CRTE Guide: Citadel & Glacis Domains – Active Directory and SQL Server Attack Path

The CRTE Active Directory guide (Certified Red Team Expert) exam environment is designed to feel like a real enterprise—messy, interconnected, and full of small misconfigurations that only make sense once you start linking them together.

In this scenario, you’re dealing with two domains:

Along with systems like CITADEL-DC, SRV71, PAWSRV, SQLSRV3, and GLACIS-DC, plus users such as studentuser, sharemanager, sqlsrv3adm, and dbmaster.

At first, it looks like a lot. But once you break it down, patterns start to emerge.


Environment Overview: Two Domains, One Opportunity

The infrastructure is split across:

CITADEL Domain

GLACIS Domain

Right away, the presence of two domains suggests:
➡️ Trust relationships or cross-domain access paths

And that’s where CRTE scenarios usually get interesting.


Initial Access: studentuser and ExamVM

You typically begin with access as:

This is your foothold.

From here, the focus should be:

At this stage, it’s less about privilege—and more about visibility.


sharemanager: A Small Clue with Big Implications CRTE Active Directory guide

Another key account:

Even the password tells a story.

It suggests:

This account is likely tied to:

And that makes it valuable.

Because shared resources often contain:


SRV71 & File Share Enumeration

With sharemanager, one of the first logical steps is exploring:

➡️ SRV71.CITADEL.CORP

File servers are often overlooked—but they frequently expose:

Look for:

Sometimes, the path forward isn’t an exploit—it’s a forgotten file.


PAWSRV: Privileged Access Workstation CRTE Active Directory guide

The presence of PAWSRV.CITADEL.CORP is a major hint.

PAWs (Privileged Access Workstations) are used by admins to:

If you gain access here, you’re not just moving laterally—you’re stepping into a privileged zone.

Key things to check:

Because admin activity often leaves traces.


SQLSRV3.GLACIS.CORP: The Bridge Between Domains

Now things shift toward the GLACIS.CORP domain.

The system:

along with users:

suggests a SQL-heavy environment.

SQL Servers are powerful because they often:

And importantly:
➡️ They can act as a bridge between domains


SQL Accounts: sqlsrv3adm and dbmaster

Accounts like:

are not just database users—they often have:

If access is gained here, possibilities include:

This is where AD meets database exploitation.


GLACIS-DC: The Final Target

The system:

represents the highest level of control in the second domain.

Reaching this point usually requires:

At this stage, the focus shifts from access to dominance.


Connecting the Attack Path CRTE Active Directory guide

When you step back, a realistic chain might look like this:

  1. Initial access via studentuser on ExamVM
  2. Discovery of sharemanager credentials
  3. Enumeration of SRV71 file shares
  4. Extraction of useful data or credentials
  5. Movement toward privileged systems like PAWSRV
  6. Discovery of SQL-related access
  7. Authentication to SQLSRV3.GLACIS.CORP using sqlsrv3adm or dbmaster
  8. Command execution or credential harvesting via SQL
  9. Pivot into GLACIS-DC

It’s not a straight line—but each step builds on the last.


Common Pitfalls in CRTE Scenarios CRTE Active Directory guide

Even experienced users get stuck here.

Typical mistakes include:

CRTE rewards patience and correlation—not speed.


A More Effective Strategy

If things aren’t moving forward, try this:

And always ask:
➡️ “Why does this account exist?”

That question alone often reveals the next move.


Final Thoughts CRTE Active Directory guide

The CRTE Citadel & Glacis scenario reflects how real enterprise environments operate:

Systems like SRV71, PAWSRV, SQLSRV3, and domain controllers like CITADEL-DC and GLACIS-DC, combined with users such as studentuser, sharemanager, sqlsrv3adm, and dbmaster, form a layered challenge.

The goal isn’t just to gain access.

It’s to understand how everything connects—and use that understanding to move forward.

Vendor: https://www.alteredsecurity.com/redteamlab

Buy this dump: https://cyberservices.store/

CRTE Active Directory guide
×
?

Secure connection established...

Syncing...
1 / 3
error: Content is protected !!