Configuring

Complete the "Configuration" part of each of these pages to build the second attack path of the lab. Completing the "Attacking" part is NOT Required! These are added to give as an example on how the misconfiguration can be exploited.

We recommend completing the pages in order.

pageUsername EnumerationpagePassword SprayingpageUnqouted Service PathpageServices (todo)pageDiscovering SharespagePassword on sharespageForceChangePasswordpageConstrained DelegationpageUnconstrained DelegationpageTrust keypageForeign userpageWriteDaclpageGet-Changes

Last updated