infraProhard
Грань (Fringe/Edge)
hackerlab
Task: Windows AD domain controller with multiple attack vectors including Kerberos enumeration, encrypted documents, and LSASS dump. Solution: chain user enumeration → password brute force → SMB access → video QR extraction → Office cracking → WinRM access → LSASS dump analysis → Pass-the-Hash to Domain Admin.
$ ls tags/ techniques/
video_forensicsqr_codepassword_crackingwindowswinrmsmbactive_directorykerberosoffice_encryptionlsass_dumpmimikatzpass_the_hash
password_bruteforcekerberos_user_enumerationsmb_share_enumerationqr_code_extraction_from_videooffice_document_crackingldap_enumerationlsass_dump_analysispass_the_hash
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Sign in with GitHub to continue. No email required.
$sign in$ grep --similar
Similar writeups
- [infra][Pro]Потерянный (Lost)— hackerlab
- [pentest][Pro]Рекрутинговое агентство (Recruiting Agency)— hackerlab
- [infra][Pro]Революция (Revolution)— hackerlab
- [infra][Pro]Бункер (Bunker)— hackerlab
- [reverse][Pro]Разминка (Warmup)— hackerlab