<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Impacket on p4n4Sec</title><link>https://p4n4.xyz/tools/impacket/</link><description>Recent content in Impacket on p4n4Sec</description><generator>Hugo -- 0.147.7</generator><language>en-us</language><lastBuildDate>Fri, 23 Jan 2026 00:00:00 +0000</lastBuildDate><atom:link href="https://p4n4.xyz/tools/impacket/index.xml" rel="self" type="application/rss+xml"/><item><title>HTB: AD — Flight</title><link>https://p4n4.xyz/posts/htb/box/flight/</link><pubDate>Fri, 23 Jan 2026 00:00:00 +0000</pubDate><guid>https://p4n4.xyz/posts/htb/box/flight/</guid><description>Flight is a hard Windows machine that starts with a website with two different virtual hosts. One of them is vulnerable to LFI and allows an attacker to retrieve an NTLM hash. Once cracked, the obtained clear text password will be sprayed across a list of valid usernames to discover a password re-use scenario. Once the attacker has SMB access as the user s.moon he is able to write to a share that gets accessed by other users. Certain files can be used to steal the NTLMv2 hash of the users that access the share. Once the second hash is cracked the attacker will be able to write a reverse shell in a share that hosts the web files and gain a shell on the box as low privileged user. Having credentials for the user c.bum, it will be possible to gain a shell as this user, which will allow the attacker to write an aspx web shell on a web site that&amp;rsquo;s configured to listen only on localhost. Once the attacker has command execution as the Microsoft Virtual Account he is able to run Rubeus to get a ticket for the machine account that can be used to perform a DCSync attack ultimately obtaining the hashes for the Administrator user.</description></item><item><title>HTB: AD — sauna</title><link>https://p4n4.xyz/posts/htb/box/sauna/</link><pubDate>Mon, 19 Jan 2026 00:00:00 +0000</pubDate><guid>https://p4n4.xyz/posts/htb/box/sauna/</guid><description>Sauna is an easy difficulty Windows machine that features Active Directory enumeration and exploitation. Possible usernames can be derived from employee full names listed on the website. With these usernames, an ASREPRoasting attack can be performed, which results in hash for an account that doesn&amp;rsquo;t require Kerberos pre-authentication. This hash can be subjected to an offline brute force attack, in order to recover the plaintext password for a user that is able to WinRM to the box. Running WinPEAS reveals that another system user has been configured to automatically login and it identifies their password. This second user also has Windows remote management permissions. BloodHound reveals that this user has the DS-Replication-Get-Changes-All extended right, which allows them to dump password hashes from the Domain Controller in a DCSync attack. Executing this attack returns the hash of the primary domain administrator, which can be used with Impacket&amp;rsquo;s psexec.py in order to gain a shell on the box as NT_AUTHORITY\SYSTEM.</description></item><item><title>HTB: AD — Forest</title><link>https://p4n4.xyz/posts/htb/box/forest/</link><pubDate>Fri, 16 Jan 2026 00:00:00 +0000</pubDate><guid>https://p4n4.xyz/posts/htb/box/forest/</guid><description>Forest is an easy Windows machine that showcases a Domain Controller (DC) for a domain in which Exchange Server has been installed. The DC allows anonymous LDAP binds, which are used to enumerate domain objects. The password for a service account with Kerberos pre-authentication disabled can be cracked to gain a foothold. The service account is found to be a member of the Account Operators group, which can be used to add users to privileged Exchange groups. The Exchange group membership is leveraged to gain DCSync privileges on the domain and dump the NTLM hashes, compromising the system.</description></item></channel></rss>