<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Windapsearch on p4n4Sec</title><link>https://p4n4.xyz/tools/windapsearch/</link><description>Recent content in Windapsearch on p4n4Sec</description><generator>Hugo -- 0.147.7</generator><language>en-us</language><lastBuildDate>Fri, 23 Jan 2026 00:00:00 +0000</lastBuildDate><atom:link href="https://p4n4.xyz/tools/windapsearch/index.xml" rel="self" type="application/rss+xml"/><item><title>HTB: AD — Flight</title><link>https://p4n4.xyz/posts/htb/box/flight/</link><pubDate>Fri, 23 Jan 2026 00:00:00 +0000</pubDate><guid>https://p4n4.xyz/posts/htb/box/flight/</guid><description>Flight is a hard Windows machine that starts with a website with two different virtual hosts. One of them is vulnerable to LFI and allows an attacker to retrieve an NTLM hash. Once cracked, the obtained clear text password will be sprayed across a list of valid usernames to discover a password re-use scenario. Once the attacker has SMB access as the user s.moon he is able to write to a share that gets accessed by other users. Certain files can be used to steal the NTLMv2 hash of the users that access the share. Once the second hash is cracked the attacker will be able to write a reverse shell in a share that hosts the web files and gain a shell on the box as low privileged user. Having credentials for the user c.bum, it will be possible to gain a shell as this user, which will allow the attacker to write an aspx web shell on a web site that&amp;rsquo;s configured to listen only on localhost. Once the attacker has command execution as the Microsoft Virtual Account he is able to run Rubeus to get a ticket for the machine account that can be used to perform a DCSync attack ultimately obtaining the hashes for the Administrator user.</description></item><item><title>HTB: AD — Forest</title><link>https://p4n4.xyz/posts/htb/box/forest/</link><pubDate>Fri, 16 Jan 2026 00:00:00 +0000</pubDate><guid>https://p4n4.xyz/posts/htb/box/forest/</guid><description>Forest is an easy Windows machine that showcases a Domain Controller (DC) for a domain in which Exchange Server has been installed. The DC allows anonymous LDAP binds, which are used to enumerate domain objects. The password for a service account with Kerberos pre-authentication disabled can be cracked to gain a foothold. The service account is found to be a member of the Account Operators group, which can be used to add users to privileged Exchange groups. The Exchange group membership is leveraged to gain DCSync privileges on the domain and dump the NTLM hashes, compromising the system.</description></item></channel></rss>