<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Kerberos Abuse on Melisa Saritas</title><link>https://melisasaritas.github.io/tags/kerberos-abuse/</link><description>Recent content in Kerberos Abuse on Melisa Saritas</description><generator>Hugo -- gohugo.io</generator><language>en-us</language><lastBuildDate>Sun, 06 Apr 2025 00:00:00 +0000</lastBuildDate><atom:link href="https://melisasaritas.github.io/tags/kerberos-abuse/index.xml" rel="self" type="application/rss+xml"/><item><title>Attacktive Directory – TryHackMe</title><link>https://melisasaritas.github.io/p/attactive-directory/</link><pubDate>Sun, 06 Apr 2025 00:00:00 +0000</pubDate><guid>https://melisasaritas.github.io/p/attactive-directory/</guid><description>&lt;img src="https://melisasaritas.github.io/p/attactive-directory/cover.jpg" alt="Featured image of post Attacktive Directory – TryHackMe" />&lt;p>Attacktive Directory – TryHackMe&lt;/p>
&lt;p>Active Directory (AD) is a crucial component in Windows-based networks, providing authentication, security policies, and access control through a centralized domain controller. This write-up focuses on solving the Attactive Directory machine, which involves exploiting Active Directory vulnerabilities to gain privileged access.&lt;/p>
&lt;p>The solution follows a structured approach, including reconnaissance, user enumeration, Kerberos abuse, folder discovery, and privilege escalation. Each step is carried out systematically using specialized tools to analyze and exploit security flaws effectively.&lt;/p>
&lt;p>For a detailed step-by-step walkthrough of the solution, refer to the attached PDF file:&lt;/p>
&lt;p>📄 &lt;a class="link" href="https://melisasaritas.github.io/writeups/files/Attacktive_Directory_WriteUp.pdf" >Solution: Attactive Directory.pdf&lt;/a>&lt;/p>
&lt;blockquote>
&lt;p>Photo by &lt;a class="link" href="https://unsplash.com/@fantasyflip?utm_content=creditCopyText&amp;amp;utm_medium=referral&amp;amp;utm_source=unsplash" target="_blank" rel="noopener"
>Philipp Katzenberger&lt;/a> on &lt;a class="link" href="https://unsplash.com/photos/closeup-photo-of-turned-on-blue-and-white-laptop-computer-iIJrUoeRoCQ?utm_content=creditCopyText&amp;amp;utm_medium=referral&amp;amp;utm_source=unsplash" target="_blank" rel="noopener"
>Unsplash&lt;/a>&lt;/p>&lt;/blockquote></description></item></channel></rss>