From 25702b850427b4bb918e8f41f4c4e469a8d332d2 Mon Sep 17 00:00:00 2001
From: ARZ <60057481+AbdullahRizwan101@users.noreply.github.com>
Date: Sun, 15 Sep 2024 22:18:51 +0300
Subject: [PATCH] Update Tengu.md
---
Vulnlab/Tengu.md | 21 +++++++++++++++++++++
1 file changed, 21 insertions(+)
diff --git a/Vulnlab/Tengu.md b/Vulnlab/Tengu.md
index d59aad8..94eec7e 100644
--- a/Vulnlab/Tengu.md
+++ b/Vulnlab/Tengu.md
@@ -105,6 +105,25 @@ Dev didn't had anything interesting while there was one set of credential from D
+Attempting to crack this with rockyou.txt didn't work as the password wasn't present there however crackstation came in handy here
+
+
+
+
+
+Having the credentials, we can verify if this is a valid domain user
+
+
+
+With `bloodhound-python`, the domain can be enumerated
+
+```bash
+proxychains bloodhound-python -d tengu.vl -u t2_m.winters -p 'Tengu123' -c all -ns 10.10.183.37
+```
+
+
+
+
# References
- https://quentinkaiser.be/pentesting/2018/09/07/node-red-rce/
@@ -113,4 +132,6 @@ Dev didn't had anything interesting while there was one set of credential from D
```
nodered_connector:DreamPuppyOverall25
t2_m.winters:af9cfa9b70e5e90984203087e5a5219945a599abf31dd4bb2a11dc20678ea147
+t2_m.winters:Tengu123
+
```