all InfoSec news
Exploiting Active Directory — (TryHackMe) THM Attacktive Directory Lab
July 5, 2023, 3:41 p.m. | RUFUS PELIGEY
InfoSec Write-ups - Medium infosecwriteups.com
Exploiting Active Directory — (TryHackMe) THM Attacktive Directory Lab
ENUMERATION
We first start by running a masscan on all ports (65535).
sudo masscan -p1-65535 10.10.245.16 --rate=1000 -e tun0 > THM_attacktive_directory
-p = specifies the port
— rate = specifies the speed
e = specifies the network interface
We used the cat command to view the file.
We wrote a customized bash script to automate the scanning process
- In icon (1), we’re storing the output of the command in a variable …
active directory cat command ctf-writeup directory exploiting file kerberos lab masscan network penetration testing port ports rate running start sudo thm tryhackme tryhackme-walkthrough
More from infosecwriteups.com / InfoSec Write-ups - Medium
Honeypots 101: A Beginner’s Guide to Honeypots
1 day, 16 hours ago |
infosecwriteups.com
Devvortex Hackthebox Walkthrough
2 days, 17 hours ago |
infosecwriteups.com
Port Scanning for Bug Bounties
2 days, 17 hours ago |
infosecwriteups.com
Jobs in InfoSec / Cybersecurity
Social Engineer For Reverse Engineering Exploit Study
@ Independent study | Remote
Application Security Engineer - Remote Friendly
@ Unit21 | San Francisco,CA; New York City; Remote USA;
Cloud Security Specialist
@ AppsFlyer | Herzliya
Malware Analysis Engineer - Canberra, Australia
@ Apple | Canberra, Australian Capital Territory, Australia
Product CISO
@ Fortinet | Sunnyvale, CA, United States
Manager, Security Engineering
@ Thrive | United States - Remote