🚩
THM Walkthroughs
  • THM Walkthroughs
    • πŸ§‘β€πŸ«Tutorial
  • 🟦Difficulty: Info
    • πŸ”ŒWhat is Networking?
    • πŸ”ŒIntro to LAN
    • 🐧Linux Fundamentals
      • 🐧Linux Fundamentals Part 1
        • Task 2 - A Bit of Background on Linux
        • Task 4 - Running Your First few Commands
        • Task 5 - Interacting With the Filesystem!
        • Task 6 - Searching for Files
        • Task 7 - An Introduction to Shell Operators
      • 🐧Linux Fundamentals Part 2
        • Task 3 - Introduction to Flags and Switches
        • Task 4 - Filesystem Interaction Continued
        • Task 5 - Permissions 101
        • Task 6 - Common Directories
      • 🐧Linux Fundamentals Part 3
        • Task 3 - Terminal Text Editors
        • Task 4 - General/Useful Utilities
        • Task 5 - Processes 101
        • Task 6 - Maintaining Your System: Automation
        • Task 8 - Maintaining Your System: Logs
    • πŸͺŸWindows Fundamentals
      • πŸͺŸWindows Fundamentals 1
      • πŸͺŸWindows Fundamentals 2
      • πŸͺŸWindows Fundamentals 3
    • πŸ”“Principles of Security
    • 🐍Python Basics
    • πŸ”History of Malware
    • 🦹Common Attacks
    • πŸ–₯️Security Awareness
    • βš”οΈIntro to Offensive Security
    • 🦹Pentesting Fundamentals
    • πŸ”“CVE Walkthroughs
      • πŸ–₯️Sudo Security Bypass: CVE-2019-14287
      • πŸ–₯️Sudo Buffer Overflow: CVE-2019-18634
      • πŸ–₯️Baron Samedit: CVE-2021-3156
      • πŸ–₯️OverlayFS: CVE-2021-3493
      • πŸ–₯️Polkit: CVE-2021-3560
      • πŸ–₯️Pwnkit: CVE-2021-4034
      • πŸͺΆApache HTTP Server Path Traversal: CVE-2021-41773/42013
      • 🧻Dirty Pipe: CVE-2022-0847
      • 🟒Spring4Shell: CVE-2022-22965
    • 🟧Burp Suite
      • 🟧Burp Suite: The Basics
      • 🟧Burp Suite: Repeater
    • 🏁Challenges
      • ‴️Bypass Disable Functions
    • 🎟️THM PROMOs
      • 🎟️Learn and win prizes [PROMO ENDED]
      • 🎟️Learn and win prizes #2 [PROMO ENDED]
  • 🟩Difficulty: Easy
    • πŸš€Learning Cyber Security
    • πŸ”The Hacker Methodology
    • πŸ”Google Dorking
      • Task 2 - Let's Learn About Crawlers
      • Task 4 - Beepboop - Robots.txt
      • Task 5 - Sitemaps
      • Task 6 - What is Google Dorking?
    • 🐝OWASP Top 10
      • Task 5 - Command Injection Practical
      • Task 7 - Broken Authentication Practical
      • Task 11 - Sensitive Data Exposure (Challenge)
      • Task 13 - XML External Entity - eXtensible Markup Language
      • Task 14 - XML External Entity - DTD
      • Task 16 - XML External Entity - Exploiting
      • Task 18 - Broken Access Control (IDOR Challenge)
      • Task 19 - Security Misconfiguration
      • Task 20 - Cross-site Scripting
      • Task 21 - Insecure Deserialization
      • Task 24 - Insecure Deserialization - Cookies
      • Task 25 - Insecure Deserialization - Cookies Practical
      • Task 30 - Insufficient Logging and Monitoring
    • πŸ“‘Nmap
      • Task 2 - Introduction
      • Task 3 - Nmap Switches
      • Task 5 - TCP Connect Scans
      • Task 6 - Scan Types SYN Scans
      • Task 7 - UDP Scans
      • Task 8 - NULL, FIN and Xmas
      • Task 9 - ICMP Network Scanning
      • Task 10 - NSE Scripts Overview
      • Task 11 - Working with the NSE
      • Task 12 - Searching for Scripts
      • Task 13 - Firewall Evasion
      • Task 14 - Practical
    • πŸ“‘RustScan
      • Task 2 - Installing RustScan
      • Task 5 - Extensible
      • Task 7 - Scanning Time!
      • Task 8 - RustScan Quiz
    • πŸ™Crack the hash
    • 🌍OhSINT
    • πŸ§‘β€πŸš€Vulnversity
    • 🧊Ice
    • πŸͺŸBlue
    • πŸŽ„Advent of Cyber 4 (2022)
  • 🟨Difficulty: Medium
    • πŸͺŸAttacktive Directory
      • Task 3 - Welcome to Attacktive Directory
      • Task 4 - Enumerating Users via Kerberos
      • Task 5 - Abusing Kerberos
      • Task 6 - Back to the Basics
      • Task 7 - Elevating Privileges within the Domain
      • Task 8 - Flag Submission Panel
    • πŸ’€Mr Robot CTF
    • πŸ›—Linux PrivEsc
    • πŸ›—Linux PrivEsc Arena [WIP]
    • πŸ›—Windows PrivEsc Arena
  • 🟧Difficulty: Hard
    • 🐘Hacking Hadoop [WIP]
  • πŸŸ₯Difficulty: Insane
    • β›ΊYou're in a cave [WIP]
  • Blank Room (Duplicate Me)
Powered by GitBook
On this page
  • Task 3 Enumeration Welcome to Attacktive Directory
  • What tool will allow us to enumerate port 139/445?
  • What is the NetBIOS-Domain Name of the machine?
  • What invalid TLD do people commonly use for their Active Directory Domain?
  1. Difficulty: Medium
  2. Attacktive Directory

Task 3 - Welcome to Attacktive Directory

PreviousAttacktive DirectoryNextTask 4 - Enumerating Users via Kerberos

Last updated 2 years ago

Task 3 Enumeration Welcome to Attacktive Directory

What tool will allow us to enumerate port 139/445?

The guide doesn't make it particularly clear what tool you need to use other than so to save you from acquiring mild brain ache just go over to kali tools to read up on .

Reveal Flag

enum4linux

What is the of the machine?

Reveal Flag

THM-AD

What invalid do people commonly use for their Active Directory Domain?

Generic TLDs like .local, .lan, .corp, etc, are now being sold by , so the domain you’re using internally today – company.local could potentially become another company’s property tomorrow.

HINT: The full AD domain is spookysec.local

Reveal Flag

.local

🟨
πŸͺŸ
🚩
🚩
🚩
🚩
🚩
🚩
nmap
enum4linux
NetBIOS-Domain Name
TLD
ICANN