Tag ldapsearch

BLACKFIELD – HACKTHEBOX

This is the Write-up/Walkthrough of the BLACKFIELD Active Directory Machine from Hackthebox. NMAP SCAN: Domain: BLACKFIELD.LOCAL, BIOS NAME: DC01 Shares found on SMB: Interacting with profiles$ share, found a list of empty directories, with username, copied all the output, saved it to…

BABY – VULNLAB

This is the Write-up/Walkthrough of the BABY Machine from VULNLAB. NMAP SCAN: Domain: baby.vl, BIOS Name: BabyDC Looking for smb, tried connecting to it as anonymous, but it was not allowed, looking forward, i used ldapsearch to enumerate the domain with blank…

RESOLUTE – HACKTHEBOX

This is the Write-up/Walkthrough of the RESOLUTE Machine from Hackthebox. NMAP SCAN: Domain found: megabank.local, BIOS Name: Resolute No file shares were found on smb, after I used ldapsearch to find more info about the domain, redirected the output to the…

SUPPORT – HACKTHEBOX

This is the Writeup/Walkthrough of the SUPPORT Machine from Hackthebox. nmap scan: ON smb, found 3 shares, on suppported-tools directory, downloaded UserInfo.exe.zip, extracted the all files, and used dnSpy to debug the UserInfo.exe file, after debugging found a password for…

Forest Writeup | HackTheBox

nmap scan: Domain: htb.local Host: FOREST Enumerating users with enum4linux and ldapsearch using ldapsearch to enumerate users and groups after getting the users, save the users in a file, after that, i used getNPUsers tool of impacket to get the…