🎫
Active
  • Active
    • Summary
  • Enumeration
    • TCP
    • Web Services
      • Nikto
      • Dirb Extensions
      • Dirsearch
      • goBuster
      • Robots
      • WhatWeb
    • Other Services
      • DNS
      • Kerberos
      • MSRPC
      • SMB
      • LDAP
  • Exploitation
Powered by GitBook
On this page
  1. Active

Summary

Upon initial enumeration of the SMB "Replication" share I was able to come across a Groups.xml file that I was able to decrypt using gpp-decrypt. After decrypting the password I was able to kerberoast the user "Administrator" which was easy dubs.

PreviousActiveNextTCP

Last updated 2 years ago