<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
    <channel>
        <title>HackTheBox - Signed</title>
        <link>https://stream.echo6.co/videos/watch/364b0bb4-b442-4470-845e-c2b26b6d08e6</link>
        <description>00:00 - Introduction 01:00 - Start of nmap 02:05 - Logging into the SQL Database with the provided credentials, going over basic enumeration 04:00 - Using XP_DIRTREE to have the SQL Server make a request, sending it to ourself and stealing/cracking the hash 08:50 - Showing RID Brute Forcing with MSSQL to enumerate additional users 10:50 - Explaining how the SUSER_SID command performs a SID Bruteforce, converting the SID from binary to String notation 15:00 - Creating a Silver Ticket with Ticketer.py 23:30 - Impersonating an admin, so we can enable xp_cmdshell to get a shell on the box 27:20 - Showing CVE-2025-33073 posts, which explains the attack we will do with NTLM Relay and cred marshalling 28:30 - Getting Chisel up and running so we can add DNS Names 31:20 - Adding a special DNS Name so we can impersonate DC01, then starting NTLMRelay and forwarding connections to WinRM 37:00 - Using NetExec's coerce_plus to force a request to be made to our special DNS Name and getting a shell 42:30 - Showing if we impersonated the SQL Service itself we could abuse OpenRowSet to read files as administrator and just read root.txt from an SQL Shell 47:10 - Reading the powershell history which would get us the administrator password 54:10 - Showing yet another cool thing, we can abuse how tokens work to get the original token of our the service account which would allow us to have SEImpersonate,then we can use a potato to privesc 1:12:10 - Not every attempt is successful showing adding custom functions via CLR wouldn't give us administrative privileges</description>
        <lastBuildDate>Mon, 13 Apr 2026 23:01:17 GMT</lastBuildDate>
        <docs>https://validator.w3.org/feed/docs/rss2.html</docs>
        <generator>PeerTube - https://stream.echo6.co</generator>
        <image>
            <title>HackTheBox - Signed</title>
            <url>https://stream.echo6.co/client/assets/images/icons/icon-512x512.png</url>
            <link>https://stream.echo6.co/videos/watch/364b0bb4-b442-4470-845e-c2b26b6d08e6</link>
        </image>
        <copyright>All rights reserved, unless otherwise specified in the terms specified at https://stream.echo6.co/about and potential licenses granted by each content's rightholder.</copyright>
        <atom:link href="https://stream.echo6.co/feeds/video-comments.xml?videoId=364b0bb4-b442-4470-845e-c2b26b6d08e6" rel="self" type="application/rss+xml"/>
    </channel>
</rss>