August 14, 2022 at 11:28 AM August 14, 2022 at 11:46 AM August 14, 2022 at 1:17 PM (August 13, 2022, 10:30 PM)yumi Wrote: if I get users i will warn you here with more details, I tried zero logon the first time, but I didn't realize that it had worked, I always try on a windows machine, and with the name outdated I tried several vulnerabilities zero logon worked and the petitpotam partially worked because there was no way to access certsrv remotely in this machine.(August 13, 2022, 10:27 PM)JINXX Wrote:(August 13, 2022, 09:41 PM)undeadly Wrote: sadly bug on the box. the intended way should be probably dealing with hmail and group policies. in your "list of tryings" you may also include noPac. however, you need to own at least one standard domain user first. Anubis machine was (and still is) vulnerable to noPac -> where it was pretty easy to get a shell on the box and then impersonate admin in under 30 minutes in "Insane" level box. sometimes author just can't cover all windows breaches. https://github.com/Ridter/noPac August 14, 2022 at 1:28 PM (August 14, 2022, 10:34 AM)xiorat89 Wrote:(August 13, 2022, 07:48 PM)fironeDerbert Wrote:(August 13, 2022, 07:43 PM)Hacker2222 Wrote: quick root blood ..... must be cve for insta root? Yes, I did get a response, though I am not entirely sure how one is supposed to leverage that. I tried giving it a link to a follina docx, no luck. August 14, 2022 at 1:57 PM August 14, 2022 at 2:24 PM Im stuck on user August 14, 2022 at 2:45 PM for users just use Follina poc from john hammond. sendemail with attachment or link. change script to download netcat from you and dont from github zero logon patched August 14, 2022 at 3:09 PM August 14, 2022 at 5:37 PM thanks |

