前言
主力机换了台 Mac M4 Pro,因为架构和版本的原因,软件和工具的配置都需要摸索,于是记录一下部分环境配置的过程
参考:
第一次加载文章图片可能会花费较长时间
要不挂个梯子试试?(x
加载过慢请开启缓存 浏览器默认开启
参考:
https://cloud.tencent.com/developer/article/2327496
https://www.freebuf.com/articles/network/393276.html
https://sanshiok.com/archive/14.html#0x01%20%E5%89%8D%E7%BD%AE%E7%9F%A5%E8%AF%86-1
https://forum.butian.net/share/1227
https://blog.zgsec.cn/archives/278.html
域渗透中,如果能够获取域控的权限,便可接管域内所有机器,而域渗透中,Kerberos 是最常用的,是整个域的基础认证协议
参考:
Kerberos 票据攻击:黄金、白银、钻石、蓝宝石票据的攻防全解析 - FreeBuf网络安全行业门户
官方 wp:https://www.yuque.com/chuangfeimeiyigeren/eeii37/bkp6ldnifm2k3o1a?singleDoc#cC8ZK
Team:NISA
Rank:31
Score:1200

参考:
https://developer.aliyun.com/article/1089899
https://cloud.tencent.com/developer/article/2495873
https://wiki.wgpsec.org/knowledge/tools/metasploit.html
https://blog.csdn.net/m0_46371267/article/details/120740639
https://cloud.tencent.com/developer/article/2015275
https://github.com/rapid7/metasploitable3/wiki/Vulnerabilities