| ID: | 2667 |
|---|---|
| 标题: | SAM I AM |
| 描述: | The attacker managed to gain Domain Admin on our rebels Domain Controller! Looks like they managed to log on with an account using WMI and dumped some files. Can you reproduce how they got the Administrator's Password with the artifacts provided? Place the Administrator Account's Password in DUCTF{} , e.g. DUCTF{password123!} Author: TurboPenguin |
| 类型: | Forensics |
| 网站: | bugku |
| 题目链接: | https://ctf.bugku.com/challenges/detail/id/2852.html |
| 赛事: | DownUnderCTF2024 |
| 年度: | 2024 |
| Flag值: | DUCTF{!checkerboard1} |
| writeup: | https://www.cnblogs.com/Mar10/p/18289107 |