<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cme on p4n4Sec</title><link>https://p4n4.xyz/tools/cme/</link><description>Recent content in Cme on p4n4Sec</description><generator>Hugo -- 0.147.7</generator><language>en-us</language><lastBuildDate>Sat, 31 Jan 2026 00:00:00 +0000</lastBuildDate><atom:link href="https://p4n4.xyz/tools/cme/index.xml" rel="self" type="application/rss+xml"/><item><title>HTB: AD - Administrator</title><link>https://p4n4.xyz/posts/htb/box/administrator/</link><pubDate>Sat, 31 Jan 2026 00:00:00 +0000</pubDate><guid>https://p4n4.xyz/posts/htb/box/administrator/</guid><description>Administrator is a medium-difficulty Windows machine designed around a complete domain compromise scenario, where credentials for a low-privileged user are provided. To gain access to the michael account, ACLs (Access Control Lists) over privileged objects are enumerated, leading us to discover that the user olivia has GenericAll permissions over michael, allowing us to reset his password. With access as michael, it is revealed that he can force a password change on the user benjamin, whose password is reset. This grants access to FTP where a backup.psafe3 file is discovered, cracked, and reveals credentials for several users. These credentials are sprayed across the domain, revealing valid credentials for the user emily. Further enumeration shows that emily has GenericWrite permissions over the user ethan, allowing us to perform a targeted Kerberoasting attack. The recovered hash is cracked and reveals valid credentials for ethan, who is found to have DCSync rights ultimately allowing retrieval of the Administrator account hash and full domain compromise.</description></item><item><title>HTB: AD — Cicada</title><link>https://p4n4.xyz/posts/htb/box/cicada/</link><pubDate>Tue, 27 Jan 2026 00:00:00 +0000</pubDate><guid>https://p4n4.xyz/posts/htb/box/cicada/</guid><description>Cicada is an easy-difficult Windows machine that focuses on beginner Active Directory enumeration and exploitation. In this machine, players will enumerate the domain, identify users, navigate shares, uncover plaintext passwords stored in files, execute a password spray, and use the SeBackupPrivilege to achieve full system compromise.</description></item><item><title>HTB: AD — Flight</title><link>https://p4n4.xyz/posts/htb/box/flight/</link><pubDate>Fri, 23 Jan 2026 00:00:00 +0000</pubDate><guid>https://p4n4.xyz/posts/htb/box/flight/</guid><description>Flight is a hard Windows machine that starts with a website with two different virtual hosts. One of them is vulnerable to LFI and allows an attacker to retrieve an NTLM hash. Once cracked, the obtained clear text password will be sprayed across a list of valid usernames to discover a password re-use scenario. Once the attacker has SMB access as the user s.moon he is able to write to a share that gets accessed by other users. Certain files can be used to steal the NTLMv2 hash of the users that access the share. Once the second hash is cracked the attacker will be able to write a reverse shell in a share that hosts the web files and gain a shell on the box as low privileged user. Having credentials for the user c.bum, it will be possible to gain a shell as this user, which will allow the attacker to write an aspx web shell on a web site that&amp;rsquo;s configured to listen only on localhost. Once the attacker has command execution as the Microsoft Virtual Account he is able to run Rubeus to get a ticket for the machine account that can be used to perform a DCSync attack ultimately obtaining the hashes for the Administrator user.</description></item></channel></rss>