All Posts

  • Published on
    Enumerating SMB shares from given credentials reveals a hint about CVE-2025-24071 which leaks an NTLM hash then using that credential to map out ACE misconfigurations in Bloodhound which shows that the user has 'GenericAll' permission on 'Service Accounts' group. Using Shadow Credentials technique to gather NT hashes for Service Accounts then discovering that the CA issued a ceritificate vulnerable to ESC16. Thus, gaining Domain Admin.
  • Published on
    Anonymous SMB access is allowed which leads to a password leak and also to RID Bruteforcing that reveals available users. Enumerating those again reveals a Powershell script with credentials enabling user access. The current user has SeBackupPrivilege enabled which allows for dumping NTLM hashes including Domain Admin's.
  • Published on
    Discovered SNMP service on UDP port which reveals a daloRADIUS server web app with default credentials. Gained user access by credentials leak in the dashboard. User was allowed to run mosh-server with sudo permissions which enabled us to start a mosh-client and gain root access.