July 5, 2023, 3:41 p.m. | RUFUS PELIGEY

InfoSec Write-ups - Medium infosecwriteups.com

Exploiting Active Directory — (TryHackMe) THM Attacktive Directory Lab

ENUMERATION

We first start by running a masscan on all ports (65535).

sudo masscan -p1-65535 10.10.245.16 --rate=1000 -e tun0 > THM_attacktive_directory

-p = specifies the port

— rate = specifies the speed

e = specifies the network interface

We used the cat command to view the file.

We wrote a customized bash script to automate the scanning process

  1. In icon (1), we’re storing the output of the command in a variable …

active directory cat command ctf-writeup directory exploiting file kerberos lab masscan network penetration testing port ports rate running start sudo thm tryhackme tryhackme-walkthrough

Social Engineer For Reverse Engineering Exploit Study

@ Independent study | Remote

Application Security Engineer - Remote Friendly

@ Unit21 | San Francisco,CA; New York City; Remote USA;

Cloud Security Specialist

@ AppsFlyer | Herzliya

Malware Analysis Engineer - Canberra, Australia

@ Apple | Canberra, Australian Capital Territory, Australia

Product CISO

@ Fortinet | Sunnyvale, CA, United States

Manager, Security Engineering

@ Thrive | United States - Remote