Skip to content

Samples

Abhiram V edited this page Nov 2, 2025 · 2 revisions

Here is the demonstration of the tool I have used for performing an HTB Lab (Retired Machine with Writeup) with ESC1 vulnerability

  1. Request and Export certificates via DCOM/SMB with current login user context
image
  1. Certificate stored successfully
2025-11-02_21-20_1
  1. Used certipy to retrieve TGT and extract NTLM hash (There are other methods such as ldap-shell/Retrieving TGT and inject into current session also works)
2025-11-02_21-27
  1. Logged in as high privilege user
2025-11-02_21-28

Clone this wiki locally