How did you decide to do this attack?
From enumeration you can see the services running and what permissions the user have in AD CS and go from there.
Anyone would mind DM me about foothold from inside the DB?
I got a foothold bruteforcing the credentials through CME, but I can’t get the same results using Hydra, can someone give me the correct Hydra command syntax?
theres another tool we can use to grab users.
When i try to run a port scan, i get host is down. tried -Pn as well. Nothing works. I tried resetting the machine as well. Is it a normal behavior of this machine ?