This was one of the first videos I recorded several months ago, so the quality might not be the same as more recent videos. Also if I was doing it again now I'd definitely just get the DLL to launch a reverse shell rather than reading the flag file and writing its contents elsewhere lol but hey, it was an excuse to learn a little bit of C++
Coming from noob... (3days learning) I managed to get users but could not work out the next step I knew it had something to do with the groups but never knew enough to continue. Thanks for the very through view on this
@@vbscrub yea load up a vbscrub video ahhaa. Im going to try and do it another way to you, so I'm not copying and am forced to learn another way (if there is one) thank you again. Check your discord too ;)
@@vbscrub no lol what i meant was they are releasing the same kind of boxes. Playertwo, rope, patents all have same old web Exploitation for an initial foothold and then a binary exploitation for getting root and now ropetwo is submitted too. I guess we windows and AD exploitation guys aren't going to get anything for a while now.
@@westernvibes1267 oh I get ya. Yeah its a lot easier to make boxes like that I guess. I've got a couple more AD related ones I'm going to submit soon but yeah there's a limit to what you can do without it being really obscure and difficult