DarkZero
As is common in real life pentests, you will start the DarkZero box with credentials for the following account john.w / RFulUtONCOL!

Search for a command to run...
Articles tagged with #hacking
As is common in real life pentests, you will start the DarkZero box with credentials for the following account john.w / RFulUtONCOL!

As is common in real life Windows pentests, you will start the TombWatcher box with credentials for the following account: henry / H3nry_987TGV! Se hace un escaneo de nmap para reconocer el entorno c

Iniciamos con un escaneo de puertos: $ nmap -sV -Pn -sC -v -T4 10.10.11.174 Enumeramos los shares disponibles como guest utilizando netexec: $ nxc smb 10.10.11.174 -u guest -p '' --shares Como pod

Active is an easy to medium difficulty machine, which features two very prevalent techniques to gain privileges within an Active Directory environment.

Se hace un escaneo de nmap para reconocer el entorno con los parametros: -sV Para identificar las versiones de los servicios expuestos. -Pn Para omitir el ping a los hosts (asumiendo que están activ
