<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Assumed-Breach on 7Rocky's Blog. Cybersecurity and Maths</title><link>https://7rocky.github.io/en/tags/assumed-breach/</link><description>Recent content in Assumed-Breach on 7Rocky's Blog. Cybersecurity and Maths</description><generator>Hugo</generator><language>en</language><copyright>Licensed under CC BY-NC 4.0</copyright><lastBuildDate>Thu, 16 Apr 2026 09:39:08 +0200</lastBuildDate><atom:link href="https://7rocky.github.io/en/tags/assumed-breach/index.xml" rel="self" type="application/rss+xml"/><item><title>Eighteen</title><link>https://7rocky.github.io/en/htb/eighteen/</link><pubDate>Fri, 10 Apr 2026 00:00:00 +0100</pubDate><guid>https://7rocky.github.io/en/htb/eighteen/</guid><description>Hack The Box. Windows. Easy machine. In this assumed-breach machine we have credentials for an exposed MSSQL service where we can impersonate another user and find a hashed password for the website hosted by the machine. This hash can be cracked to find a password. After enumerating users by brute forcing RIDs in MSSQL, we find that it is reused by a domain user and we get access via WinRM. There is a bad ACL configured to group &lt;code&gt;IT&lt;/code&gt; and we can use &lt;code&gt;BadSuccessor&lt;/code&gt; to escalate privileges, after configuring a SOCKS proxy to access required AD services</description></item></channel></rss>