Information Gathering As usual lets start with the nmap scan From the above image I saw that the port 80 is open. In parallel I also triggered a wfuzz for subdomains Later, When I tried to access port 80, the browser was redirected to sneakycorp.htb. I added this to the hosts file and tried accessing it on the browser. I ...

Initial Nmap scan When I tried access port 80, it got redirected to fuse.fabricorp.local. After adding it to my /etc/hosts file I got the below page I downloaded each CSV file and found something interesting I found below usernames pmerton tlavel sthompson bhult I tried smbclient anonymous login allowed, but nothing there was found. I created a list of passwords ...

Cascade is a Windows machine that just got retired. This had got an active directory which we will try to penetrate in and get the admin privilege. Let’s begin with the nmap scan sudo nmap -sS -sV 10.10.10.182 After doing the map enumeration, I decided to try LDAP enumeration using ldapsearch ldapsearch -x -b “dc=CASCADE, dc=local” -h 10.10.10.182 From this ...

Exit mobile version