Official EscapeTwo Discussion

Changing passwords should not be done unless there is no other way. It is not good practice, practically speaking. In the real world, it might cause unintended lose of privileges.

If you look at bloodhound, you will find another means of owning the target account.

Privesc was not as intuitive as i though by looking at bloodhound, but thanks to some hints I got it to work. Foothold was pretty straight forward. DM if you need a nudge

Still stuck on the user flag. i have two kerberoastable but can not crack it. i also have access to the db and i am able to execute commands with xp_cmdshell but i can’t find anything interesting.

hehe yes that can happen

Any hints to move on after getting stuck in mssql? Unable to execute command with no xp_cmdshell privilege

Can anybody give me a hand with “- CERTSRV_E_SUBJECT_DNS_REQUIRED” I’ve tried setting the DNS and alternate DNS but cant get passed it.

A clean up script is running every 3 Minutes an set the pw back!!!

-dns worked for me

1 Like

maybe -ns IP and key-size 4096 will help

Pwned! Thank for all the help!

3 Likes

I’m still stuck, can I DM someone for a nudge? I found the s**_*** passwd but don’t know what to do from there

Same error, any hints?

i found 2 hashes for the two service users sql_* and ca_* , but don’t know what to do next. Any hints ?

I have found the accounts creds but i don’t know what to do next. any hint will be good for me.

I’m having issues, not sure if its a bug but when trying to login in with sql creds I get: “Switching to TLS
Unable to login because its an untrusted domain” any ideas? my nmap scan outputted a few rsa certs…wondering if it had something to do with that?

nvm solved it

Wow, I completely missed that… Thank you so much :joy:
I feel like HTB should have written that part in like font size 60 flashing red text

4 Likes

This was a fun box and very fustrating at times, but here are a few hints to help people:

User:

  • Remember to check the machine description for the default credentials
  • Enumerate everything. If you struggling to open a certain file, trying unzipping it and reading the contents of these files and it may reveal what you’re looking for
  • Accessing a certain service might not work with one method, but another method may prove useful
  • Configuration files are your friend
  • You can never go wrong with password spraying

Root:

  • As this is an AD enviornment, there is a particular user who we want to own once inital access has been established who may issue certificates. Make sure to run Bloodhound against the target, identify this user and abuse the recommended commands
  • Certipy is your friend
  • You may require the -dns [Target IP] and -dc-ip [Target IP] on your flags for one of the final commands

Feel free to drop me a message if you would like any further pointers :slight_smile: Make sure to include what you’ve found out already!

14 Likes

same problem, i tried the -dns param, but useless

Try using both -dns and -dc-ip flags!