Sizzle - HackTheBox
We start by enumerating an SMB share with write permissions on a folder. We can perform a SCF attack by loading malicious SCF. The user needs a public key to connect to WinRM. We can create a new public key using Active Directory Certificate Services and log in with evil-winrm. For privilege escalation, the user mrlky is kerberoasteable. We can request a TGS and decrypt it with john. This user has ‘Get-Changes’ and ‘Get-Changes-All’ privileges. We can perform a DCSync attack and obtain the admin hash.