Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
🤖 Automated Content Update
This PR was automatically generated by the HackTricks News Bot based on a technical blog post.
📝 Source Information
🎯 Content Summary
High-level goal / attack chain
This post walks through attacking the HTB Windows target Signed starting from low-priv SQL-only credentials and ending in OS command execution by abusing MSSQL features and Kerberos ticket forging. The demonstrated chain is:
scott).xp_dirtreewith a UNC path to coerce SMB authentication from the SQL Server service account and captu...🔧 Technical Details
MSSQL UNC-path authentication coercion (NetNTLMv2 capture): If you can run MSSQL procs like
xp_dirtree, point them at a UNC path (\\ATTACKER\share) to force the SQL Server service account to authenticate over SMB. Capture the NetNTLMv2 challenge/response with Responder (e.g.,sudo uv run Responder.py -I tun0) and crack offline with Hashcat (NetNTLMv2 mode 5600, often auto-detected).RID-based domain enumeration via MSSQL SID translation: Use
SUSER_SID('DOMAIN\\Name')andSUSER_SNAME(0x...)to translate between names and binary SIDs. Because the SID ends with a little-endian RID, you can infer identities (e.g., RID 500/501) or automate discovery usingnetexec mssql ... --rid-bruteto list users/groups reachable through the MSSQL context.Kerberos silver ticket forging for a specific SPN + PAC group injection: If you know a se...
🤖 Agent Actions
Summary:
xp_dirtree, cracking, deriving NTLM/domain SID/RID, and forging MSSQL silver tickets with PAC group injection for sysadmin andxp_cmdshellRCE.Tests:
This PR was automatically created by the HackTricks Feed Bot. Please review the changes carefully before merging.