Completed AD Boxes
| Box | Methods | Description | Links |
|---|---|---|---|
| Access | |||
| Resourced | Anonymous login, exposed credentials, SYSTEM and SAM files, secretsdump, hash cracking, Bloodhound, Resource-Based Constrained Delegation (RBCD), impacket-addcomputer, Get-ADComputer, rbcd.py, impacket-getST, psexec | Followed the walkthroughs, utilizes an exploit revolving around GenericAll rights for Resource-Based Constrained Delegation (RBCD) | https://medium.com/@ardian.danny/oscp-practice-series-65-proving-grounds-resourced-05eb9a129e28 |
| Nagoya | |||
| Hokkaido | |||
| Hutch | ldapsearch, crackmapexec, curl, psexec | Learned how to use cadaver for initial access, printspoofer exploit made for easy privesc | https://viperone.gitbook.io/pentest-everything/writeups/pg-practice/windows/hutch |
| Vault |