HackTheBox - Signed
00:00 - Introduction
01:00 - Start of nmap
02:05 - Logging into the SQL Database with the provided credentials, going over basic enumeration
04:00 - Using XP_DIRTREE to have the SQL Server make a request, sending it to ourself and stealing/cracking the hash
08:50 - Showing RID Brute Forcing with MSSQL to enumerate additional users
10:50 - Explaining how the SUSER_SID command performs a SID Bruteforce, converting the SID from binary to String notation
15:00 - Creating a Silver Ticket with Ticketer.py
23:30 - Impersonating an admin, so we can enable xp_cmdshell to get a shell on the box
27:20 - Showing CVE-2025-33073 posts, which explains the attack we will do with NTLM Relay and cred marshalling
28:30 - Getting Chisel up and running so we can add DNS Names
31:20 - Adding a special DNS Name so we can impersonate DC01, then starting NTLMRelay and forwarding connections to WinRM
37:00 - Using NetExec's coerce_plus to force a request to be made to our special DNS Name and getting a shell
42:30 - Showing if we impersonated the SQL Service itself we could abuse OpenRowSet to read files as administrator and just read root.txt from an SQL Shell
47:10 - Reading the powershell history which would get us the administrator password
54:10 - Showing yet another cool thing, we can abuse how tokens work to get the original token of our the service account which would allow us to have SEImpersonate,then we can use a potato to privesc
1:12:10 - Not every attempt is successful showing adding custom functions via CLR wouldn't give us administrative privileges
Watch on YouTube ↗
(saves to browser)
Sign in to unlock AI tutor explanation · ⚡30
Playlist
Uploads from IppSec · IppSec · 0 of 60
← Previous
Next →
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
HHC2016 - Analytics
IppSec
HackTheBox - October
IppSec
HackTheBox - Arctic
IppSec
HackTheBox - Brainfuck
IppSec
HackTheBox - Bank
IppSec
HackTheBox - Joker
IppSec
HackTheBox - Lazy
IppSec
Camp CTF 2015 - Bitterman
IppSec
HackTheBox - Devel
IppSec
Reversing Malicious Office Document (Macro) Emotet(?)
IppSec
HackTheBox - Granny and Grandpa
IppSec
HackTheBox - Pivoting Update: Granny and Grandpa
IppSec
HackTheBox - Optimum
IppSec
HackTheBox - Charon
IppSec
HackTheBox - Sneaky
IppSec
HackTheBox - Holiday
IppSec
HackTheBox - Europa
IppSec
Introduction to tmux
IppSec
HackTheBox - Blocky
IppSec
HackTheBox - Nineveh
IppSec
HackTheBox - Jail
IppSec
HackTheBox - Blue
IppSec
HackTheBox - Calamity
IppSec
HackTheBox - Shrek
IppSec
HackTheBox - Mirai
IppSec
HackTheBox - Shocker
IppSec
HackTheBox - Mantis
IppSec
HackTheBox - Node
IppSec
HackTheBox - Kotarak
IppSec
HackTheBox - Enterprise
IppSec
HackTheBox - Sense
IppSec
HackTheBox - Minion
IppSec
VulnHub - Sokar
IppSec
VulnHub - Pinkys Palace v2
IppSec
HackTheBox - Inception
IppSec
Vulnhub - Trollcave 1.2
IppSec
HackTheBox - Ariekei
IppSec
HackTheBox - Flux Capacitor
IppSec
HackTheBox - Jeeves
IppSec
HackTheBox - Tally
IppSec
HackTheBox - CrimeStoppers
IppSec
HackTheBox - Fulcrum
IppSec
HackTheBox - Chatterbox
IppSec
HackTheBox - Falafel
IppSec
How To Create Empire Modules
IppSec
HackTheBox - Nightmare
IppSec
HackTheBox - Nightmarev2 - Speed Run/Unintended Solutions
IppSec
HackTheBox - Bart
IppSec
HackTheBox - Aragog
IppSec
HackTheBox - Valentine
IppSec
HackTheBox - Silo
IppSec
HackTheBox - Rabbit
IppSec
HackTheBox - Celestial
IppSec
HackTheBox - Stratosphere
IppSec
HackTheBox - Poison
IppSec
HackTheBox - Canape
IppSec
HackTheBox - Olympus
IppSec
HackTheBox - Sunday
IppSec
HackTheBox - Fighter
IppSec
HackTheBox - Bounty
IppSec
More on: Network Security
View skill →Related AI Lessons
⚡
⚡
⚡
⚡
Comparing Tools for Intelligent Demand Prediction in Retail
Dev.to AI
Implementing Intelligent Demand Prediction for Grocery Retail
Dev.to AI
Building a Real Estate Data Pipeline That Aggregates 3,000+ Listings Daily from BizBuySell, CREXi &…
Medium · Data Science
RMSE Is Evidence, Not a Verdict: How Measurement Uncertainty Shapes Model Error
Medium · Data Science
Chapters (16)
Introduction
1:00
Start of nmap
2:05
Logging into the SQL Database with the provided credentials, going over basic
4:00
Using XP_DIRTREE to have the SQL Server make a request, sending it to ourself
8:50
Showing RID Brute Forcing with MSSQL to enumerate additional users
10:50
Explaining how the SUSER_SID command performs a SID Bruteforce, converting the
15:00
Creating a Silver Ticket with Ticketer.py
23:30
Impersonating an admin, so we can enable xp_cmdshell to get a shell on the box
27:20
Showing CVE-2025-33073 posts, which explains the attack we will do with NTLM R
28:30
Getting Chisel up and running so we can add DNS Names
31:20
Adding a special DNS Name so we can impersonate DC01, then starting NTLMRelay
37:00
Using NetExec's coerce_plus to force a request to be made to our special DNS N
42:30
Showing if we impersonated the SQL Service itself we could abuse OpenRowSet to
47:10
Reading the powershell history which would get us the administrator password
54:10
Showing yet another cool thing, we can abuse how tokens work to get the origin
1:12:10
Not every attempt is successful showing adding custom functions via CLR wouldn
🎓
Tutor Explanation
DeepCamp AI