MSSQL DB User Impersonation to RCE
overview
A Kali GUI machine and a target machine running an MSSQL service are provided to you. The user will access the windows server deployed on http://demo.ine.local
Your task is to fingerprint the MSSQL service using the tools available on the Kali machine. Then, use the mssqlclient.py to connect to the remote MSSQL service and perform database user privilege escalation and gain the shell on the target machine.
Privilege Escalation Path: bob -> dbuser -> sa
Objective: Exploit the server and retrieve the flag!
The following username and password may be used to access the service:
Username: bob
Password: KhyUuxwp7Mcxo7
Instructions:
Your Kali machine has an interface with IP address 10.10.X.Y. Run “ip addr” to know the values of X and Y.
The IP address of the target machine is mentioned in the file “/root/Desktop/target”
Do not attack the gateway located at IP address 192.V.W.1 and 10.10.X.1
solutions
The solution for this lab can be found in the following manual: https://assets.ine.com/labs/ad-manuals/walkthrough-2411.pdf
Last updated