Fahri KorkmazThrowback — Part 1 — pfSenseThrowback is a network lab on TryHackMe. This is the first part of the article series, which I will be publishing on Throwback. In this…May 12, 2022May 12, 2022
Fahri KorkmazThrowback — Part 2 — Mail ServerThe is the second article to Throwback lab. In this article we will dig deaper into how to intial exploit the Throwback mail server.May 13, 2022May 13, 2022
Fahri KorkmazThrowback — Part 3 — LLMNR PoisoningIn this article I will show you how to retrieve the password of PetersJ by doing LLMNR Poisoning.May 14, 2022May 14, 2022
Fahri KorkmazThrowback — Part 4 — Pass the HashIn Part 2 we got a meterpreter shell after successfully phishing BlaireJ. In Part 3 after gaining a Administrator shell we could run…May 15, 20221May 15, 20221
Fahri KorkmazThrowback — Part 5 — Domain Enumeration & KerberoastAt this stage we still have access to THROWBACK-PROD as a domain user called BlaireJ. In order to gain higher privileges in the domain…May 16, 2022May 16, 2022
Fahri KorkmazThrowback — Part 6 — Timekeep ServerIn Part 2 we have successfully gained access to Frank Murphy’s email account. It contained an interesting email with a reset link to the…May 17, 2022May 17, 2022
Fahri KorkmazThrowback — Part 7 — THROWBACK-DC01, CORP-DC01, CORP-ADT01After we have access to the Domain Controller, it is time to extend our privileges.May 18, 2022May 18, 2022
Fahri KorkmazThrowback — Part 8 — EmailsFrom the update_email.txt notice, we now know that the corporation is using another email server with other email formats. We also know…May 19, 2022May 19, 2022
Fahri KorkmazThrowback — Part 9 — TBSEC-DC01We were able to acquire credentials for TBSEC_GUEST account in Part 8. In this article we will compromise TBSEC-DC01.May 21, 2022May 21, 2022