HackTheBox - APT
00:00 - Intro
01:42 - Start of nmap and poking at the webserver
09:45 - Looking into MSRPC, showing MSF info overflow which is why I had historically ignored it
14:10 - Poking at RPC with Impacket's RPCMap
18:30 - Converting a RPC Script to get IPv6 address from Python2 to Python3
20:15 - Using nmap to scan the IPv6 Address
22:30 - Showing how I would enumerate a Firewall, nothing works here but something I do.
27:30 - Finding SMB accepts anonymous users and contains an Active Directory Backup
32:45 - Using Impacket's SecretsDump to extract the NTDS.DIT with password last set, user status, and history
41:15 - Using KerBrute to enumerate valid users on the box based upon the AD Backup
49:15 - Using PyKerbrute to bruteforce Henry.Vinson's account
1:04:00 - Using Socat + CrackMapExec to enumerate IPv6 (if i updated CME, it would be able to do IPv6)
1:08:00 - Using Impacket's reg.py to query Windows Registry remotely from linux
1:17:30 - Using Evil-WINRM to run WinPEAS/Seatbelt and bypass AMSI
1:26:00 - Some good information talking about LmCompatibilityLevel and NetNTLMv1
1:29:15 - Unintended method. Using Defender to make a SMB Request then decrypting the NetNTLM-v1 hash
1:30:50 - Editing responder to use a pre-set challenge (1122334455667788 used by Crack.SH)
1:35:30 - Modifying RoguePotato to allow for IPv6
1:41:15 - RoguePotato flagged by defender... Some weird AV Bypass...
1:48:30 - Showing the Compiler flags will make RoguePotato undetectable by defender
1:58:05 - RoguePotato working, lets start modifying impacket to allow us to stand up an RPC Server
2:21:03 - Start debugging our impacket studd with pdb set_trace
2:30:00 - Got the NetNTLM v1 hash from Rogue Potato
2:39:50 - Cleaning up notes
Watch on YouTube ↗
(saves to browser)
Sign in to unlock AI tutor explanation · ⚡30
Playlist
Uploads from IppSec · IppSec · 0 of 60
← Previous
Next →
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
HHC2016 - Analytics
IppSec
HackTheBox - October
IppSec
HackTheBox - Arctic
IppSec
HackTheBox - Brainfuck
IppSec
HackTheBox - Bank
IppSec
HackTheBox - Joker
IppSec
HackTheBox - Lazy
IppSec
Camp CTF 2015 - Bitterman
IppSec
HackTheBox - Devel
IppSec
Reversing Malicious Office Document (Macro) Emotet(?)
IppSec
HackTheBox - Granny and Grandpa
IppSec
HackTheBox - Pivoting Update: Granny and Grandpa
IppSec
HackTheBox - Optimum
IppSec
HackTheBox - Charon
IppSec
HackTheBox - Sneaky
IppSec
HackTheBox - Holiday
IppSec
HackTheBox - Europa
IppSec
Introduction to tmux
IppSec
HackTheBox - Blocky
IppSec
HackTheBox - Nineveh
IppSec
HackTheBox - Jail
IppSec
HackTheBox - Blue
IppSec
HackTheBox - Calamity
IppSec
HackTheBox - Shrek
IppSec
HackTheBox - Mirai
IppSec
HackTheBox - Shocker
IppSec
HackTheBox - Mantis
IppSec
HackTheBox - Node
IppSec
HackTheBox - Kotarak
IppSec
HackTheBox - Enterprise
IppSec
HackTheBox - Sense
IppSec
HackTheBox - Minion
IppSec
VulnHub - Sokar
IppSec
VulnHub - Pinkys Palace v2
IppSec
HackTheBox - Inception
IppSec
Vulnhub - Trollcave 1.2
IppSec
HackTheBox - Ariekei
IppSec
HackTheBox - Flux Capacitor
IppSec
HackTheBox - Jeeves
IppSec
HackTheBox - Tally
IppSec
HackTheBox - CrimeStoppers
IppSec
HackTheBox - Fulcrum
IppSec
HackTheBox - Chatterbox
IppSec
HackTheBox - Falafel
IppSec
How To Create Empire Modules
IppSec
HackTheBox - Nightmare
IppSec
HackTheBox - Nightmarev2 - Speed Run/Unintended Solutions
IppSec
HackTheBox - Bart
IppSec
HackTheBox - Aragog
IppSec
HackTheBox - Valentine
IppSec
HackTheBox - Silo
IppSec
HackTheBox - Rabbit
IppSec
HackTheBox - Celestial
IppSec
HackTheBox - Stratosphere
IppSec
HackTheBox - Poison
IppSec
HackTheBox - Canape
IppSec
HackTheBox - Olympus
IppSec
HackTheBox - Sunday
IppSec
HackTheBox - Fighter
IppSec
HackTheBox - Bounty
IppSec
Related AI Lessons
⚡
⚡
⚡
⚡
Virtual Keyboard Login with PingOne Advanced Identity Cloud
Medium · Cybersecurity
Why Businesses Quietly Accept Technology Friction as “Normal”
Medium · Cybersecurity
The Model You Just Downloaded Might Own Your Network — What I Learned Building Defenses Against AI…
Medium · Cybersecurity
I Found Backdoored AI Models on Hugging Face — And So Has Everyone Else Who Bothered to Look
Medium · Cybersecurity
Chapters (24)
Intro
1:42
Start of nmap and poking at the webserver
9:45
Looking into MSRPC, showing MSF info overflow which is why I had historically
14:10
Poking at RPC with Impacket's RPCMap
18:30
Converting a RPC Script to get IPv6 address from Python2 to Python3
20:15
Using nmap to scan the IPv6 Address
22:30
Showing how I would enumerate a Firewall, nothing works here but something I d
27:30
Finding SMB accepts anonymous users and contains an Active Directory Backup
32:45
Using Impacket's SecretsDump to extract the NTDS.DIT with password last set, u
41:15
Using KerBrute to enumerate valid users on the box based upon the AD Backup
49:15
Using PyKerbrute to bruteforce Henry.Vinson's account
1:04:00
Using Socat + CrackMapExec to enumerate IPv6 (if i updated CME, it would be ab
1:08:00
Using Impacket's reg.py to query Windows Registry remotely from linux
1:17:30
Using Evil-WINRM to run WinPEAS/Seatbelt and bypass AMSI
1:26:00
Some good information talking about LmCompatibilityLevel and NetNTLMv1
1:29:15
Unintended method. Using Defender to make a SMB Request then decrypting the N
1:30:50
Editing responder to use a pre-set challenge (1122334455667788 used by Crack.S
1:35:30
Modifying RoguePotato to allow for IPv6
1:41:15
RoguePotato flagged by defender... Some weird AV Bypass...
1:48:30
Showing the Compiler flags will make RoguePotato undetectable by defender
1:58:05
RoguePotato working, lets start modifying impacket to allow us to stand up an
2:21:03
Start debugging our impacket studd with pdb set_trace
2:30:00
Got the NetNTLM v1 hash from Rogue Potato
2:39:50
Cleaning up notes
🎓
Tutor Explanation
DeepCamp AI