<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>ESC1 on Aditya Telange</title><link>https://adityatelange.in/tags/esc1/</link><description>Recent content in ESC1 on Aditya Telange</description><image><title>Aditya Telange</title><url>https://adityatelange.in/assets/tn.jpg</url><link>https://adityatelange.in/assets/tn.jpg</link></image><generator>Hugo -- 0.156.0</generator><language>en</language><copyright>2020 - 2026 Aditya Telange</copyright><lastBuildDate>Sun, 06 Jul 2025 19:50:00 +0530</lastBuildDate><atom:link href="https://adityatelange.in/tags/esc1/index.xml" rel="self" type="application/rss+xml"/><item><title>HackTheBox (HTB) - Escape</title><link>https://adityatelange.in/writeups/hackthebox/escape/</link><pubDate>Sun, 06 Jul 2025 19:50:00 +0530</pubDate><guid>https://adityatelange.in/writeups/hackthebox/escape/</guid><description>Escape is a medium-difficulty Windows machine on Hack The Box that revolves around Active Directory. The initial foothold is gained by finding credentials in a PDF file on an open SMB share. This access is then leveraged to connect to an MSSQL service, from which we capture and crack the NTLM hash of a service account. Lateral movement is achieved by discovering another user&amp;rsquo;s credentials in a log file. Finally, privilege escalation to Administrator is accomplished by exploiting a misconfiguration in Active Directory Certificate Services (ADCS), specifically the ESC1 vulnerability.</description></item></channel></rss>