<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>Activedirectory on Valentin&#39;s Blog</title>
    <link>/tags/activedirectory/</link>
    <description>Recent content in Activedirectory on Valentin&#39;s Blog</description>
    <generator>Hugo</generator>
    <language>en</language>
    <lastBuildDate>Tue, 07 Apr 2026 00:00:00 +0000</lastBuildDate>
    <atom:link href="/tags/activedirectory/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>HackTheBox Fluffy Writeup</title>
      <link>/posts/fluffy/</link>
      <pubDate>Tue, 07 Apr 2026 00:00:00 +0000</pubDate>
      <guid>/posts/fluffy/</guid>
      <description>&lt;p&gt;&lt;img src=&#34;/posts/fluffy/fluffy.png&#34; alt=&#34;fluffy&#34;&gt;&lt;/p&gt;&#xA;&lt;p&gt;Fluffy is an Easy-rated Windows machine and my first box from the new CPTS Preparation Track on HackTheBox. It&amp;rsquo;s a great box if you want to get hands-on with modern Active Directory attacks. We start from an assumed-breach perspective, inject a crafted .library-ms file via an SMB share to harvest NTLM hashes, and continue by abusing Generic Write privileges through Shadow Credentials. The final step to Domain Takeover is exploiting an AD CS ESC16 vulnerability.&lt;/p&gt;</description>
    </item>
  </channel>
</rss>
