// htb writeup 2026-02-25
Signed
HackTheBox Medium
root obtained // PWNED

Signed — Hack The Box (Seasonal) — Teaser

Difficulty: Medium
Skills: MSSQL enumeration & extended procedures, NTLM hash capture & cracking, Kerberos silver-ticket forging, OPENROWSET / xp_cmdshell abuse, SID/RID handling.
Box type: Windows (MS SQL / Kerberos / Active Directory)


Short pitch

An exposed Microsoft SQL Server hides an AD-backed escalation path: trigger an SMB callback from the database, capture and crack the MSSQL service NTLM hash, then forge Kerberos credentials that assert elevated group membership to gain sysadmin on the database and abuse SQL features to read sensitive files and pivot to the domain.


What you’ll do (high level, non-spoiler)


Why it’s fun / what you’ll learn

This box ties together core Windows authentication mechanics: SQL extended procedures, NTLM capture and cracking, and Kerberos ticket forging. It’s an excellent hands-on lab for understanding how service account secrets + AD SIDs can be combined to produce powerful forged tickets and domain pivots.


Gentle hints


Starting credentials (CTF)

scott : Sm230#C5NatH — useful to begin MSSQL enumeration.


Reminder: Only run these steps against machines you own or are authorised to test (CTF/lab environments). Unauthorized testing against production or third-party systems is illegal and unethical.