πSkills Assessment Part II - Advanced Professional Methodology
π HTB Academy: Advanced Assessment with Superior Pivoting
π Overview
π Professional Pivoting Setup - The Game Changer
π SSH Dynamic Port Forwarding (SUPERIOR METHOD)
# Connect to jump box with SOCKS proxy:
ssh htb-student@TARGET_IP -D 9050
# Configure proxychains:
sudo nano /etc/proxychains4.conf
# Add: socks5 127.0.0.1 9050
# Now ALL tools work through proxy seamlessly:
proxychains impacket-wmiexec user:pass@internal_ip
proxychains xfreerdp /v:internal_ip /u:user /p:pass
proxychains crackmapexec smb internal_networkπ‘ Why This Method is SUPERIOR:
β
SSH -D + Proxychains Advantages:
β Meterpreter Pivoting Disadvantages:
π« Question 1: LLMNR Poisoning
π― Task: "Obtain a password hash for a domain user account that can be leveraged to gain a foothold in the domain. What is the account name?"
π Solution Steps:
Step 1: Connect to Jump Box
Step 2: Run Responder for LLMNR Poisoning
π Question 2: Hash Cracking
π― Task: "What is this user's cleartext password?"
π Solution Steps:
Step 1: Extract and Format Hash
Step 2: Crack with Hashcat
π Question 3: Initial Pivot Access
π― Task: "Submit the contents of the C:\flag.txt file on MS01."
π Solution Steps:
Step 1: Network Discovery
Step 2: Setup Superior Pivoting Infrastructure
Step 3: RDP Through Proxy
Step 4: Retrieve Flag
π€ Question 4: Advanced User Enumeration
π― Task: "Use a common method to obtain weak credentials for another user. Submit the username for the user whose credentials you obtain."
π Solution Steps:
Step 1: BloodHound Domain Survey
Step 2: Download Tools to Jump Box
Step 3: User List Generation (In RDP)
Step 4: Password Spraying
π Question 5: Password Discovery
π― Task: "What is this user's password?"
π Question 6: Configuration File Hunting
π― Task: "Locate a configuration file containing an MSSQL connection string. What is the password for the user listed in this file?"
π Solution Steps:
Step 1: Download Snaffler
Step 2: Run as BR086 User
Step 3: Extract SQL Credentials
ποΈ Question 7: SQL Server Exploitation
π― Task: "Submit the contents of the flag.txt file on the Administrator Desktop on the SQL01 host."
π Solution Steps:
Step 1: SQL Server Access
Step 2: Enable Command Execution
Step 3: Privilege Escalation with PrintSpoofer
Step 4: Retrieve Flag
π Question 8: Advanced Lateral Movement
π― Task: "Submit the contents of the flag.txt file on the Administrator Desktop on the MS01 host."
π Solution Steps:
Step 1: Meterpreter Setup (Alternative Method)
Step 2: Execute via PrintSpoofer
Step 3: Credential Extraction
Step 4: Alternative with CrackMapExec (SUPERIOR!)
Step 5: Access MS01
πΈοΈ Question 9: Advanced Poisoning
π― Task: "Obtain credentials for a user who has GenericAll rights over the Domain Admins group. What's this user's account name?"
π Solution Steps:
Step 1: Setup Inveigh Poisoning
Step 2: Execute Poisoning Campaign
π Question 10: Advanced Hash Cracking
π― Task: "Crack this user's password hash and submit the cleartext password as your answer."
π Solution Steps:
π Question 11: Domain Compromise
π― Task: "Submit the contents of the flag.txt file on the Administrator desktop on the DC01 host."
π Solution Steps:
Step 1: Access as CT059
Step 2: Abuse GenericAll Rights
Step 3: Domain Controller Access
π Question 12: DCSync Attack
π― Task: "Submit the NTLM hash for the KRBTGT account for the target domain after achieving domain compromise."
π Solution Steps:
π οΈ Professional Methodology Comparison
π₯ Superior Approach: SSH -D + Proxychains
Setup:
Usage:
π§ Why CrackMapExec + Impacket > Meterpreter
β
CrackMapExec/Impacket Advantages:
β
Specific Tool Benefits:
π― Professional Skills Demonstrated
π Advanced Techniques:
π§ Methodology Excellence:
π‘ Key Insights & Best Practices
π― Pivoting Revolution:
π₯ Professional Advantages:
π‘οΈ Detection Evasion:
Last updated