infraPromedium
Системный администратор
hackerlab
Task: Windows Server 2012 R2 with FTP and WinRM services. Solution: Anonymous FTP access revealed user directories with plaintext credentials, used to gain WinRM access as Domain Admin.
$ ls tags/ techniques/
lateral_movementwindowsftpanonymous_accesscredential_harvestingwinrmdomain_adminwindows_server_2012smb
Anonymous FTP enumerationCredential harvesting from exposed filesWinRM remote accessWindows privilege escalation (Domain Admin)
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Sign in with GitHub to continue. No email required.
$sign in$ grep --similar
Similar writeups
- [infra][Pro]Революция (Revolution)— hackerlab
- [infra][Pro]Потерянный (Lost)— hackerlab
- [pentest][Pro]Рекрутинговое агентство (Recruiting Agency)— hackerlab
- [infra][Pro]Будущий релиз (Future Release)— hackerlab
- [infra][Pro]Anonymous— hackerdna