Exploitation
Last updated
Last updated
Upon initial access as the user s.smith, we are part of a group that has Audit Share
Evil-WinRM PS C:\shares\audit\Db> net localgroup "Audit Share" Alias name Audit Share Comment \Casc-DC1\Audit$
Members
s.smith The command completed successfully.
The group has access to a share named audit.
The share contained .NET Binaries and a database file that could be accessed with sqlite3
I did not know how to reverse these so I had to a write up for this part.
https://0xdf.gitlab.io/2020/07/25/htb-cascade.html#privesc-arksvc--administrator
That writeup explained everything well.
We got access to the user arksvc which then was part of the AD Recycle bin group which allowed us to retrieve the password of the TempAdmin the IT dept email was talking about.