(Quote)
you can’t fix it really. Its a problem on this box for some reason… it just stops accepting connections on that port. Reset it several times and hope for the best or report it to HTB and hopefully they’ll take it more seriously than when I reported it a while ago
This was what had made me stuck on the box for so long. What’s weird was I couldn’t even see the service running in my scans. Eventually, what had worked for me was changing my server .
I had an absolute heck of a time using the evil one and uploading the peas and carrots. I could not execute, just error after error after error. I couldn’t execute the exe. I really don’t know what I am doing wrong. Oh well. Keep trying. Even tried the full path to the file, still nothing. Try Harder I suppose!
I have creds for 3 User accounts but login only works with one of them.
The account starting with s… has a long PW starting with Mo…
But i cannot login with that account. Is the box stuck?
Possibly. You should be able to connect with that sc account via e**-w***m.
Hello,
I am in the same situation as nobyl. Got s** password but unable to login …
Box was reseted 3 times and I still can’t, is there soemthing I’m missing?
Edit: got shell, had to find logon username for this account.
That was my first windows box and i pwned it and i learned many new things i didn’t know before!
for the foothold: try to think as an admin, or you can read about how companies refers to employees names in emails.
for user: I really missed chicken roasting! Try to roast something.
for root: winPEAS.exe will help you in basic enumeration then find the wanted AD attack!
I had a really hard time with this box and in the end one method for root worked while another didn’t and I do not really understand why. If anyone wants to PM me with information or answers to my questions it would be great!
guys I am stuck. I’ve tried every possible way to login using s**_****** and it’s just not happening. got user flag and used all of hades pet’s tools and im turning up nothing. any help is extremely appreciated. been going all morning on this one
Great box! Thank you @egotisticalSW I am not great with AD and I had to learn a lot. But that’s what wea re all here for. Here are my tips:
User: Sometimes you can’t just get the users. Sometimes you have to use OSINT and make a list yourself. Then find a way to check your work.
Root: I found more creds. I used them on a tool to help me dump a bunch of secrets.
Feel free to PM for nudges.
Hello, Can someone PM me?
This is my first windows box and I’m stucked.
DId basics network, web and ldap enumeration. I don’t know which protocol must be the vulnerable target… And do want to be on the wrong path!
Thank you in advance
User: Enumerate and Google 4 common ActiveDiretory exploitation techniques.
Root: Take a walk through the Forest. Some key techniques should lead you to the right path.