️ PROTOCOL BREACH: Engineering Total Domain Compromise on HTB Escape
渗透测试案例"Escape"揭示了目标Windows环境中的严重漏洞:通过SMB共享获取SQL服务账户凭证,并利用MSSQL日志中的明文密码进行横向移动。ADCS配置错误导致域管理员权限被获取,整体风险等级为关键。 2026-1-12 13:26:43 Author: infosecwriteups.com(查看原文) 阅读量:0 收藏

Nicholas Mullenski

Target: Escape (10.10.11.202) OS: Windows Difficulty: Medium Attack Vectors: SMB Enumeration -> MSSQL Lateral Movement -> ADCS Misconfiguration (ESC1) -> Domain Admin.

Press enter or click to view image in full size

Executive Summary

Assessment Date: January 11, 2026 Risk Level: CRITICAL Author: R00t3dbyFa17h/Nicholas Mullenski

Overview

The “Escape” engagement highlighted critical vulnerabilities within the organization’s Active Directory Certificate Services (ADCS) infrastructure. The target environment exposed sensitive information via SMB shares, allowing for initial access to the MSSQL database. Poor log management practices within the database facilitated lateral movement to a domain user.

Key Findings

Information Disclosure: An unsecured SMB share contained internal documentation revealing credentials for the SQL Service account.

Weak Log Management: The MSSQL logs contained cleartext credentials for a domain user (Ryan.Cooper) due to a failed login attempt where the password was inadvertently entered as the username.

ADCS Misconfiguration (ESC1): The Certificate Authority (CA) was configured with a vulnerable certificate template allowing…


文章来源: https://infosecwriteups.com/%EF%B8%8F-protocol-breach-engineering-total-domain-compromise-on-htb-escape-350ecacf457c?source=rss----7b722bfd1b8d---4
如有侵权请联系:admin#unsafe.sh