Authorized lab environment. Educational purposes only.

TL;DR

Five-stage chain: plaintext cred in SMB share → Kerberos TGT for Protected Users account → GenericWrite on gMSA to self-grant password read → WinRM via Pass-the-Hash → DLL hijack through scheduled task for lateral movement → ADCS ENROLLEE_SUPPLIES_SUBJECT to forge WSUS TLS cert → AD-integrated DNS poisoning → rogue WSUS with wsuks → PsExec as SYSTEM.

Environment

DC01.logging.htb, LOGGING.HTB domain, Windows Server 2019. The clock skew between the VPN and DC is ~7 hours — every Kerberos operation needs faketime -f "+7h". svc_recovery is in Protected Users, so NTLM auth is blocked at the domain level; Kerberos or nothing.

Full writeup — members only

The complete exploit chain, commands, and methodology are available to members on Buy Me a Coffee.

  unlock on buy me a coffee

€5 one-off · or monthly membership