Vulnlab— Baby2 Active Directory Full Walkthrough
Common Information
Type Value
UUID a5a80b0c-3a47-4d88-a42a-f34585553569
Fingerprint 3d8693bbfc84453
Analysis status DONE
Considered CTI value -2
Text language
Published Oct. 3, 2024, 11:48 a.m.
Added to db Oct. 3, 2024, 2:33 p.m.
Last updated Nov. 17, 2024, 7:44 p.m.
Headline Vulnlab— Baby2 Active Directory Full Walkthrough
Title Vulnlab— Baby2 Active Directory Full Walkthrough
Detected Hints/Tags/Attributes 47/1/18
RSS Feed
Details Id Enabled Feed title Url Added to db
Details 167 Cybersecurity on Medium https://medium.com/feed/tag/cybersecurity 2024-08-30 22:08
Attributes
Details Type #Events CTI Value
Details Domain 372
wscript.shell
Details Domain 339
system.net
Details Domain 1
pygpoabuse.py
Details Domain 4127
github.com
Details File 2
login.vbs
Details File 10
powercat.ps1
Details File 1
pygpoabuse.py
Details File 205
root.txt
Details Github username 9
hackplayers
Details IPv4 1
10.10.87.212
Details IPv4 56
1.3.6.1
Details IPv4 9
10.8.3.192
Details IPv4 1
10.10.107.4
Details IPv4 1
10.10.96.181
Details IPv6 1
0e0e:080d:9977:6a91:faa5:cf2d:db44:c42f
Details IPv6 1
6610:7e0f:22de:7458:0aaa:323e:ff96:3a8e
Details Url 1
http://10.8.3.192/powercat.ps1
Details Url 7
https://github.com/hackplayers/evil-winrm#remote