Resolute

Funbox with like a real AD pentest feeling. I learned a very cool trick that I am gonna remember forever and utilize it whenever I get red team engagement.
Hints:-

User:- Enum and poke on all the ports. You will find some info and think about how less security-savvy users think once the Sysadmin creates their account. That’s it. Overthinking will kill your progress. So keep it simple.

Root:- A technique every pentester/red teamer should have up their sleeve. I recommend reading a lot of offensive security blogs not just for this box but for the entire skill development.

PM for nudges!