looking at a little guide and wow
metasploit and nessus really make this stuff look far too easy
@KitRedgrave the real trick is figuring out how the tools work well enough that you still know what to do when they fail, because they will fail on you. I’ve gotten to the point that I can fully compromise a Windows domain without using metasploit at all, just Responder, hashcat, impacket, and mimikatz. The main value of Metasploit to me is that meterpreter makes post-exploitation a lot easier.
@KitRedgrave I mean knowing Linux is great, makes things easier once you compromise those servers, but most corporations have their auth centered around windows workstations controlled by active directory so you’ll want to know how to break that too.
@packetcharmer yeah. gotta go find a ctf or lab that has that, or maybe it's part of pwk