Tag: active directory
-
Ra 2 | TryHackMe
WindCorp recently had a security-breach. Since then they have hardened their infrastructure, learning from their mistakes. But maybe not enough? You have managed to enter their local network… My first hard box. Let’s go. Our first nmap scan gives a lot back, so it’s going to be lots of vectors for enumeration. Starting with DNS […]
-
VulnNet Active | TryHackMe
So, we’re probably looking at a domain controller judging by the DNS service running. Running crackmapexec gives us the domain name vulnnet.local which we’ll use to further enumerate the box. SMB allows anonymous login but has no shares to display, but Redis allows unauthenticated logins. We can get a username from this but I spend […]
-
VulnNet: Roasted | TryHackMe
VulnNet Entertainment just deployed a new instance on their network with the newly-hired system administrators. Being a security-aware company, they as always hired you to perform a penetration test, and see how system administrators are performing. This is a much simpler machine, do not overthink. You can do it by following common methodologies. Initial nmap […]