- 6
- 566
Murat Zamir
เข้าร่วมเมื่อ 1 มิ.ย. 2020
On the way of escalating to the root
PG Practice Walkthrough| Vault - Windows AD
This is a Windows Active Directory machine that focuses on Responder to capture a user hash for the initial foothold and abusing SeRestore privilege with a Windows binary to get NT SYSTEM shell for privilege escalation.
BONUS: I also showed the intended way of solving the machine which involves abusing the Default Domain Policy with SharpGPOAbuse.exe to add the low level user to local Administrators account.
BONUS: I also showed the intended way of solving the machine which involves abusing the Default Domain Policy with SharpGPOAbuse.exe to add the low level user to local Administrators account.
มุมมอง: 23
วีดีโอ
PG Practice Walkthrough | Heist - Windows AD
มุมมอง 9428 วันที่ผ่านมา
This is a Windows Active Directory machine that allowed us to get NTLM hashes for a user account then pivot our way to a gMSA account.
PG Practice Walkthrough | vmdak - Linux
มุมมอง 10328 วันที่ผ่านมา
This is a standalone Linux machine that involves lots of web exploitation and local port forwarding
TryHackMe | Learn Linux | #3
มุมมอง 854 ปีที่แล้ว
Hope you enjoyed! Next video will be Linux challenges. Keep watching. #TryHackMe #LearnLinux #Linux
TryHackMe | Introductory Researching | #1
มุมมอง 2204 ปีที่แล้ว
TryHackMe | Introductory Researching | #1
This is awesome man. Looking forward for more.
Thanks dude 😊
Hey Dude, good job
Hey, thanks :)