<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>HTB Windows on Aditya Telange</title><link>https://adityatelange.in/tags/htb-windows/</link><description>Recent content in HTB Windows on Aditya Telange</description><image><title>Aditya Telange</title><url>https://adityatelange.in/assets/tn.jpg</url><link>https://adityatelange.in/assets/tn.jpg</link></image><generator>Hugo -- 0.156.0</generator><language>en</language><copyright>2020 - 2026 Aditya Telange</copyright><lastBuildDate>Sun, 06 Jul 2025 19:50:00 +0530</lastBuildDate><atom:link href="https://adityatelange.in/tags/htb-windows/index.xml" rel="self" type="application/rss+xml"/><item><title>HackTheBox (HTB) - Escape</title><link>https://adityatelange.in/writeups/hackthebox/escape/</link><pubDate>Sun, 06 Jul 2025 19:50:00 +0530</pubDate><guid>https://adityatelange.in/writeups/hackthebox/escape/</guid><description>Escape is a medium-difficulty Windows machine on Hack The Box that revolves around Active Directory. The initial foothold is gained by finding credentials in a PDF file on an open SMB share. This access is then leveraged to connect to an MSSQL service, from which we capture and crack the NTLM hash of a service account. Lateral movement is achieved by discovering another user&amp;rsquo;s credentials in a log file. Finally, privilege escalation to Administrator is accomplished by exploiting a misconfiguration in Active Directory Certificate Services (ADCS), specifically the ESC1 vulnerability.</description></item><item><title>HackTheBox (HTB) - Resolute</title><link>https://adityatelange.in/writeups/hackthebox/resolute/</link><pubDate>Sun, 29 Jun 2025 19:00:00 +0530</pubDate><guid>https://adityatelange.in/writeups/hackthebox/resolute/</guid><description>Resolute is a medium-difficulty Windows machine on HackTheBox that involves a realistic Active Directory penetration test. The initial foothold is gained by enumerating domain users via a null SMB session and discovering a default password in a user&amp;rsquo;s description, which is then reused to gain access as another user via WinRM. Lateral movement is achieved by discovering cleartext credentials for a more privileged user within PowerShell transcripts. Finally, privilege escalation to SYSTEM is accomplished by abusing the permissions of the DnsAdmins group to load a malicious DLL.</description></item><item><title>HackTheBox (HTB) - Certified</title><link>https://adityatelange.in/writeups/hackthebox/certified/</link><pubDate>Thu, 20 Mar 2025 20:40:31 +0530</pubDate><guid>https://adityatelange.in/writeups/hackthebox/certified/</guid><description>&lt;code&gt;Certified&lt;/code&gt; is a Windows machine having misconfigured ACL in Active Directory environment where initial access for a low-privileged user &lt;code&gt;judith.mader&lt;/code&gt; is provided. Exploitation of the Active Directory Certificate Service (ADCS) is required to get access to the &lt;code&gt;management_svc&lt;/code&gt;, &lt;code&gt;ca_operator&lt;/code&gt; and &lt;code&gt;Administrator&lt;/code&gt; account by abusing shadow credentials and &lt;code&gt;ESC9&lt;/code&gt;.</description></item><item><title>HackTheBox (HTB) - Legacy</title><link>https://adityatelange.in/writeups/hackthebox/legacy/</link><pubDate>Fri, 03 Jun 2022 22:15:51 +0530</pubDate><guid>https://adityatelange.in/writeups/hackthebox/legacy/</guid><description>Legacy is a relatively easy box which has SMB running on Windows XP(2000) OS. We find the exploit with metasploit and get access to priviledged user &lt;code&gt;NT AUTHORITY\SYSTEM&lt;/code&gt; directly.</description></item><item><title>HackTheBox (HTB) - Love</title><link>https://adityatelange.in/writeups/hackthebox/love/</link><pubDate>Sat, 07 Aug 2021 00:00:00 +0530</pubDate><guid>https://adityatelange.in/writeups/hackthebox/love/</guid><description>Love is a fun box where we find a hidden subdomain that helps us retrieve Forbidden pages, where admin credentials are leaked of another service. The access to the admin dashboard has a file upload, through which we get a reverse shell. The box then has &lt;code&gt;AlwaysInstallElevated&lt;/code&gt; that allows a regular user to install a Microsoft Windows Installer Package (MSI) with system privileges, which helps us get the Administrator access.</description></item></channel></rss>