πActive Directory Compromise
π― Overview
π BloodHound Attack Path Analysis
π― GenericWrite Privilege Discovery
# mssqladm account analysis:
- GenericWrite over ttimmons user
- SQL service account privileges
- Domain credential access capability
# Attack vector identification:
GenericWrite β Fake SPN creation β Targeted Kerberoasting β Password crackingπ Attack Chain Visualization
# Privilege escalation path:
mssqladm (GenericWrite) β ttimmons (GenericAll) β Server Admins β DCSync
# BloodHound query results:
1. MSSQLADM@INLANEFREIGHT.LOCAL β GenericWrite β TTIMMONS@INLANEFREIGHT.LOCAL
2. TTIMMONS@INLANEFREIGHT.LOCAL β GenericAll β SERVER ADMINS@INLANEFREIGHT.LOCAL
3. SERVER ADMINS@INLANEFREIGHT.LOCAL β GetChanges/GetChangesAll β INLANEFREIGHT.LOCALπ« Targeted Kerberoasting Attack
π§ Fake SPN Creation
π― TGS Ticket Extraction
π Password Cracking
πΊ Server Admins Group Escalation
π₯ Group Membership Manipulation
π― DCSync Privileges Inheritance
π DCSync Attack Execution
π NTDS Database Extraction
π Domain Administrator Access
π― Post-Compromise Activities
π Complete Domain Control Validation
π Cleanup and Documentation
π Complete Attack Chain Summary
π External β Domain Admin Path
π Comprehensive Findings Summary
π οΈ Tools & Techniques Mastery
π Reconnaissance Tools
βοΈ Exploitation Techniques
π― HTB Academy Labs
π Final Lab Solutions
π Professional Methodology Demonstrated
π‘οΈ Comprehensive Defensive Recommendations
π Active Directory Hardening
π Network Security
Last updated