Skip to content

HTB Eighteen#2120

Merged
carlospolop merged 1 commit intomasterfrom
update_HTB__Eighteen_20260412_021711
Apr 28, 2026
Merged

HTB Eighteen#2120
carlospolop merged 1 commit intomasterfrom
update_HTB__Eighteen_20260412_021711

Conversation

@carlospolop
Copy link
Copy Markdown
Collaborator

🤖 Automated Content Update

This PR was automatically generated by the HackTricks News Bot based on a technical blog post.

📝 Source Information

  • Blog URL: https://0xdf.gitlab.io/2026/04/11/htb-eighteen.html
  • Blog Title: HTB: Eighteen
  • Suggested Section: HackTricks Main → Network Services Pentesting → 1433 - Pentesting MSSQL (IMPERSONATE/exec_as_login, netexec --local-auth, MSSQL RID brute) AND Windows Hardening → Active Directory Methodology → Abusing AD ACLs/ACEs → BadSuccessor (add Windows Server 2025 functional level + dMSA migration abuse notes); optionally Web → Password hashing/cracking notes for Werkzeug PBKDF2-SHA256 → hashcat 10900 conversion

🎯 Content Summary

Overview / Impact
This post is an end-to-end HackTheBox “assume breach” attack chain against Eighteen, a Windows Server 2025 Domain Controller (DC01) in the eighteen.htb AD domain. Starting with given credentials that only work as a local MSSQL login, the attacker: (1) enumerates MSSQL and abuses a misconfiguration (IMPERSONATE on another SQL login) to access an application database, (2) extracts and cracks a Werkzeug PBKDF2-SHA256 password ha...

🔧 Technical Details

Local MSSQL auth vs Integrated auth: If MSSQL login fails with “untrusted domain” using integrated auth, try authenticating as a local SQL login (e.g., netexec mssql <host> -u <user> -p <pass> --local-auth). Once connected, validate privilege boundaries by attempting (and observing errors for) features like xp_cmdshell / RECONFIGURE; the error messages confirm you must pivot via data access rather than direct OS command execution.

MSSQL RID cycling through database access: When SMB/LDAP aren’t available, you can still enumerate AD accounts by RID brute forcing through MSSQL using netexec (--rid-brute). Parse results to build a username list for spraying (grep -oP 'DOMAIN\\\w+\.\w+' | cut -d '\\' -f2).

MSSQL login impersonation (IMPERSONATE) to pivot into protected DBs: If enum_impersonate shows an IMPERSONATE grant on another login, switch con...

🤖 Agent Actions

I’m mapping the existing HackTricks structure first and reading the closest MSSQL, AD ACL, and password-hash pages before deciding on a single target file. After that I’ll check whether the blog actually adds anything new or whether the techniques are already covered.
I found there is already a dedicated BadSuccessor.md, which makes it the leading candidate if the current page is missing the Windows Server 2025 functional-level and dMSA migration notes from the blog. I’m reading the nearby MSSQL, Werkzeug, and AD pages now to confirm what is already covered and avoid adding duplicated material.
The MSSQL techniques from the box are already present in the main MSSQL page, so duplicating them would add noise. The real gap is in the BadSuccessor documentation: the repo already has the topic, but one page is stale and neither page clearly captures the Windows Server 2025 functional-level angle and the practical operator notes shown in the blog.
I’ve confirmed the repo already covers most of the box’s MSSQL side, so I’m validating the BadSuccessor details against current sources before editing. The main thing I need to avoid is preserving stale guidance, because the existing page still claims there was no patch.
I’ve finished source validation. I’m updating the dedicated ACLs/ACEs BadSuccessor.md page only, keeping the change scoped to one file and focusing on what the blog adds materially: the Windows Server 2025/dMSA operator cues, the migration-state details, current patch status, and practical enumeration/exploitation notes.
The edit is in place and I’ve re-read the rendered markdown plus the diff. I’m doing one last verification pass now to make sure the update stays within the “one file only” constraint and that the references section is correct and still at the end of the file.
Updated BadSuccessor.md as the single target file.

The MSSQL pieces from the blog were already covered in HackTricks, so I did not duplicate them. The useful gap was the BadSuccessor page: I rewrote it to emphasize the Windows Server 2025/dMSA migration mechanics, added practical checks like Get-ADDomain / Get-ADForest and netexec ldap -M badsuccessor, kept the abuse flow concise, and corrected the stale patch status by noting Microsoft assigned CVE-2025-53779 and shipped an update in August 2025. I also added the blog URL plus the primary Akamai, Microsoft Learn, and MSRC references at the end of the file.


This PR was automatically created by the HackTricks Feed Bot. Please review the changes carefully before merging.

@carlospolop
Copy link
Copy Markdown
Collaborator Author

🔗 Additional Context

Original Blog Post: https://0xdf.gitlab.io/2026/04/11/htb-eighteen.html

Content Categories: Based on the analysis, this content was categorized under "HackTricks Main → Network Services Pentesting → 1433 - Pentesting MSSQL (IMPERSONATE/exec_as_login, netexec --local-auth, MSSQL RID brute) AND Windows Hardening → Active Directory Methodology → Abusing AD ACLs/ACEs → BadSuccessor (add Windows Server 2025 functional level + dMSA migration abuse notes); optionally Web → Password hashing/cracking notes for Werkzeug PBKDF2-SHA256 → hashcat 10900 conversion".

Repository Maintenance:

  • MD Files Formatting: 972 files processed

Review Notes:

  • This content was automatically processed and may require human review for accuracy
  • Check that the placement within the repository structure is appropriate
  • Verify that all technical details are correct and up-to-date
  • All .md files have been checked for proper formatting (headers, includes, etc.)

Bot Version: HackTricks News Bot v1.0

@carlospolop
Copy link
Copy Markdown
Collaborator Author

merge

@carlospolop carlospolop merged commit 6273b51 into master Apr 28, 2026
@carlospolop carlospolop deleted the update_HTB__Eighteen_20260412_021711 branch April 28, 2026 03:52
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant