x

Completed AD Boxes

Box Methods Description Links
Access
Resourced Anonymous login, exposed credentials, SYSTEM and SAM files, secretsdump, hash cracking, Bloodhound, Resource-Based Constrained Delegation (RBCD), impacket-addcomputer, Get-ADComputer, rbcd.py, impacket-getST, psexec Followed the walkthroughs, utilizes an exploit revolving around GenericAll rights for Resource-Based Constrained Delegation (RBCD) https://medium.com/@ardian.danny/oscp-practice-series-65-proving-grounds-resourced-05eb9a129e28
Nagoya
Hokkaido
Hutch ldapsearch, crackmapexec, curl, psexec Learned how to use cadaver for initial access, printspoofer exploit made for easy privesc https://viperone.gitbook.io/pentest-everything/writeups/pg-practice/windows/hutch
Vault
Left-click: follow link, Right-click: select node, Scroll: zoom
x