Below you will find pages that utilize the taxonomy term “ShadowCredentialAttack”
Hack The Box - Machines
read more
Certified

Note: As is common in Windows pentests, you will start the Certified box with credentials for the following account: Username: judith.mader Password: judith09
Summary
- AD Enumeration using
netexecandbloodhound - abuse
WriteOwnerpermissions to become member ofManagementGroup - ShadowCredential attack to get hash for
management_svc - Lateral Movement to
CA_Operatorby changing password - ADCS-ESC9 to become Administrator
Initial Enumeration
As usual I start with a simple full port scan followed by a more detailed targetted port scan