Offensive Security 33

Freelancer: a hard HackTheBox machine
Hard HackTheBox Overview Freelancer is a hard box with a creative initial access chain through a freelancing web application. A logical flaw in the password reset flow lets you activate a...

Search: a hard HackTheBox machine
Hard HackTheBox Overview Search is a hard Active Directory box. Initial access comes from a password visible in an image on the web server. From there it’s kerberoasting, password sprayin...

BlackField: a Hard HackTheBox machine
Hard HackTheBox Overview Blackfield is a hard Active Directory box. Guest access lets you enumerate usernames, AS-REP roasting gives you an initial foothold, and a ForceChangePassword edg...

Vintage: a hard HackTheBox machine
Hard HackTheBox Overview Vintage is a hard assumed-breach Active Directory box. You start with credentials for a low-privileged user in a domain where NTLM is disabled, forcing kerberos-o...

Cascade: A medium HackTheBox machine
Medium HackTheBox Overview Cascade is a medium Active Directory box and probably my most detailed writeup in terms of methodology. A legacy password attribute left in LDAP gives the first ...

Olympie: an Advanced AD enterprise forest from secdojo
Advanced Secdojo Overview This lab replicates the complexity of a modern enterprise IT environment by bringing together a variety of interconnected machines. You’ll need extensive recon...

AD105: an Advanced AD enterprise forest from secdojo
Advanced Secdojo Overview This writeup covers a full compromise of the AD105 lab from Secdojo — a multi-forest Active Directory environment spanning three forests (SOKOLO, LONIPO, BORIT...

Sweep: A medium HackTheBox machine
Medium HackTheBox Overview Sweep is a medium Active Directory box built around Lansweeper, an IT asset management platform. Guest access leaks usernames, a generic account gets you in, an...

Sneep: an Intermediate Windows machine from secdojo
Intermediate Secdojo Overview A lab designed to test your skills in network reconnaissance, enumeration, and exploitation of a Windows system. It presents a realistic scenario where you...

AD104: an Intermediate AD enterprise forest from secdojo
Intermediate Secdojo Overview An advanced Active Directory enterprise forest, challenging you to pivot from exposed data to full forest compromise by abusing modern AD security features...

AD103: an Intermediate AD enterprise forest from secdojo
Intermediate Secdojo Overview An Active Directory enterprise environment focused on chaining vector attacks, from abusing weak permissions to compromising core enterprise services. Rec...

VulnCicada: a medium HackTheBox machine
Medium HackTheBox Overview VulnCicada is a medium Active Directory box where NTLM is disabled. An NFS share exposed to everyone leaks usernames and a password hidden in an image. From the...

Tombwatcher: a medium HackTheBox machine
Medium HackTheBox Overview Tombwatcher is a medium assumed-breach Active Directory box. Starting with low-privileged domain credentials, the path involves DPAPI credential decryption, lat...

Forest: an easy HackTheBox machine
Easy HackTheBox Overview Forest is an easy Active Directory box. Null session LDAP enumeration gets you usernames, AS-REP roasting gives you a foothold, and bloodhound reveals a path thro...

Baby: an easy HackTheBox machine
Easy HackTheBox Overview Baby is an easy Active Directory box. Null session LDAP enumeration reveals a password in a user’s description field. A bit of digging finds two users that weren’...

Jenough: an Intermediate Windows machine from secdojo
Intermediate Secdojo Overview Conduct a full penetration test in an Active Directory environment. This lab challenges you to identify misconfigurations, test password security, and esca...

Maze: an Intermediate mixed lab from secdojo
Intermediate Secdojo Overview An Active Directory lab that illustrates a Kerberos attack vector impacting user account attributes. You will need to make your way through the maze before...

Arkhaion: an Easy ADCS lab from secdojo
Easy Secdojo Overview An ADCS lab that covers extensive enumeration and privilege escalation. Reconnaissance Note: This writeup moves quickly through reconnaissance. For a detailed b...

Elixir: an Easy ADCS lab from secdojo
Easy Secdojo Overview Perform a penetration test in a typical Active Directory attack scenario, challenging you to enumerate users, exploit misconfigurations, and escalate privileges to g...

Ocean: an Intermediate AD lab from secdojo
Intermediate Secdojo Overview A lab that offers a vulnerable environment to experiment with some of the common Windows and Active Directory security flaws Reconnaissance Note: This...

Tabby: an Intermediate AD lab from secdojo
Intermediate Secdojo Overview A lab that challenges your skills in exploiting misconfigurations and escalating privileges in a Windows environment. You will need to apply your knowledge...

Talk2me: an Intermediate Windows lab from secdojo
Intermediate Secdojo Overview In this lab you’ll navigate a small network, find misconfigurations, and move laterally to capture the flags. Reconnaissance Note: This writeup moves ...

AD102: an Easy AD lab from secdojo
Easy Secdojo Overview A beginner Active Directory enterprise forest vulnerable to some CVEs, challenging you to pivot from a domain to another by abusing these kind of vulnerabilities. R...

AD101: an Easy AD lab from secdojo
Easy Secdojo Overview A highly realistic Active Directory scenario focused on initial access via misconfigured user accounts and lateral movement through credential reuse. Reconnaissance...

AD100: an Easy AD lab from secdojo
Easy Secdojo Overview A highly realistic Active Directory environment where you can practice basic enumeration and exploit misconfigurations. Reconnaissance Note: This writeup moves ...

Ease: an Easy AD lab from secdojo
Easy Secdojo Overview This lab serves as an environment with vulnerabilities that will grant you Domain Admin access in a couple of minutes, but has other vulnerabilities that need to be ...

Kiosk: an Easy Windows kiosk escape from secdojo
Easy Secdojo Overview A Windows kiosk escape challenge. The machine runs in kiosk mode with a restricted browser-based interface. The objective is to break out of the kiosk environment an...

Legacy: an Easy MSSQL lab from secdojo
Easy Secdojo Overview The IT Team was tasked to plan a database upgrade for a critical application. The application being very old, the DBA has kept the authorization layer unchanged. R...

Roaster: an Intermediate AD lab from secdojo
Intermediate Secdojo Overview This Lab is a Windows environment for exploring and exploiting delegation vulnerabilities and more, sharpening your skills in Active Directory. Reconnaiss...

Dumper: an Easy Windows machine from secdojo
Easy Secdojo Overview This lab challenges your skills in exploiting misconfigurations and insecure practices in Windows Server environments. You will need to apply techniques like analyzi...

EggShell: an Easy Windows machine from secdojo
Easy Secdojo Overview A lab that tests your ability to identify and exploit known vulnerabilities in Windows Server environments. You will need to apply your skills in reconnaissance, enu...

Rejetto: an Easy Windows machine from secdojo
Easy Secdojo Overview A lab that challenges your skills in exploiting vulnerable Windows services. You will need to apply your knowledge of known vulnerabilities and use appropriate tools...

Veridianth: an Easy Windows machine from secdojo
Easy Secdojo Overview This lab challenges your abilities in penetration testing a Windows Active Directory environment. You must apply advanced techniques to gain initial access, escalate...