A detailed walkthrough of the Proving Grounds Practice 'Nagoya' box, a hard-rated Windows Active Directory machine. The process covers NMAP scanning, username enumeration from a website, password spraying via CrackMapExec, SMB share enumeration to find a ResetPassword.exe binary analyzed with Ghidra, Kerberoasting to obtain
Sort: