<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Responder on p4n4Sec</title><link>https://p4n4.xyz/tools/responder/</link><description>Recent content in Responder on p4n4Sec</description><generator>Hugo -- 0.147.7</generator><language>en-us</language><lastBuildDate>Fri, 23 Jan 2026 00:00:00 +0000</lastBuildDate><atom:link href="https://p4n4.xyz/tools/responder/index.xml" rel="self" type="application/rss+xml"/><item><title>HTB: AD — Flight</title><link>https://p4n4.xyz/posts/htb/box/flight/</link><pubDate>Fri, 23 Jan 2026 00:00:00 +0000</pubDate><guid>https://p4n4.xyz/posts/htb/box/flight/</guid><description>Flight is a hard Windows machine that starts with a website with two different virtual hosts. One of them is vulnerable to LFI and allows an attacker to retrieve an NTLM hash. Once cracked, the obtained clear text password will be sprayed across a list of valid usernames to discover a password re-use scenario. Once the attacker has SMB access as the user s.moon he is able to write to a share that gets accessed by other users. Certain files can be used to steal the NTLMv2 hash of the users that access the share. Once the second hash is cracked the attacker will be able to write a reverse shell in a share that hosts the web files and gain a shell on the box as low privileged user. Having credentials for the user c.bum, it will be possible to gain a shell as this user, which will allow the attacker to write an aspx web shell on a web site that&amp;rsquo;s configured to listen only on localhost. Once the attacker has command execution as the Microsoft Virtual Account he is able to run Rubeus to get a ticket for the machine account that can be used to perform a DCSync attack ultimately obtaining the hashes for the Administrator user.</description></item><item><title>HTB: Windows — Signed</title><link>https://p4n4.xyz/posts/htb/box/signed/</link><pubDate>Fri, 17 Oct 2025 00:00:00 +0000</pubDate><guid>https://p4n4.xyz/posts/htb/box/signed/</guid><description>Signed is a medium Windows machine, exposing Microsoft SQL Server and a Domain Controller. It&amp;rsquo;s part of Season 9.</description></item></channel></rss>