infraProhard
Революция (Revolution)
hackerlab
Task: Windows AD domain controller with exposed backup files, AS-REP roastable users, and FTP containing packed DLL. Solution: chain web enumeration → AS-REP roasting → FTP access → DLL reverse engineering → WinRM access → PrintNightmare privilege escalation.
$ ls tags/ techniques/
password_crackingas_rep_roastingcredential_harvesting_from_backupdll_reverse_engineeringprintnightmare_privesc
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Sign in with GitHub to continue. No email required.
$sign in$ grep --similar
Similar writeups
- [infra][Pro]Потерянный (Lost)— hackerlab
- [pentest][Pro]Рекрутинговое агентство (Recruiting Agency)— hackerlab
- [infra][Pro]Грань (Fringe/Edge)— hackerlab
- [infra][Pro]Бункер (Bunker)— hackerlab
- [infra][Pro]Системный администратор— hackerlab