Prerequisites Azure Subscription: Ensure you have an active Azure subscription. Azure AD Tenant: Create an Azure AD tenant if you don't have one. Azure AD Connect: Download and install Azure AD Connect on a server in your on-premises environment. ...
In the dynamic world of IT, having the right tools at your disposal is crucial. Whether you're a seasoned system administrator, a help desk hero, or a freelance tech wizard, a well-stocked toolkit can make all the difference. Let's dive into some of ...
We began by doing an nmap scan of the machine using the command: result=$(nmap -p- --min-rate=1000 -Pn -T4 10.129.229.114 | grep '^[0-9]' | cut -d '/' -f 1 | tr '\n' ',' | sed 's/,$//' | tr -d '%');nmap -p$result -Pn -sC -sV 10.129.229.114 -oA...
IP: 10.129.91.54 Let's begin by conducting a nmap scan to gather information about the target system. nmap -sC -sV -o nmap 10.129.91.54 Starting Nmap 7.95 ( https://nmap.org ) at 2025-02-11 12:08 EST Nmap scan report for 10.129.91.54 Host is up (0.3...
In this series, I will document the process of setting up a virtual lab environment as part of a technical assessment I received from [Redacted Company]. While the assessment outlined specific tasks, it did not provide clear instructions on how to im...
The Vault machine is a medium-difficulty Active Directory (AD) box hosted on Hack The Box. This machine focuses on exploiting misconfigurations in SMB shares, capturing NTLM hashes, and leveraging privileges for privilege escalation. In this walkthro...
IP: 10.129.136.21 Let’s start with the nmap scan. nmap -sC -sV -o nmap 10.129.136.21 Starting Nmap 7.95 ( https://nmap.org ) at 2025-02-09 04:02 EST Nmap scan report for 10.129.136.21 Host is up (0.23s latency). Not shown: 988 closed tcp ports (rese...
IP: 10.129.40.252 Let’s start with the nmap scan nmap -sC -sV -o nmap 10.129.40.252 Starting Nmap 7.95 ( https://nmap.org ) at 2025-02-07 12:40 EST Nmap scan report for 10.129.40.252 Host is up (0.27s latency). Not shown: 983 closed tcp ports (reset...
The "Hokkaido" machine provided a comprehensive learning experience in Active Directory exploitation. By combining enumeration, credential harvesting, and privilege escalation techniques, I successfully compromised the target system. Try solving this...
Wi-Fi connectivity is essential for modern businesses, but how you secure that connectivity is even more critical. Many businesses still rely on shared passwords for their Wi-Fi networks, a practice that exposes them to significant security risks, op...