[随波逐流]CTF Flags

   [随波逐流]CTF Flags

软件版本:v1.0.0   数据版本: v20260201
返    回

SAM I AM

 广告模块
ID: 2667
标题: SAM I AM
描述: The attacker managed to gain Domain Admin on our rebels Domain Controller! Looks like they managed to log on with an account using WMI and dumped some files. Can you reproduce how they got the Administrator's Password with the artifacts provided? Place the Administrator Account's Password in DUCTF{} , e.g. DUCTF{password123!} Author: TurboPenguin
类型: Forensics
网站: bugku
题目链接: https://ctf.bugku.com/challenges/detail/id/2852.html
赛事: DownUnderCTF2024
年度: 2024
Flag值: DUCTF{!checkerboard1}
writeup: https://www.cnblogs.com/Mar10/p/18289107
答案错误,我要更正