Vulnlab— Baby2 Active Directory Full Walkthrough
Tags
attack-pattern: | Data Dns - T1071.004 Dns - T1590.002 Powershell - T1059.001 Python - T1059.006 Server - T1583.004 Server - T1584.004 Tool - T1588.002 Brute Force - T1110 Powershell - T1086 |
Common Information
Type | Value |
---|---|
UUID | a5a80b0c-3a47-4d88-a42a-f34585553569 |
Fingerprint | 3d8693bbfc84453 |
Analysis status | DONE |
Considered CTI value | -2 |
Text language | |
Published | Oct. 3, 2024, 11:48 a.m. |
Added to db | Oct. 3, 2024, 2:33 p.m. |
Last updated | Nov. 17, 2024, 7:44 p.m. |
Headline | Vulnlab— Baby2 Active Directory Full Walkthrough |
Title | Vulnlab— Baby2 Active Directory Full Walkthrough |
Detected Hints/Tags/Attributes | 47/1/18 |
Source URLs
URL Provider
RSS Feed
Details | Id | Enabled | Feed title | Url | Added to db |
---|---|---|---|---|---|
Details | 167 | ✔ | Cybersecurity on Medium | https://medium.com/feed/tag/cybersecurity | 2024-08-30 22:08 |
Attributes
Details | Type | #Events | CTI | Value |
---|---|---|---|---|
Details | Domain | 372 | wscript.shell |
|
Details | Domain | 339 | system.net |
|
Details | Domain | 1 | pygpoabuse.py |
|
Details | Domain | 4127 | github.com |
|
Details | File | 2 | login.vbs |
|
Details | File | 10 | powercat.ps1 |
|
Details | File | 1 | pygpoabuse.py |
|
Details | File | 205 | root.txt |
|
Details | Github username | 9 | hackplayers |
|
Details | IPv4 | 1 | 10.10.87.212 |
|
Details | IPv4 | 56 | 1.3.6.1 |
|
Details | IPv4 | 9 | 10.8.3.192 |
|
Details | IPv4 | 1 | 10.10.107.4 |
|
Details | IPv4 | 1 | 10.10.96.181 |
|
Details | IPv6 | 1 | 0e0e:080d:9977:6a91:faa5:cf2d:db44:c42f |
|
Details | IPv6 | 1 | 6610:7e0f:22de:7458:0aaa:323e:ff96:3a8e |
|
Details | Url | 1 | http://10.8.3.192/powercat.ps1 |
|
Details | Url | 7 | https://github.com/hackplayers/evil-winrm#remote |