From 1e2051e28e7410f00dd0b70c4cb42d4daa4d133e Mon Sep 17 00:00:00 2001 From: syselement <81392234+syselement@users.noreply.github.com> Date: Tue, 16 Jul 2024 19:28:25 +0200 Subject: [PATCH] update --- SUMMARY.md | 6 ++++++ peh/3-eth-hack/enum.md | 6 +++++- peh/3-eth-hack/exploit.md | 4 ++++ peh/4-active-directory/1-ad-lab.md | 8 ++++---- peh/4-active-directory/README.md | 12 ++++++------ 5 files changed, 25 insertions(+), 11 deletions(-) diff --git a/SUMMARY.md b/SUMMARY.md index 1fbcf82..310bf20 100644 --- a/SUMMARY.md +++ b/SUMMARY.md @@ -72,6 +72,12 @@ - [Exploitation Basics](peh/3-eth-hack/exploit.md) - [Capstone Practical Labs](peh/3-eth-hack/capstone.md) - [4. Active Directory](peh/4-active-directory/README.md) + - [Active Directory Lab](peh/4-active-directory/1-ad-lab.md) + - [AD - Initial Attack Vectors](peh/4-active-directory/2-ad-init-vectors.md) + - [AD - Post-Compromise Enumeration](peh/4-active-directory/3-ad-enum.md) + - [AD - Post-Compromise Attacks](peh/4-active-directory/4-ad-attacks.md) + - [AD - Additional Attacks](peh/4-active-directory/5-ad-adv-attacks.md) + - [AD - Case Studies](peh/4-active-directory/6-ad-casestudies.md) - [5. Post Exploitation](peh/5-post-exploitation/README.md) - [6. Web Application](peh/6-webapp/README.md) - [7. Wireless Attacks](peh/7-wireless/README.md) diff --git a/peh/3-eth-hack/enum.md b/peh/3-eth-hack/enum.md index eff3569..3a43ad3 100644 --- a/peh/3-eth-hack/enum.md +++ b/peh/3-eth-hack/enum.md @@ -262,6 +262,8 @@ nikto -h http://192.168.31.130 > > - _smb2-time: Protocol negotiation failed (SMB2) +### Metasploit + ➡️ [Metasploit](https://docs.metasploit.com/) ```bash @@ -282,6 +284,8 @@ run [*] Auxiliary module execution completed ``` +### smbclient + ➡️ [smbclient](https://www.samba.org/samba/docs/current/man-html/smbclient.1.html) > Quick fix for some errors @@ -370,7 +374,7 @@ Search Google for vulnerabilities on the services versions, e.g. ` - 60 GB Disk space > - 16 GB RAM -- Proceed with installing a Windows Server 2022 VM and two Windows 10 VMs. +- Proceed with installing a Windows Server 2022 VM and two Windows 10 VMs inside VMware - For each of them install the VMware tools - +--- ## Windows Server 2022 @@ -50,7 +50,7 @@ setspn -T MARVEL.local -Q */* ![](.gitbook/assets/2024-07-15_23-41-00_638.png) - +--- ## Windows 10 @@ -66,7 +66,7 @@ setspn -T MARVEL.local -Q */* - `Edit local users and groups` - Reset password and enable local `Administrator`:`Password1!` - - Add the domain user to the Administrators group + - Add the domain users to the Administrators group - `fcastle` for `THEPUNISHER` VM - `fcastle` and `pparker` for `SPIDERMAN` VM diff --git a/peh/4-active-directory/README.md b/peh/4-active-directory/README.md index ff00614..bb44dc2 100644 --- a/peh/4-active-directory/README.md +++ b/peh/4-active-directory/README.md @@ -114,12 +114,12 @@ ## Sections -1. [Active Directory Lab](1-ad-lab.md) -1. [AD - Initial Attack Vectors](2-ad-init-vectors.md) -1. [AD - Post-Compromise Enumeration](3-ad-enum.md) -1. [AD - Post-Compromise Attacks](4-ad-attacks.md) -1. [AD - Additional Attacks](5-ad-adv-attacks.md) -1. [AD - Case Studies](6-ad-casestudies.md) +1. Active Directory Lab +1. AD - Initial Attack Vectors +1. AD - Post-Compromise Enumeration +1. AD - Post-Compromise Attacks +1. AD - Additional Attacks +1. AD - Case Studies ---