Section Contents

  • 📄 HTB: Active

    A textbook Active Directory compromise. Finding passwords in SYSVOL (GPP) and Kerberoasting the Administrator.

  • 📄 HTB: Administrator

    Cracking Cisco hashes and exploiting Splunk via CVE-2019-15107 to pivot into Active Directory.

  • 📄 HTB: Bastion

    Mounting remote VHD backup files to steal SAM hives.

  • 📄 HTB: BoardLight

    Exploiting Dolibarr CRM via PHP injection.

  • 📄 HTB: Certified

    Active Directory Certificate Services (AD CS) abuse. Exploiting ESC1 to forge a Golden Certificate.

  • 📄 HTB: Cicada

    Abusing Forest Trusts and data mining SMB shares to compromise a child domain.

  • 📄 HTB: Devel

    The classic 'FTP Upload -> IIS Execute' path, followed by a Kernel exploit for System.

  • 📄 HTB: Forest

    Using BloodHound to map ACL paths, abusing Exchange Windows Permissions to grant DCSync rights.

  • 📄 HTB: Netmon

    Exploiting PRTG Network Monitor default credentials and config file leakage.

  • 📄 HTB: Sauna

    Exploiting username enumeration, ASREPRoasting, and extracting plain text credentials for lateral movement.

  • 📄 HTB: Tombwatcher

    A complex chain involving Database exploitation and Active Directory pivoting.