HackTheBox - Resolute
00:00 - Intro
01:08 - Talking about my switch to Parrot
02:00 - Begin of nmap, discovering it is likely a Windows Domain Controller
04:30 - Checking if there are any open file shares
06:11 - Using RPCClient to enumerate domain users (enumdomusers)
07:55 - Using CrackMapExec to dump the PasswordPolicy
08:45 - Using RPCClient to dump Active Directory information (querydispinfo)
10:45 - Bruteforcing accounts via CrackMapExec with password of Welcome123!
14:30 - Using Evil-WinRM to remote into the server as Melanie
15:40 - Building the latest version of Seatbelt on CommandoVM (The DotNet version is incompatible)
17:40 - Explaining some cool bash one line tricks, then linking Egypt's "One liners to rule them all" talk
24:40 - Changing Seatbelt to compile to Version 4.0 then trying again.
26:30 - Finally examining the Seatbelt output, see the PSTranscript Directory and a Custom group in DNSAdmins
29:50 - Using RPCClient to Enumerate members of the Contractors group (enumdomgroups/querygroupmem)
35:30 - Running WinPEAS to compare the differences
38:30 - Exploring hidden directories to see PSTranscripts, then finding credentials in a powershell log
44:20 - Using Evil-WinRM with the password from a PSTranscript File to get shell as Ryan
45:40 - Quickly going over how to execute code on a Domain Controller as a DNS Admin
46:10 - Using MSFVenom to create a Reverse Shell DLL (we'll do this better at end of the video)
49:10 - Using DNSCMD to have the DNS Server execute our MSFVenom created DLL from a SMB Network Path... Works but hangs the DNS Server
52:50 - Using the DNS-EXE-Persistance to help us create a better to do the Reverse Shell
53:03 - Explaining the DNSCMD Exploit path on how it can be used both foor lateral movement and privesc
54:50 - Start of creating the DLL to use with this DNS Exploit
56:45 - Grabbing a C++ Reverse Shell program from github to add to our DNS Exploit Project, then modify it to execute as a thread
01:02:20 - Showing that we get a Reverse shell an
Watch on YouTube ↗
(saves to browser)
Sign in to unlock AI tutor explanation · ⚡30
Playlist
Uploads from IppSec · IppSec · 0 of 60
← Previous
Next →
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
HHC2016 - Analytics
IppSec
HackTheBox - October
IppSec
HackTheBox - Arctic
IppSec
HackTheBox - Brainfuck
IppSec
HackTheBox - Bank
IppSec
HackTheBox - Joker
IppSec
HackTheBox - Lazy
IppSec
Camp CTF 2015 - Bitterman
IppSec
HackTheBox - Devel
IppSec
Reversing Malicious Office Document (Macro) Emotet(?)
IppSec
HackTheBox - Granny and Grandpa
IppSec
HackTheBox - Pivoting Update: Granny and Grandpa
IppSec
HackTheBox - Optimum
IppSec
HackTheBox - Charon
IppSec
HackTheBox - Sneaky
IppSec
HackTheBox - Holiday
IppSec
HackTheBox - Europa
IppSec
Introduction to tmux
IppSec
HackTheBox - Blocky
IppSec
HackTheBox - Nineveh
IppSec
HackTheBox - Jail
IppSec
HackTheBox - Blue
IppSec
HackTheBox - Calamity
IppSec
HackTheBox - Shrek
IppSec
HackTheBox - Mirai
IppSec
HackTheBox - Shocker
IppSec
HackTheBox - Mantis
IppSec
HackTheBox - Node
IppSec
HackTheBox - Kotarak
IppSec
HackTheBox - Enterprise
IppSec
HackTheBox - Sense
IppSec
HackTheBox - Minion
IppSec
VulnHub - Sokar
IppSec
VulnHub - Pinkys Palace v2
IppSec
HackTheBox - Inception
IppSec
Vulnhub - Trollcave 1.2
IppSec
HackTheBox - Ariekei
IppSec
HackTheBox - Flux Capacitor
IppSec
HackTheBox - Jeeves
IppSec
HackTheBox - Tally
IppSec
HackTheBox - CrimeStoppers
IppSec
HackTheBox - Fulcrum
IppSec
HackTheBox - Chatterbox
IppSec
HackTheBox - Falafel
IppSec
How To Create Empire Modules
IppSec
HackTheBox - Nightmare
IppSec
HackTheBox - Nightmarev2 - Speed Run/Unintended Solutions
IppSec
HackTheBox - Bart
IppSec
HackTheBox - Aragog
IppSec
HackTheBox - Valentine
IppSec
HackTheBox - Silo
IppSec
HackTheBox - Rabbit
IppSec
HackTheBox - Celestial
IppSec
HackTheBox - Stratosphere
IppSec
HackTheBox - Poison
IppSec
HackTheBox - Canape
IppSec
HackTheBox - Olympus
IppSec
HackTheBox - Sunday
IppSec
HackTheBox - Fighter
IppSec
HackTheBox - Bounty
IppSec
More on: Security Basics
View skill →Related AI Lessons
⚡
⚡
⚡
⚡
What Is YubiKey Authentication & How It Works
Dev.to · Mrunank Pawar
I Used to Ignore “Boring” Vulnerabilities… Until One Paid More Than a Critical
Medium · Data Science
I Used to Ignore “Boring” Vulnerabilities… Until One Paid More Than a Critical
Medium · Programming
How to secure your macOS games
Dev.to · GuardingPearSoftware
Chapters (25)
Intro
1:08
Talking about my switch to Parrot
2:00
Begin of nmap, discovering it is likely a Windows Domain Controller
4:30
Checking if there are any open file shares
6:11
Using RPCClient to enumerate domain users (enumdomusers)
7:55
Using CrackMapExec to dump the PasswordPolicy
8:45
Using RPCClient to dump Active Directory information (querydispinfo)
10:45
Bruteforcing accounts via CrackMapExec with password of Welcome123!
14:30
Using Evil-WinRM to remote into the server as Melanie
15:40
Building the latest version of Seatbelt on CommandoVM (The DotNet version is i
17:40
Explaining some cool bash one line tricks, then linking Egypt's "One liners to
24:40
Changing Seatbelt to compile to Version 4.0 then trying again.
26:30
Finally examining the Seatbelt output, see the PSTranscript Directory and a Cu
29:50
Using RPCClient to Enumerate members of the Contractors group (enumdomgroups/q
35:30
Running WinPEAS to compare the differences
38:30
Exploring hidden directories to see PSTranscripts, then finding credentials in
44:20
Using Evil-WinRM with the password from a PSTranscript File to get shell as Ry
45:40
Quickly going over how to execute code on a Domain Controller as a DNS Admin
46:10
Using MSFVenom to create a Reverse Shell DLL (we'll do this better at end of t
49:10
Using DNSCMD to have the DNS Server execute our MSFVenom created DLL from a SM
52:50
Using the DNS-EXE-Persistance to help us create a better to do the Reverse She
53:03
Explaining the DNSCMD Exploit path on how it can be used both foor lateral mov
54:50
Start of creating the DLL to use with this DNS Exploit
56:45
Grabbing a C++ Reverse Shell program from github to add to our DNS Exploit Pro
1:02:20
Showing that we get a Reverse shell an
🎓
Tutor Explanation
DeepCamp AI