<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>ADCS on </title>
    <link>https://old.frang4.tech/tags/adcs/</link>
    <description>Recent content in ADCS on </description>
    <generator>Hugo</generator>
    <language>en-us</language>
    <lastBuildDate>Sat, 20 Sep 2025 03:38:50 -0300</lastBuildDate>
    <atom:link href="https://old.frang4.tech/tags/adcs/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>Fluffy - HTB Machine</title>
      <link>https://old.frang4.tech/posts/htb-machines/fluffy/writeup/</link>
      <pubDate>Sat, 20 Sep 2025 03:38:50 -0300</pubDate>
      <guid>https://old.frang4.tech/posts/htb-machines/fluffy/writeup/</guid>
      <description>&lt;h2 id=&#34;summary-how&#34;&gt;Summary (How?)&lt;/h2&gt;&#xA;&lt;p&gt;We started by enumerating the provided credentials for the user &lt;code&gt;j.fleischman&lt;/code&gt; and identified an SMB share named &lt;code&gt;IT&lt;/code&gt;. After downloading files from the share, we discovered a PDF detailing vulnerabilities, including CVE-2025-24071, which enabled me to craft a malicious &lt;code&gt;.zip&lt;/code&gt; file to leak NTLM hashes via Windows Explorer&amp;rsquo;s automatic file parsing. Using this exploit, we captured the NTLM hash for the user &lt;code&gt;p.agila&lt;/code&gt; and cracked its password.&lt;/p&gt;&#xA;&lt;p&gt;With &lt;code&gt;p.agila&lt;/code&gt;&amp;rsquo;s credentials, we found that the user had &lt;code&gt;GenericAll&lt;/code&gt; permissions over the &lt;code&gt;SERVICE ACCOUNTS&lt;/code&gt; group. This allowed us to add &lt;code&gt;p.agila&lt;/code&gt; to the group and, subsequently, perform a Shadow Credentials attack to impersonate the &lt;code&gt;WINRM_SVC&lt;/code&gt; account, successfully gaining access to the system as that user.&lt;/p&gt;</description>
    </item>
  </channel>
</rss>
