Configuring
Complete the "Configuration" part of each of these pages to build the second attack path of the lab. Completing the "Attacking" part is NOT Required! These are added to give as an example on how the misconfigurations could be exploited.
Enumerate LoginsAS-REP RoastingNormal domain user accessImpersonationDB-OwnerExecuting CommandsChange-LockScreenDatabase-LinksCapturing hashes & RelayingWrite OwnerDumping DPAPIBackup OperatorsLast updated