Difficulty: Hard
Target IP: 10.10.11.89
Attack Vector: MSSQL Linked Server Exploitation → Internal Network Pivoting → Kerberos Credential Theft

🎯 Overview
DarkZero presents a sophisticated Active Directory environment with two separate domains connected via trust relationships. The attack chain involves exploiting MSSQL linked server misconfigurations, pivoting into an internal network using Ligolo-ng, escalating privileges through a kernel exploit, and finally capturing Kerberos tickets to compromise the domain controller.

What makes this machine unique?

  • Multihomed architecture with split-horizon DNS

  • Cross-domain trust exploitation

  • Modern pivoting techniques with Ligolo-ng

  • Real-world Kerberos ticket theft scenario

📡 Phase 1: Reconnaissance - Mapping the Attack Surface

Initial Port Scan

Let's start by discovering what services are running:

nmap -p 1-65535 -T4 -A -v 10.10.11.89

🔍 What are we looking for?

  • Active Directory services (LDAP, Kerberos, DNS)

  • Database services (potential entry points)

  • Remote access services (WinRM, RDP)

Key Discoveries:

Port

Service

Why It Matters

1433

MS-SQL Server

Entry point for command execution

88

Kerberos

Domain authentication - ticket capture opportunity

389/636

LDAP/LDAPS

Active Directory queries

5985

WinRM

Remote shell access (if we get creds)

445

SMB

File sharing, potential relay attacks

💡 Learning Moment: Notice port 1433 (MSSQL)? This is often overlooked but can be a goldmine. SQL servers frequently have elevated privileges and interesting configurations like linked servers.

Subscribe to keep reading

This content is free, but you must be subscribed to Andrés to continue reading.

Already a subscriber?Sign in.Not now

Keep Reading


No posts found