Resurrecting the Dead: Exploiting Active Directory’s Recycle Bin ♻️✝️
嗯,用户让我帮忙总结一篇文章,控制在100字以内,而且不需要用“文章内容总结”之类的开头。首先,我得仔细看看用户提供的文章内容。 看起来这篇文章讲的是渗透测试的过程,特别是针对一个Windows Server 2008 R2的域控制器。里面提到了一些关键点,比如目标IP地址、暴露的服务如Kerberos、LDAP、SMB和WinRM。还有攻击者利用配置错误、解码VNC以及AD回收站来获取Root权限。 用户可能是一位安全研究人员或者渗透测试人员,需要快速了解文章的主要内容。他可能希望得到一个简洁明了的摘要,方便分享或记录。深层需求可能是希望节省时间,不用自己逐字阅读就能抓住重点。 接下来,我需要将这些信息浓缩到100字以内,确保涵盖主要技术点和攻击过程。同时,避免使用过于专业的术语,让摘要更易理解。还要注意不要遗漏关键步骤和结果,比如最终获取Root权限。 最后,检查一下字数是否符合要求,并确保语言流畅自然。 </think> 文章描述了一次针对Windows Server 2008 R2域控制器的渗透测试过程,利用配置错误、解码VNC和AD回收站等技术手段获取Root权限。目标暴露了Kerberos、LDAP、SMB和WinRM等服务,攻击者通过远程管理漏洞实现代码执行并最终控制目标系统。 2026-1-25 14:14:36 Author: infosecwriteups.com(查看原文) 阅读量:1 收藏

Nicholas Mullenski

A full walkthrough on chaining 🚀 misconfigurations, decoding VNC, and using the AD Recycle Bin to get Root. 🖥️ Let’s dig in! ⚔️

Press enter or click to view image in full size

1.0 Executive Summary

Assessment Date: January 17, 2026 Target: 10.129.14.58 (CASC-DC1, CASCADE [HTB]) Assessor: Nicholas Mullenski

During the initial phase of the engagement, the target 10.129.14.58 was identified as a Domain Controller running Windows Server 2008 R2 SP1. The host is exposing several critical services typical of an Active Directory environment, including Kerberos, LDAP, and SMB. The presence of Windows Management Framework (WinRM) on port 5985 indicates that remote management is enabled, presenting a high-value vector for remote code execution if valid credentials are successfully compromised.

Understood. Using a nested hierarchy is much better for technical reporting as it groups related findings logically rather than listing them as disparate events.

Here is the revised section of your report, restructured with the 2.0, 2.1, 2.1.1 format to meet professional standards.

2.0 Technical Findings & Enumeration


文章来源: https://infosecwriteups.com/resurrecting-the-dead-exploiting-active-directorys-recycle-bin-%EF%B8%8F-%EF%B8%8F-5558982fc5fa?source=rss----7b722bfd1b8d---4
如有侵权请联系:admin#unsafe.sh