11/2020
Target IP: 10.10.10.161
The target machine is a Domain Controller that uses Kerberos. Foothold gained by exploiting a misconfiguration for an account in *Privileged IT Accounts* group to get a credential for the foothold. Run SharpHound shell script on the target machine to discover privilege escalation path. PowerView kit extends the command in the initial shell to grant *svc-alfresco* account DCSync privilege. Then dumping system account credentials with a custom python script to get *Administrator* account.
easy
User: e5e4e47ae7022664cda6eb013fb0d9ed
Root: f048153f202bbb2f82622b04d79129cc

Nmap port scan result.
! Discovered services: