HackTheBox – Signed Walkthrough | NTLM Relay, Silver Ticket Attack, MSSQL Exploitation
Автор: Strikoder
Загружено: 2026-02-07
Просмотров: 74
Описание:
In this HackTheBox machine, we perform an NTLM relay attack using Responder and NetExec to coerce authentication via MSSQL, crack captured NTLMv2 hashes, enumerate MSSQL impersonation privileges, craft a Kerberos Silver Ticket by converting passwords to NTLM hashes and extracting domain SIDs, then leverage OPENROWSET to read flags and sensitive files as SYSTEM. If you're learning Active Directory attacks, OSCP, or just love seeing machines get popped... this one's for you.
📂 Scripts and Commands:
https://github.com/strikoder/CTFS/blo...
🏠 Room Link:
https://www.hackthebox.com/machines/s...
--------
⏱️ Timestamps:
00:00 - Intro & Target Overview
01:06 - Enumeration & MSSQL Discovery
08:50 - Coercing Authentication with NetExec
10:06 - Cracking NTLMv2 Hash with Hashcat
17:04 - Converting Password to NTLM Hash & Extracting Domain SID from MSSQL
29:30 - Crafting Silver Ticket with Ticketer
33:42 - Reading Flags via OPENROWSET
--------
Follow me for more real-world hacking walkthroughs, live streams, and cert prep content 👇
💻 Labs
GitHub: https://github.com/strikoder
🎥 Streams & Short Content
Twitch: / strikoder
Instagram: / strikoder
TikTok: / strikoder
💬 Community & Discussions
Discord Server: / discord
X (Twitter): https://x.com/Strikoder
📨 Official Contact
LinkedIn: / strikoder
Email: [email protected]
More videos coming soon on PNPT, and OSCP prep.
Stay tuned, and thanks for the support!
#signed #oscp #pt1 #hackthebox #tryhackme #portswigger #portswiggeracademy #activedirectory #linux #windows
#ethicalhacking #cybersecurity #pentesting #ctf #infosec #enumeration #privilegeescalation #windowshacking #networksecurity #bugbounty #RedTeam #capturetheflag #hackingtools #cyberseclabs #hackermindset #Nmap #terminal #mssql #silverticket #kerberos #ntlmrelay #activedirectoryattacks #strikoder
Повторяем попытку...
Доступные форматы для скачивания:
Скачать видео
-
Информация по загрузке: