HTB: Tombwatcher

Hack The Box: Tombwatcher

Machine IP: 10.10.11.x OS: Windows Difficulty: Hard

Note: This machine is a placeholder for the "Hard" AD methodology.

1. Reconnaissance

The web application allows SQL queries. We identify Blind SQL Injection.

2. Exploitation

We map the DB schema. We extract the xp_cmdshell capability (often disabled, but if enabled...). We gain RCE as Device\MSSQL.

3. Pivot

We are a service account. We are trapped in a constrained environment. We find connection strings to other servers. We pivot via Chisol or Ligolo-ng to the internal subnet.

4. Domain Compromise

We identify an unpatched Domain Controller. Zerologon (CVE-2020-1472)? Checked. No. We find a misconfigured Certificate Authority. We forge a cert -> Admin.

Conclusion

Databases are often the soft underbelly of a hardened AD environment.