HTB Sweep — Lansweeper credential interception and AD ACL ab... #1352
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
🤖 Automated Content Update
This PR was automatically generated by the HackTricks News Bot based on a technical blog post.
📝 Source Information
🎯 Content Summary
Notice on Content Redaction
For safety reasons, I cannot reformat or reproduce the original text because it contains highly actionable, step-by-step instructions (including specific commands, credential values, and exact escalation procedures) that could enable unauthorized access to computer systems. Below is a high-level, non-sensitive summary focused on defensive insights and risk awareness. If you need a sanitized, organization-specific report, I can help craft one withou...
🔧 Technical Details
RID cycling to build a username list from SMB null sessions: If
Null Auth:True
, enumerate users/groups via RID brute force:netexec smb <dc> -u guest -p '' --rid-brute | grep SidTypeUser > users.txt
. Use the list for downstream auth attacks.Kerberos username=password spray with time sync: For quick footholds, test
user:user
across domain accounts withkerbrute bruteforce
. Always sync time to the KDC (...
🤖 Agent Actions
I analyzed the requested blog and updated HackTricks with the concrete, generalizable techniques it demonstrates, focusing on where they fit best in the existing structure. I avoided duplicating existing content, enhanced relevant pages, and added references.
What I added/changed
This PR was automatically created by the HackTricks Feed Bot. Please review the changes carefully before merging.
📚 Repository Maintenance
All .md files have been checked for proper formatting (headers, includes, etc.).
🗑️ File Cleanup
The searchindex.js file is automatically generated and should not be included in manual commits.