Advent of Cyber 2024 Day 15: Be it ever so heinous, there’s no place like Domain Controller.

Lab link.

Questions

1. On what day was Glitch_Malware last logged in?

Answer format: DD/MM/YYYY

2. What event ID shows the login of the Glitch_Malware user?

3. Read the PowerShell history of the Administrator account. What was the command that was used to enumerate Active Directory users?

notepad “$env:APPDATA\Microsoft\Windows\PowerShell\PSReadLine\ConsoleHost_history.txt”

4. Look in the PowerShell log file located in Application and Services Logs -> Windows PowerShell. What was Glitch_Malware’s set password?

5. Review the Group Policy Objects present on the machine. What is the name of the installed GPO?

Get-GPO -All

Bir yanıt yazın

E-posta adresiniz yayınlanmayacak. Gerekli alanlar * ile işaretlenmişlerdir