged Access Enumeration
SharpHound Data Collection
Complete Domain Enumeration
SharpHound Collection Methods
BloodHound GUI Analysis
Starting BloodHound
Importing SharpHound Data
Cypher Queries for Privileged Access
WinRM/PSRemote Access Enumeration
RDP Access Rights
Local Administrator Rights
DCOM Execution Rights
All High-Privilege Paths
π» WinRM/PSRemote Exploitation
Understanding WinRM Architecture
WinRM Service Components
WinRM Configuration Requirements
PSRemote Privilege Verification
Using PowerShell Remoting
Using Evil-WinRM (Linux)
Common PSRemote Attack Vectors
1. Credential Spraying
2. Pass-the-Hash via WinRM
3. Golden/Silver Ticket Usage
ποΈ SQL Server Administrative Access
SQL Server Privilege Escalation Overview
SQL Server Roles and Permissions
Common SQL Server Attack Vectors
SQL Server Enumeration and Exploitation
Using Impacket mssqlclient.py
Basic SQL Server Enumeration
Enabling xp_cmdshell
Command Execution via xp_cmdshell
Advanced SQL Server Exploitation
Linked Server Exploitation
SQL Server Agent Jobs
CLR Integration Abuse
π― HTB Academy Lab Solutions
Lab Environment Details
π Question 1: "What other user in the domain has CanPSRemote rights to a host?"
Solution Steps:
π» Question 2: "What host can this user access via WinRM? (just the computer name)"
Solution Steps:
ποΈ Question 3: "Leverage SQLAdmin rights to authenticate to the ACADEMY-EA-DB01 host (172.16.5.150). Submit the contents of the flag at C:\Users\damundsen\Desktop\flag.txt."
Solution Steps:
π HTB Academy Lab Summary
Verified Lab Answers:
Key Lab Techniques:
Attack Chain Demonstrated:
π‘οΈ Detection and Defensive Measures
WinRM/PSRemote Detection
Event Monitoring
PowerShell Logging
SQL Server Security Hardening
xp_cmdshell Disable
SQL Server Monitoring
General Defensive Recommendations
1. Privileged Access Management (PAM)
2. Network Segmentation
3. Monitoring and Detection
4. Regular Security Assessments
π Advanced Privileged Access Techniques
BloodHound Advanced Queries
Complex Attack Path Discovery
Privileged Service Account Discovery
Automated Privilege Escalation
PowerShell Empire Integration
Cobalt Strike Integration
Cross-Platform Attack Chaining
Linux to Windows Pivoting
Multi-Domain Exploitation
π Key Takeaways
Technical Mastery Achieved
Professional Skills Developed
Attack Chain Mastery
Defensive Insights
Last updated