THM Post Exploitation Basics - grunt92/IT-Sec-WriteUps GitHub Wiki

Introduction

Deploy the Machine

No answer needed

Enumeration w/ Powerview

What is the shared folder that is not set by default?

Run Invoke-Sharefinder.

Share

What operating system is running inside of the network besides Windows Server 2019?

Run Get-NetComputer -fulldata | select operatingsystem. Windows 10 Enterprise Evaluation

I've hidden a flag inside of the users find it

Run Get-NetUser | select cn

Enumeration w/ Bloodhound

What service is also a domain admin

SQLService

What two users are Kerberoastable?

SQLService,krbtgt

Dumping hashes w/ mimikatz

What is the Machine1 Password?

Password1

What is the Machine2 Hash?

c39f2beb3d2ec06a62cb887fb391dee0

Golden Ticket Attacks w/ mimikatz

I understand how a golden ticket attack works and how to use a golden ticket attack to move through a network

No answer needed

Enumeration w/ Server Manager

What tool allows to view the event logs?

Event Viewer

What is the SQL Service password

MYpassword123#

Maintaining Access

I understand how to install a backdoor on a system using the persistence module

No answer needed

Conclusion

I understand the basics of post-exploitation

No answer needed