πŸš€Skills Assessment Part II - Advanced Professional Methodology

πŸ† HTB Academy: Advanced Assessment with Superior Pivoting

πŸ“ Overview

Skills Assessment Part II demonstrates advanced Active Directory penetration testing using SUPERIOR pivoting methodology with SSH dynamic port forwarding and proxychains. This approach is significantly simpler and more reliable than complex Meterpreter pivoting while providing professional-grade results.

🎯 Assessment Scope: 12 progressive questions covering LLMNR poisoning, credential hunting, SQL exploitation, privilege escalation, and domain compromise.

πŸ”₯ Key Innovation: Using ssh -D 9050 + proxychains instead of Meterpreter SOCKS proxy for seamless pivoting.


🌐 Professional Pivoting Setup - The Game Changer

πŸš€ SSH Dynamic Port Forwarding (SUPERIOR METHOD)

# Connect to jump box with SOCKS proxy:
ssh htb-student@TARGET_IP -D 9050

# Configure proxychains:
sudo nano /etc/proxychains4.conf
# Add: socks5 127.0.0.1 9050

# Now ALL tools work through proxy seamlessly:
proxychains impacket-wmiexec user:pass@internal_ip
proxychains xfreerdp /v:internal_ip /u:user /p:pass
proxychains crackmapexec smb internal_network

πŸ’‘ Why This Method is SUPERIOR:

βœ… SSH -D + Proxychains Advantages:

  • One simple command - no complex Meterpreter setup

  • Automatic tool compatibility - works with impacket, crackmapexec, xfreerdp

  • Stable connections - SSH is more reliable than Meterpreter sessions

  • Professional standard - real pentesting methodology

  • No port conflicts - single SOCKS proxy handles everything

  • Easy troubleshooting - simple SSH connection management

❌ Meterpreter Pivoting Disadvantages:

  • Complex multi-step setup (autoroute + socks_proxy)

  • Tool compatibility issues (CrackMapExec parsing problems)

  • Session instability and frequent drops

  • Port conflict management

  • Multiple background jobs to maintain


🎫 Question 1: LLMNR Poisoning

🎯 Task: "Obtain a password hash for a domain user account that can be leveraged to gain a foothold in the domain. What is the account name?"

πŸ“‹ Solution Steps:

Step 1: Connect to Jump Box

Step 2: Run Responder for LLMNR Poisoning

🎯 Answer: AB920


πŸ”‘ Question 2: Hash Cracking

🎯 Task: "What is this user's cleartext password?"

πŸ“‹ Solution Steps:

Step 1: Extract and Format Hash

Step 2: Crack with Hashcat

🎯 Answer: weasal


🌐 Question 3: Initial Pivot Access

🎯 Task: "Submit the contents of the C:\flag.txt file on MS01."

πŸ“‹ Solution Steps:

Step 1: Network Discovery

Step 2: Setup Superior Pivoting Infrastructure

Step 3: RDP Through Proxy

Step 4: Retrieve Flag

🎯 Answer: Contents of flag.txt


πŸ‘€ Question 4: Advanced User Enumeration

🎯 Task: "Use a common method to obtain weak credentials for another user. Submit the username for the user whose credentials you obtain."

πŸ“‹ Solution Steps:

Step 1: BloodHound Domain Survey

Step 2: Download Tools to Jump Box

Step 3: User List Generation (In RDP)

Step 4: Password Spraying

🎯 Answer: BR086


πŸ” Question 5: Password Discovery

🎯 Task: "What is this user's password?"

From Kerbrute output: BR086:Welcome1

🎯 Answer: Welcome1


πŸ“ Question 6: Configuration File Hunting

🎯 Task: "Locate a configuration file containing an MSSQL connection string. What is the password for the user listed in this file?"

πŸ“‹ Solution Steps:

Step 1: Download Snaffler

Step 2: Run as BR086 User

Step 3: Extract SQL Credentials

🎯 Answer: D@ta_bAse_adm1n!


πŸ—„οΈ Question 7: SQL Server Exploitation

🎯 Task: "Submit the contents of the flag.txt file on the Administrator Desktop on the SQL01 host."

πŸ“‹ Solution Steps:

Step 1: SQL Server Access

Step 2: Enable Command Execution

Step 3: Privilege Escalation with PrintSpoofer

Step 4: Retrieve Flag

🎯 Answer: s3imp3rs0nate_cl@ssic


πŸ”„ Question 8: Advanced Lateral Movement

🎯 Task: "Submit the contents of the flag.txt file on the Administrator Desktop on the MS01 host."

πŸ“‹ Solution Steps:

Step 1: Meterpreter Setup (Alternative Method)

Step 2: Execute via PrintSpoofer

Step 3: Credential Extraction

Step 4: Alternative with CrackMapExec (SUPERIOR!)

Step 5: Access MS01

🎯 Answer: eexc3ss1ve_adm1n_r1ights!


πŸ•ΈοΈ Question 9: Advanced Poisoning

🎯 Task: "Obtain credentials for a user who has GenericAll rights over the Domain Admins group. What's this user's account name?"

πŸ“‹ Solution Steps:

Step 1: Setup Inveigh Poisoning

Step 2: Execute Poisoning Campaign

🎯 Answer: CT059


πŸ”“ Question 10: Advanced Hash Cracking

🎯 Task: "Crack this user's password hash and submit the cleartext password as your answer."

πŸ“‹ Solution Steps:

🎯 Answer: charlie1


πŸ‘‘ Question 11: Domain Compromise

🎯 Task: "Submit the contents of the flag.txt file on the Administrator desktop on the DC01 host."

πŸ“‹ Solution Steps:

Step 1: Access as CT059

Step 2: Abuse GenericAll Rights

Step 3: Domain Controller Access

🎯 Answer: acLs_f0r_th3_w1n!


πŸ† Question 12: DCSync Attack

🎯 Task: "Submit the NTLM hash for the KRBTGT account for the target domain after achieving domain compromise."

πŸ“‹ Solution Steps:

🎯 Answer: 7eba70412d81c1cd030d72a3e8dbe05f


πŸ› οΈ Professional Methodology Comparison

πŸ”₯ Superior Approach: SSH -D + Proxychains

Setup:

Usage:

πŸ”§ Why CrackMapExec + Impacket > Meterpreter

βœ… CrackMapExec/Impacket Advantages:

  • Native SMB/RPC protocols - better compatibility

  • Built-in credential extraction - no separate tools needed

  • Proxy-friendly - works flawlessly with proxychains

  • Professional standard - real-world pentesting tools

  • Comprehensive coverage - all AD attack vectors

  • Reliable output - consistent results

βœ… Specific Tool Benefits:

CrackMapExec:

Impacket Suite:


🎯 Professional Skills Demonstrated

πŸ† Advanced Techniques:

  • LLMNR/NBT-NS Poisoning - Passive credential harvesting

  • Password Spraying - Systematic weak credential discovery

  • File Hunting - Sensitive data discovery with Snaffler

  • SQL Server Exploitation - Database server compromise

  • Privilege Escalation - PrintSpoofer SeImpersonatePrivilege abuse

  • Credential Extraction - Memory-based credential harvesting

  • ACL Abuse - GenericAll rights exploitation

  • DCSync Attacks - Domain replication abuse

  • Lateral Movement - Multi-host compromise chain

πŸ”§ Methodology Excellence:

  • Superior Pivoting - SSH dynamic forwarding vs Meterpreter

  • Tool Integration - Seamless proxychains compatibility

  • Professional Workflow - Real-world pentesting approach

  • Troubleshooting - Stable connection management

  • Efficiency - Streamlined attack execution


πŸ’‘ Key Insights & Best Practices

🎯 Pivoting Revolution:

πŸ”₯ Professional Advantages:

  1. Simplicity - One command vs multi-step setup

  2. Reliability - SSH stability vs Meterpreter sessions

  3. Compatibility - Universal tool support

  4. Troubleshooting - Easy connection management

  5. Speed - Immediate productivity

  6. Professional - Real-world methodology

πŸ›‘οΈ Detection Evasion:

  • SSH tunnels appear as normal administrative traffic

  • Native tools blend with legitimate AD activity

  • Credential extraction using built-in protocols

  • Minimal footprint compared to Meterpreter

πŸ† This Skills Assessment demonstrates the evolution from complex exploitation frameworks to streamlined professional methodology - SSH dynamic port forwarding + proxychains + native AD tools = the ultimate pentesting approach!


Last updated