Lab it up!
Lab It Up
Time to Play -
Now that you've learned about Zero Logon, it's time to put your new found skills to the test and exploit this vulnerable Domain Controller!
Ctrl+Z -
After you get done, if you want to play around some more, instead of terminating the machine, you can simply issue the following command to reset the machine back to it's original state:
powershell.exe -c 'Reset-ComputerMachinePassword'
If you're confused on how to issue the command, you can simply Pass The Local Admin Hash with Evil-WinRM to gain command execution. You can do so with the following command:
evil-winrm -u Administrator -H <Local Admin Hash> -i <Machine IP>
What is the NetBIOS name of the Domain Controller?
What is the NetBIOS domain name of the network?
What domain are you attacking? SubmitWhat is the Local Administrator's NTLM hash?
How many Domain Admin accounts are there?
What is the root flag?
Last updated
Was this helpful?