> .ROLE
PENETRATION TESTER, CYBERSECURITY CONSULTANT
> .DETAILS
Windows servers are heavily used on internal networks for everything from file sharing to custom applications. As we’ve discussed with Active Directory, they can be easily managed in one central location, so that teams across the organization can have varying levels of permissions to resources on the server.
Windows hosts are COMMONLY misconfigured. we can leverage that to gain additional privileges. Your job is to perform reconnaissance on the host, enumerate vulnerabilities on services you discover, then document your findings.
> .TECHNOLOGY
KALI LINUX, NMAP, METAPLOIT, WINDOWS SERVER, VMWARE