πSkills Assessment Part II - Advanced Professional Methodology
π HTB Academy: Advanced Assessment with Superior Pivoting
π Overview
Skills Assessment Part II demonstrates advanced Active Directory penetration testing using SUPERIOR pivoting methodology with SSH dynamic port forwarding and proxychains. This approach is significantly simpler and more reliable than complex Meterpreter pivoting while providing professional-grade results.
π― Assessment Scope: 12 progressive questions covering LLMNR poisoning, credential hunting, SQL exploitation, privilege escalation, and domain compromise.
π₯ Key Innovation: Using ssh -D 9050 + proxychains instead of Meterpreter SOCKS proxy for seamless pivoting.
π Professional Pivoting Setup - The Game Changer
π SSH Dynamic Port Forwarding (SUPERIOR METHOD)
# Connect to jump box with SOCKS proxy:
ssh htb-student@TARGET_IP -D 9050
# Configure proxychains:
sudo nano /etc/proxychains4.conf
# Add: socks5 127.0.0.1 9050
# Now ALL tools work through proxy seamlessly:
proxychains impacket-wmiexec user:pass@internal_ip
proxychains xfreerdp /v:internal_ip /u:user /p:pass
proxychains crackmapexec smb internal_networkπ‘ Why This Method is SUPERIOR:
β
SSH -D + Proxychains Advantages:
One simple command - no complex Meterpreter setup
Automatic tool compatibility - works with impacket, crackmapexec, xfreerdp
Stable connections - SSH is more reliable than Meterpreter sessions
Professional standard - real pentesting methodology
No port conflicts - single SOCKS proxy handles everything
Easy troubleshooting - simple SSH connection management
β Meterpreter Pivoting Disadvantages:
Complex multi-step setup (autoroute + socks_proxy)
Tool compatibility issues (CrackMapExec parsing problems)
Session instability and frequent drops
Port conflict management
Multiple background jobs to maintain
π« Question 1: LLMNR Poisoning
π― Task: "Obtain a password hash for a domain user account that can be leveraged to gain a foothold in the domain. What is the account name?"
π Solution Steps:
Step 1: Connect to Jump Box
Step 2: Run Responder for LLMNR Poisoning
π― Answer: AB920
π Question 2: Hash Cracking
π― Task: "What is this user's cleartext password?"
π Solution Steps:
Step 1: Extract and Format Hash
Step 2: Crack with Hashcat
π― Answer: weasal
π Question 3: Initial Pivot Access
π― Task: "Submit the contents of the C:\flag.txt file on MS01."
π Solution Steps:
Step 1: Network Discovery
Step 2: Setup Superior Pivoting Infrastructure
Step 3: RDP Through Proxy
Step 4: Retrieve Flag
π― Answer: Contents of flag.txt
π€ Question 4: Advanced User Enumeration
π― Task: "Use a common method to obtain weak credentials for another user. Submit the username for the user whose credentials you obtain."
π Solution Steps:
Step 1: BloodHound Domain Survey
Step 2: Download Tools to Jump Box
Step 3: User List Generation (In RDP)
Step 4: Password Spraying
π― Answer: BR086
π Question 5: Password Discovery
π― Task: "What is this user's password?"
From Kerbrute output: BR086:Welcome1
π― Answer: Welcome1
π Question 6: Configuration File Hunting
π― Task: "Locate a configuration file containing an MSSQL connection string. What is the password for the user listed in this file?"
π Solution Steps:
Step 1: Download Snaffler
Step 2: Run as BR086 User
Step 3: Extract SQL Credentials
π― Answer: D@ta_bAse_adm1n!
ποΈ Question 7: SQL Server Exploitation
π― Task: "Submit the contents of the flag.txt file on the Administrator Desktop on the SQL01 host."
π Solution Steps:
Step 1: SQL Server Access
Step 2: Enable Command Execution
Step 3: Privilege Escalation with PrintSpoofer
Step 4: Retrieve Flag
π― Answer: s3imp3rs0nate_cl@ssic
π Question 8: Advanced Lateral Movement
π― Task: "Submit the contents of the flag.txt file on the Administrator Desktop on the MS01 host."
π Solution Steps:
Step 1: Meterpreter Setup (Alternative Method)
Step 2: Execute via PrintSpoofer
Step 3: Credential Extraction
Step 4: Alternative with CrackMapExec (SUPERIOR!)
Step 5: Access MS01
π― Answer: eexc3ss1ve_adm1n_r1ights!
πΈοΈ Question 9: Advanced Poisoning
π― Task: "Obtain credentials for a user who has GenericAll rights over the Domain Admins group. What's this user's account name?"
π Solution Steps:
Step 1: Setup Inveigh Poisoning
Step 2: Execute Poisoning Campaign
π― Answer: CT059
π Question 10: Advanced Hash Cracking
π― Task: "Crack this user's password hash and submit the cleartext password as your answer."
π Solution Steps:
π― Answer: charlie1
π Question 11: Domain Compromise
π― Task: "Submit the contents of the flag.txt file on the Administrator desktop on the DC01 host."
π Solution Steps:
Step 1: Access as CT059
Step 2: Abuse GenericAll Rights
Step 3: Domain Controller Access
π― Answer: acLs_f0r_th3_w1n!
π Question 12: DCSync Attack
π― Task: "Submit the NTLM hash for the KRBTGT account for the target domain after achieving domain compromise."
π Solution Steps:
π― Answer: 7eba70412d81c1cd030d72a3e8dbe05f
π οΈ Professional Methodology Comparison
π₯ Superior Approach: SSH -D + Proxychains
Setup:
Usage:
π§ Why CrackMapExec + Impacket > Meterpreter
β
CrackMapExec/Impacket Advantages:
Native SMB/RPC protocols - better compatibility
Built-in credential extraction - no separate tools needed
Proxy-friendly - works flawlessly with proxychains
Professional standard - real-world pentesting tools
Comprehensive coverage - all AD attack vectors
Reliable output - consistent results
β
Specific Tool Benefits:
CrackMapExec:
Impacket Suite:
π― Professional Skills Demonstrated
π Advanced Techniques:
LLMNR/NBT-NS Poisoning - Passive credential harvesting
Password Spraying - Systematic weak credential discovery
File Hunting - Sensitive data discovery with Snaffler
SQL Server Exploitation - Database server compromise
Privilege Escalation - PrintSpoofer SeImpersonatePrivilege abuse
Credential Extraction - Memory-based credential harvesting
ACL Abuse - GenericAll rights exploitation
DCSync Attacks - Domain replication abuse
Lateral Movement - Multi-host compromise chain
π§ Methodology Excellence:
Superior Pivoting - SSH dynamic forwarding vs Meterpreter
Tool Integration - Seamless proxychains compatibility
Professional Workflow - Real-world pentesting approach
Troubleshooting - Stable connection management
Efficiency - Streamlined attack execution
π‘ Key Insights & Best Practices
π― Pivoting Revolution:
π₯ Professional Advantages:
Simplicity - One command vs multi-step setup
Reliability - SSH stability vs Meterpreter sessions
Compatibility - Universal tool support
Troubleshooting - Easy connection management
Speed - Immediate productivity
Professional - Real-world methodology
π‘οΈ Detection Evasion:
SSH tunnels appear as normal administrative traffic
Native tools blend with legitimate AD activity
Credential extraction using built-in protocols
Minimal footprint compared to Meterpreter
π This Skills Assessment demonstrates the evolution from complex exploitation frameworks to streamlined professional methodology - SSH dynamic port forwarding + proxychains + native AD tools = the ultimate pentesting approach!
Last updated