Piggy Walkthrough - BTLO Labs
Walkthrough of PIGGY invesigation
Walkthrough of PIGGY invesigation
Mega Big Tech has adopted a hybrid cloud architecture and continues to use a local on-premise Active Directory domain alongside Azure cloud services. They are concerned about being targeted due to their importance in ...
Initial Recon
External Recon:
Recon
Walkthrough of HTB’s Return machine
Recon
Recon
Recon
Legacy is a fairly straightforward beginner-level machine which demonstrates the potential security risks of SMB on Windows. Only one publicly available exploit is required to obtain administrator access.
Blue
Walkthrough of PIGGY invesigation
Recon I started with a standard Nmap scan to discover open TCP and UDP ports:
Initial Recon
External Recon:
Recon
Recon
Mega Big Tech has adopted a hybrid cloud architecture and continues to use a local on-premise Active Directory domain alongside Azure cloud services. They are concerned about being targeted due to their importance in ...
Recon
Walkthrough of PIGGY invesigation
Recon
Initial Recon
External Recon:
Recon
Walkthrough of HTB’s Return machine
Recon
This walkthrough demonstrates how to compromise a lab machine named “Baby” from Vulnlab by enumerating services like SMB and LDAP on a Windows Server 2022 Domain Controller (DC). The goal is to perform network scannin...
Initial Recon
External Recon:
Recon
Walkthrough of HTB’s Return machine
Recon
Recon I started with a standard Nmap scan to discover open TCP and UDP ports:
This walkthrough demonstrates how to compromise a lab machine named “Baby” from Vulnlab by enumerating services like SMB and LDAP on a Windows Server 2022 Domain Controller (DC). The goal is to perform network scannin...
Initial Recon
External Recon:
Recon
Walkthrough of HTB’s Return machine
Mega Big Tech has adopted a hybrid cloud architecture and continues to use a local on-premise Active Directory domain alongside Azure cloud services. They are concerned about being targeted due to their importance in ...
Recon
Legacy is a fairly straightforward beginner-level machine which demonstrates the potential security risks of SMB on Windows. Only one publicly available exploit is required to obtain administrator access.
Blue
This walkthrough demonstrates how to compromise a lab machine named “Baby” from Vulnlab by enumerating services like SMB and LDAP on a Windows Server 2022 Domain Controller (DC). The goal is to perform network scannin...
Recon
Recon
Legacy is a fairly straightforward beginner-level machine which demonstrates the potential security risks of SMB on Windows. Only one publicly available exploit is required to obtain administrator access.
Blue
Recon I started with a standard Nmap scan to discover open TCP and UDP ports:
This walkthrough demonstrates how to compromise a lab machine named “Baby” from Vulnlab by enumerating services like SMB and LDAP on a Windows Server 2022 Domain Controller (DC). The goal is to perform network scannin...
Walkthrough of PIGGY invesigation