July 4, 2024, 11:30 a.m. | David Eduardo Karpinski

System Weakness - Medium systemweakness.com

Hello everyone!

Today, I’ll guide you through the TryHackMe Attacktive Directory room, where we’ll exploit a vulnerable Domain Controller. Let’s dive in!

Setup Script

First, we need to install the necessary tools for the attack, if you haven’t already done so.

sudo apt-get update -y && sudo apt-get upgrade -y

sudo git clone https://github.com/SecureAuthCorp/impacket.git /opt/impacket

sudo pip3 install -r /opt/impacket/requirements.txt

cd /opt/impacket/

sudo pip3 install .

sudo python3 setup.py install

sudo apt-get install bloodhound neo4j

Scanning

As with …

active directory hacking pentesting tryhackme windows

Principal Architect - LINUX - Active Top Secret Required

@ General Dynamics Information Technology | USA DC Washington - Customer Proprietary (DCC076)

Expert SOAR (CORTEX)

@ Alter Solutions | PARIS, France

Program Management Analyst

@ Peraton | Arlington, VA, United States

Gestion des menaces et des vulnérabilités

@ Alter Solutions | Paris, France

Senior IAM Security Engineer

@ WEX | Brazil - Remote Office

Senior Information Security Engineer

@ Ameriprise Financial Services | 11071 Ameriprise India - Hyderabad