The question for the SeImpersonate section ask to logon as “sql_dev” and to escalate privileges using one of the methods shown in this section. Submit the contents of the flag file located at c:\Users\Administrator\Desktop\SeImpersonate\flag.txt.
First, I was not able to RDP using the sql_dev account. I connected with htb-student and ran cmd as sql_dev.
However, the sql_dev user does not have the SeImpersonate nor SeAssignPrimaryToken tokens:
Privilege Name Description State
============================= ============================== ========
SeChangeNotifyPrivilege Bypass traverse checking Enabled
SeIncreaseWorkingSetPrivilege Increase a process working set Disabled
Am I missing something? Can someone please advise?
This is still broken unfortunately - I also cannot RDP in as
sql_dev. The other creds (
htb-student) work fine.
If anybody can post some tips it’d be appreciated
Actually, having spent more time on this - you’re not supposed to RDP into the box, you’re supposed to use mssqlclient from impacket, using Windows auth, then the creds work!
As with many other modules’ content, it’s clear that English wasn’t the native language of whoever wrote the instructions though :D. HTB should really invest in editors at least . You see that as one of the points that consistently come up in Youtube reviews of the platform.
Hi, I’m stuck at this point. I have connected through mssqlclient and it tells me that I correctly create the process listening on port 8443. But then from my terminal, the nc -lnvp 8443 does not connect me. Could you help me please?
When doing reverse shells you’re supposed to start the listener on the machine you’re attacking from first. Then you can trigger the process on the target host.
Exactly, I did it the other way around. Thanks a lot!!!