<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Faketime on p4n4Sec</title><link>https://p4n4.xyz/tools/faketime/</link><description>Recent content in Faketime on p4n4Sec</description><generator>Hugo -- 0.147.7</generator><language>en-us</language><lastBuildDate>Sat, 31 Jan 2026 00:00:00 +0000</lastBuildDate><atom:link href="https://p4n4.xyz/tools/faketime/index.xml" rel="self" type="application/rss+xml"/><item><title>HTB: AD - Administrator</title><link>https://p4n4.xyz/posts/htb/box/administrator/</link><pubDate>Sat, 31 Jan 2026 00:00:00 +0000</pubDate><guid>https://p4n4.xyz/posts/htb/box/administrator/</guid><description>Administrator is a medium-difficulty Windows machine designed around a complete domain compromise scenario, where credentials for a low-privileged user are provided. To gain access to the michael account, ACLs (Access Control Lists) over privileged objects are enumerated, leading us to discover that the user olivia has GenericAll permissions over michael, allowing us to reset his password. With access as michael, it is revealed that he can force a password change on the user benjamin, whose password is reset. This grants access to FTP where a backup.psafe3 file is discovered, cracked, and reveals credentials for several users. These credentials are sprayed across the domain, revealing valid credentials for the user emily. Further enumeration shows that emily has GenericWrite permissions over the user ethan, allowing us to perform a targeted Kerberoasting attack. The recovered hash is cracked and reveals valid credentials for ethan, who is found to have DCSync rights ultimately allowing retrieval of the Administrator account hash and full domain compromise.</description></item></channel></rss>