githubEdit

Configuring

Complete the "Configuration" part of each of these pages to build the second attack path of the lab. Completing the "Attacking" part is NOT Required! These are added to give as an example on how the misconfigurations could be exploited.

circle-info

We recommend completing the pages in order.

Enumerate Loginschevron-rightAS-REP Roastingchevron-rightNormal domain user accesschevron-rightImpersonationchevron-rightDB-Ownerchevron-rightExecuting Commandschevron-rightChange-LockScreenchevron-rightDatabase-Linkschevron-rightCapturing hashes & Relayingchevron-rightWrite Ownerchevron-rightDumping DPAPIchevron-rightBackup Operatorschevron-right

Last updated