THM Post Exploitation Basics - grunt92/IT-Sec-WriteUps GitHub Wiki
Introduction
Deploy the Machine
No answer needed
Enumeration w/ Powerview
What is the shared folder that is not set by default?
Run Invoke-Sharefinder
.
Share
What operating system is running inside of the network besides Windows Server 2019?
Run Get-NetComputer -fulldata | select operatingsystem
.
Windows 10 Enterprise Evaluation
I've hidden a flag inside of the users find it
Run Get-NetUser | select cn
Enumeration w/ Bloodhound
What service is also a domain admin
SQLService
What two users are Kerberoastable?
SQLService,krbtgt
Dumping hashes w/ mimikatz
What is the Machine1 Password?
Password1
What is the Machine2 Hash?
c39f2beb3d2ec06a62cb887fb391dee0
Golden Ticket Attacks w/ mimikatz
I understand how a golden ticket attack works and how to use a golden ticket attack to move through a network
No answer needed
Enumeration w/ Server Manager
What tool allows to view the event logs?
Event Viewer
What is the SQL Service password
MYpassword123#
Maintaining Access
I understand how to install a backdoor on a system using the persistence module
No answer needed
Conclusion
I understand the basics of post-exploitation
No answer needed