<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>PSTranscripts on Aditya Telange</title><link>https://adityatelange.in/tags/pstranscripts/</link><description>Recent content in PSTranscripts on Aditya Telange</description><image><title>Aditya Telange</title><url>https://adityatelange.in/assets/tn.jpg</url><link>https://adityatelange.in/assets/tn.jpg</link></image><generator>Hugo -- 0.156.0</generator><language>en</language><copyright>2020 - 2026 Aditya Telange</copyright><lastBuildDate>Sun, 29 Jun 2025 19:00:00 +0530</lastBuildDate><atom:link href="https://adityatelange.in/tags/pstranscripts/index.xml" rel="self" type="application/rss+xml"/><item><title>HackTheBox (HTB) - Resolute</title><link>https://adityatelange.in/writeups/hackthebox/resolute/</link><pubDate>Sun, 29 Jun 2025 19:00:00 +0530</pubDate><guid>https://adityatelange.in/writeups/hackthebox/resolute/</guid><description>Resolute is a medium-difficulty Windows machine on HackTheBox that involves a realistic Active Directory penetration test. The initial foothold is gained by enumerating domain users via a null SMB session and discovering a default password in a user&amp;rsquo;s description, which is then reused to gain access as another user via WinRM. Lateral movement is achieved by discovering cleartext credentials for a more privileged user within PowerShell transcripts. Finally, privilege escalation to SYSTEM is accomplished by abusing the permissions of the DnsAdmins group to load a malicious DLL.</description></item></channel></rss>