infraProhard

Грань (Fringe/Edge)

hackerlab

Task: Windows AD domain controller with multiple attack vectors including Kerberos enumeration, encrypted documents, and LSASS dump. Solution: chain user enumeration → password brute force → SMB access → video QR extraction → Office cracking → WinRM access → LSASS dump analysis → Pass-the-Hash to Domain Admin.

$ ls tags/ techniques/
password_bruteforcekerberos_user_enumerationsmb_share_enumerationqr_code_extraction_from_videooffice_document_crackingldap_enumerationlsass_dump_analysispass_the_hash

🔒

Permission denied (requires tier.pro)

Sign in to access full writeups

Sign in with GitHub to continue. No email required.

$sign in

$ grep --similar

Similar writeups