|
You are here |
blog.ikuamike.io | ||
| | | | |
0xdf.gitlab.io
|
|
| | | | | One of the neat things about HTB is that it exposes Windows concepts unlike any CTF I'd come across before it. Forest is a great example of that. It is a domain controller that allows me to enumerate users over RPC, attack Kerberos with AS-REP Roasting, and use Win-RM to get a shell. Then I can take advantage of the permissions and accesses of that user to get DCSycn capabilities, allowing me to dump hashes for the administrator user and get a shell as the admin. In Beyond Root, I'll look at what DCSync looks like on the wire, and look at the automated task cleaning up permissions. | |
| | | | |
siunam321.github.io
|
|
| | | | | After my first attempt back on August 28, 2022, I wrote a blog post about my utter failure in that attempt. This time, however, I finally earned the OSCP certificate with 80/100 points! | |
| | | | |
www.securitynik.com
|
|
| | | | | In this post, I'm learning about Kerberos and one of its attacks. Specifically, I'm learning about Authentication Service Response (AS-REP) ... | |
| | | | |
www.micah.soy
|
|
| | | It is illegal to gain unauthorized access to computer systems in most jurisdictions, and you will be prosecuted for doing so. Be responsible with the information you have. | ||