Active (Easy) (WIP)

Description

  • Difficult -> Easy

  • OS -> Windows

  • State -> Retired

  • Tags -> Vulnerability Assessment / Enterprise Network / Active Directory / Security Tools / Authentication / Software & OS exploitation / Default Credentials / Weak Permissions / Anonymous-Guest Access

Write-up

  • I started making an initial port scan using Nmap


  • Then I did an exhaustive scan to learn about the services running on the open ports


  • ;


  • With that, I got the user flag

Answer: 0ac28aeb5d1e8d1808cdd083961381ad


  • A


  • Finally, I navigated to the /root folder where I found a root.txt file, and reading its content, I got the root flag


  • With that, I got the root flag and pwned the machine

Answer: 8

Last updated