πͺAttacktive Directory
99% of Corporate networks run off of AD. But can you exploit a vulnerable Domain Controller?
Room Attributes
Value
Task 1 Intro Deploy The Machine
Task 2 Intro Setup
Task 3 Enumeration Welcome to Attacktive Directory
Task 3 - Welcome to Attacktive DirectoryTask 4 Enumeration Enumerating Users via Kerberos
Task 4 - Enumerating Users via KerberosTask 5 Exploitation Abusing Kerberos
Task 5 - Abusing KerberosTask 6 Enumeration Back to the Basics
Task 6 - Back to the BasicsTask 7 Domain Privilege Escalation Elevating Privileges within the Domain
Task 7 - Elevating Privileges within the DomainTask 8 Flag Submission Flag Submission Panel
Task 8 - Flag Submission PanelLast updated
