Categories
Tags
#HackTheBox Active_Directory ADCS bloodhound brotli certificates certipy certipy_ad COM constrained_delegations Cross-Session-Relay CVE-2023-46818 CVE-2023-47268 CVE-2024-32651 CVE-2024-34716 CVE-2024-6886 CVE-2024-9264 CVE-2025-24071 DCOM decompiling_dll Defender delegation_admins dll Docker dpapi easy elpscrk ESC1 ESC16 fscan FTP Git git-dumper Gitea grafana HackTheBox hard idor IIS IIS_KERBEROS_AUTH Insane ISPConfig keepass kerberos kerbrute KioskMode linux Log_Analysis machine Medium MySQL OXID-Resolver pbkdf2-sha256 phishing PrusaSlicer RBCD RCE rid_bruteforcing S4U2Proxy S4U2Self shadow_credentials SMB SQLite SSTI U2U UAC_Bypass Velociraptor VeraCrypt Windows windows_internals WSL xss
75 words
1 minutes
HTB: DarkCorp (Windows/Insane)
⚠️ This box is still active on
HackTheBox. Once retired, this article will be published for public access as per HackTheBox’s policy on publishing content from their platform.If you need a hint or want to discuss anything related to the box, feel free to reach out to me on Discord or through any of the social media links in my bio.

HTB: DarkCorp (Windows/Insane)
https://www.0xfr3nzy.com/posts/htb-darkcorp-windows-insane/