no one likes to be told to enumerate more, but frankly being told to look harder is a big hint in itself.
if you have a shell from xp_cmdshell then yeah sorry you just have to keep looking. the domain name of the network should clue you in as to what application’s files you should be combing through.
There is no rabbit-hole. Look at perms Ryan has. Once you find what Ryan has control over, you will know what to exploit. Look into the things name, what it means…winPEAS will not help you at all for privesc.
That’s been a few steps ago, but I grant you it is a useful hint. Right now it’s ryan that’s getting on my nerves, I know theoretically what I need to do with him, but I’m overwhelmed by the how.
Any hints to get the initial foothold? I am new to AD testing and smb does not seem to be the way in like it usually is with easy windows machines. i was able to enumerate some users with kerbrute but i do not know what to do next.
not sure, I have only done a couple of ADCS machines, and I’m not very good with this. I could very well be missing a few things here. Still have to go through the Academy module.
theres a cleanup script that removes permissions and resets pws, even if you set a specific one. Also if you pick a easy pw like password123* on a account with spn set you open up the unintended route of someone else being able to kerberoast that account and accidentally bypassing 60% of the box, thinking this is the intended way.