🩸
Gzzcoo HTB Walkthroughs
HomePentest NotesHTB Profile
  • Home
  • ACTIVE DIRECTORY
    • Easy
      • Active
      • Cicada
      • EscapeTwo
      • Forest
      • Sauna
      • Support
      • Timelapse
    • Medium
      • Administrator
      • Authority
      • Cascade
      • Certified
      • Escape
      • Hospital
      • Intelligence
      • Jab
      • Manager
      • Monteverde
      • Querier
      • Resolute
      • Scrambled
      • StreamIO
      • TheFrizz
    • Hard
      • Acute
      • Analysis
      • Blackfield
      • Haze
      • Mantis
      • Object
      • Reel
      • Scepter
      • Search
      • Vintage
    • Insane
      • DarkCorp
      • Ghost
      • Infiltrator
      • Multimaster
      • Sizzle
  • WINDOWS
    • Easy
      • Blue
      • Devel
      • Grandpa
      • Granny
      • Heist
      • Jerry
      • Netmon
      • Optimum
      • Return
  • LINUX
    • Easy
      • Alert
      • Analytics
      • Antique
      • Armageddon
      • Bank
      • Bashed
      • Bizness
      • Blocky
      • BoardLight
      • BountyHunter
      • Broker
      • Busqueda
      • Cap
      • Chemistry
      • Code
      • Codify
      • CozyHosting
      • Delivery
      • Devvortex
      • Dog
      • Editorial
      • GreenHorn
      • Headless
      • Horizontall
      • Irked
      • Keeper
      • Knife
      • Lame
      • LinkVortex
      • Mirai
      • MonitorsTwo
      • Nibbles
      • Nocturnal
      • Nunchucks
      • OpenAdmin
      • Paper
      • PC
      • PermX
      • Pilgrimage
      • Precious
      • Previse
      • Sau
      • ScriptKiddie
      • Shocker
      • Sightless
      • Squashed
      • Titanic
      • Topology
      • TraceBack
      • TwoMillion
      • UnderPass
      • Usage
      • Valentine
      • Validation
      • Wifinetic
    • Medium
      • Backfire
      • Cat
      • Cypher
      • Heal
      • Instant
      • Trickster
    • Hard
      • Eureka
Con tecnología de GitBook
En esta página
  • Reconnaissance
  • NTLM is disabled? Protected users? Testing Kerberos authentication
  • SMB Enumeration
  • Users Enumeration
  • Attempting to perform AS-REP Roast and Kerberoasting Attack (FAILED)
  • BloodHound Enumeration
  • Auth as FS01$
  • Abusing Pre-Windows 2000 computers (Pre2k)
  • Auth as GMSA01$
  • Abusing ReadGMSAPassword privileges to retrieve gMSA password
  • Shell as C.Neri
  • Abusing GenericWrite Privilege on a Group to Add Members
  • Abusing GenericAll privileges to Enable User Accounts, DONT_REQ_PREAUTH & SPNs for AS-REP Roasting & Kerberoasting
  • Cracking Hashes with John
  • Password Spraying with Kerbrute and NetExec
  • Abusing WinRM with Kerberos TGT (Ticket Granting Ticket)
  • Auth as C.Neri_adm
  • Abusing DPAPI Secrets to Move Laterally (impacket-dpapi)
  • Shell as L.Bianchi_adm (Domain Admin)
  • Finding an entry vector to elevate our privileges with BloodHound
  • Abusing AllowedToAct privileges (Resource-based Constrained Delegation [RBCD Attack] through SVC_SQL user) with impacket-getST
  • Resource-based Constrained Delegation Attack (RBCD Attack) with FS01$
  • Extra: Dumping NTDS.dit to retrieve all NTLM hashes

¿Te fue útil?

Exportar como PDF
  1. ACTIVE DIRECTORY
  2. Hard

Vintage

AnteriorSearchSiguienteInsane

Última actualización hace 12 días

¿Te fue útil?

© 2025 Gzzcoo.