HackTheBox - Infiltrator
Skills:
Network Security90%
00:00 - Introduction
01:00 - Start of nmap
04:10 - Using grep against a HTML Page to extract usernames, then username anarchy to build a userlist and kerbrute to find valid users
07:50 - Kerbrute automatically will ASREP Roast but outputs in the stronger hash that hashcat doesn't crack. Using downgrade to get the weaker hash
11:10 - Using NXC with our creds to dump a list of users and see a password in the description
13:34 - Using Rusthound stead of the python version of Bloodhound because it gets certificate information too
17:30 - Showing a couple paths in Bloodhound
22:00 - Explaining and performing the attack (dacledit, shadow credential, force password change, bloodyad)
32:50 - Discovering Output Messenger running, using chisel to forward ports
38:15 - Having trouble with the Linux client of Output Messenger, cannot download a file
44:30 - Switching to Windows, using a regular portforward on chisel so our windows box can hit infiltrator
52:30 - Using ilSpy n the dotnet binary and decrypting a static string which is another password
01:00:00 - Discovering the API Key in the notes, and exploring the API to dump chatroom messages
01:12:30 - Setting an event on Olivia's Output Messenger Calendar to send a shell
01:22:48 - Discovering a PCAP in Olivias downloaded files, using wireshark to extract objects which has a picture of a bitlocker key
01:32:40 - Accessing the box over RDP, decrypting the bitlocker drive, and then downloading the backup which is NTDS.DIT
01:40:40 - Using NTDISSECTOR to parse the NTDS.DIT which extracts a lot more data than secretsdump, discovering another password in a description
01:45:45 - Doing AD ESC4 and then AD ESC 1 to get root
Watch on YouTube ↗
(saves to browser)
Sign in to unlock AI tutor explanation · ⚡30
Playlist
Uploads from IppSec · IppSec · 0 of 60
← Previous
Next →
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
HHC2016 - Analytics
IppSec
HackTheBox - October
IppSec
HackTheBox - Arctic
IppSec
HackTheBox - Brainfuck
IppSec
HackTheBox - Bank
IppSec
HackTheBox - Joker
IppSec
HackTheBox - Lazy
IppSec
Camp CTF 2015 - Bitterman
IppSec
HackTheBox - Devel
IppSec
Reversing Malicious Office Document (Macro) Emotet(?)
IppSec
HackTheBox - Granny and Grandpa
IppSec
HackTheBox - Pivoting Update: Granny and Grandpa
IppSec
HackTheBox - Optimum
IppSec
HackTheBox - Charon
IppSec
HackTheBox - Sneaky
IppSec
HackTheBox - Holiday
IppSec
HackTheBox - Europa
IppSec
Introduction to tmux
IppSec
HackTheBox - Blocky
IppSec
HackTheBox - Nineveh
IppSec
HackTheBox - Jail
IppSec
HackTheBox - Blue
IppSec
HackTheBox - Calamity
IppSec
HackTheBox - Shrek
IppSec
HackTheBox - Mirai
IppSec
HackTheBox - Shocker
IppSec
HackTheBox - Mantis
IppSec
HackTheBox - Node
IppSec
HackTheBox - Kotarak
IppSec
HackTheBox - Enterprise
IppSec
HackTheBox - Sense
IppSec
HackTheBox - Minion
IppSec
VulnHub - Sokar
IppSec
VulnHub - Pinkys Palace v2
IppSec
HackTheBox - Inception
IppSec
Vulnhub - Trollcave 1.2
IppSec
HackTheBox - Ariekei
IppSec
HackTheBox - Flux Capacitor
IppSec
HackTheBox - Jeeves
IppSec
HackTheBox - Tally
IppSec
HackTheBox - CrimeStoppers
IppSec
HackTheBox - Fulcrum
IppSec
HackTheBox - Chatterbox
IppSec
HackTheBox - Falafel
IppSec
How To Create Empire Modules
IppSec
HackTheBox - Nightmare
IppSec
HackTheBox - Nightmarev2 - Speed Run/Unintended Solutions
IppSec
HackTheBox - Bart
IppSec
HackTheBox - Aragog
IppSec
HackTheBox - Valentine
IppSec
HackTheBox - Silo
IppSec
HackTheBox - Rabbit
IppSec
HackTheBox - Celestial
IppSec
HackTheBox - Stratosphere
IppSec
HackTheBox - Poison
IppSec
HackTheBox - Canape
IppSec
HackTheBox - Olympus
IppSec
HackTheBox - Sunday
IppSec
HackTheBox - Fighter
IppSec
HackTheBox - Bounty
IppSec
More on: Network Security
View skill →Related AI Lessons
Chapters (18)
Introduction
1:00
Start of nmap
4:10
Using grep against a HTML Page to extract usernames, then username anarchy to
7:50
Kerbrute automatically will ASREP Roast but outputs in the stronger hash that
11:10
Using NXC with our creds to dump a list of users and see a password in the des
13:34
Using Rusthound stead of the python version of Bloodhound because it gets cert
17:30
Showing a couple paths in Bloodhound
22:00
Explaining and performing the attack (dacledit, shadow credential, force passw
32:50
Discovering Output Messenger running, using chisel to forward ports
38:15
Having trouble with the Linux client of Output Messenger, cannot download a fi
44:30
Switching to Windows, using a regular portforward on chisel so our windows box
52:30
Using ilSpy n the dotnet binary and decrypting a static string which is anothe
1:00:00
Discovering the API Key in the notes, and exploring the API to dump chatroom m
1:12:30
Setting an event on Olivia's Output Messenger Calendar to send a shell
1:22:48
Discovering a PCAP in Olivias downloaded files, using wireshark to extract obj
1:32:40
Accessing the box over RDP, decrypting the bitlocker drive, and then downloadi
1:40:40
Using NTDISSECTOR to parse the NTDS.DIT which extracts a lot more data than se
1:45:45
Doing AD ESC4 and then AD ESC 1 to get root
🎓
Tutor Explanation
DeepCamp AI