Explore >> Select a destination


You are here

0xdf.gitlab.io
| | blog.ikuamike.io
2.4 parsecs away

Travel
| | Introduction After passing my OSCP, I am planning on doing CRTP and CRTO sometime this year. I took the OSCP exam before the updates that are focused on Active Directory so I didn't actively focus on this area. So to learn and practice on AD and Windows and also as some prep for the certifications I plan on taking, I will be doing some machines that are AD related and try to get into the details of the included misconfigurations and vulnerabilities.
| | leeadams.dev
2.4 parsecs away

Travel
| | A CTF with buffer overflow and Windows privilege escalation
| | shellsharks.com
2.9 parsecs away

Travel
| | A walkthrough of pwning the HackTheBox machine
| | blog.ikuamike.io
11.9 parsecs away

Travel
| Difficulty Release Date Author Intermediate 18 July 2019 Zayotic Summary This box had quite a good number of misconfigurations and vulnerabilities. Initial access was through copying a shadow backup file to a smb share accessible anonymously using a file copy vulnerability in proftpd. Then lateral movement and privilege escalation was achieved by exploiting rce a locally running librenms instance and finally abusing sudo permissions on mysql to get root.