<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>Windows on v4lle&#39;s Blog</title>
    <link>/tags/windows/</link>
    <description>Recent content in Windows on v4lle&#39;s Blog</description>
    <generator>Hugo</generator>
    <language>en</language>
    <lastBuildDate>Tue, 07 Apr 2026 00:00:00 +0000</lastBuildDate>
    <atom:link href="/tags/windows/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>HackTheBox Fluffy Writeup</title>
      <link>/posts/fluffy/</link>
      <pubDate>Tue, 07 Apr 2026 00:00:00 +0000</pubDate>
      <guid>/posts/fluffy/</guid>
      <description>&lt;p&gt;&lt;img src=&#34;/posts/fluffy/fluffy.png&#34; alt=&#34;fluffy&#34;&gt;&lt;/p&gt;&#xA;&lt;p&gt;Fluffy is an Easy-rated Windows machine and my first box from the new CPTS Preparation Track on HackTheBox. It&amp;rsquo;s a great box if you want to get hands-on with modern Active Directory attacks. We start from an assumed-breach perspective, inject a crafted .library-ms file via an SMB share to harvest NTLM hashes, and continue by abusing Generic Write privileges through Shadow Credentials. The final step to Domain Takeover is exploiting an AD CS ESC16 vulnerability.&lt;/p&gt;</description>
    </item>
    <item>
      <title>HackTheBox Optimum Writeup</title>
      <link>/posts/optimum/</link>
      <pubDate>Sat, 13 Sep 2025 00:00:00 +0000</pubDate>
      <guid>/posts/optimum/</guid>
      <description>&lt;p&gt;&lt;img src=&#34;/posts/optimum/optimum.png&#34; alt=&#34;optimum&#34;&gt;&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;Optimum&lt;/strong&gt; is a beginner-level machine which mainly focuses on enumeration of services with known exploits. Both exploits are easy to obtain and have associated Metasploit modules, making this machine fairly simple to complete.&lt;/p&gt;&#xA;&lt;hr&gt;&#xA;&lt;h2 id=&#34;-enumeration&#34;&gt;🕵️ Enumeration&lt;/h2&gt;&#xA;&lt;p&gt;After spawning the machine and connecting to the VPN, we start with the initial enumeration.&lt;/p&gt;&#xA;&lt;hr&gt;&#xA;&lt;h2 id=&#34;-initial-nmap-scan&#34;&gt;🔍 Initial Nmap Scan&lt;/h2&gt;&#xA;&lt;p&gt;We begin by running an initial nmap scan with the following command:&lt;/p&gt;&#xA;&lt;div class=&#34;highlight&#34;&gt;&lt;pre tabindex=&#34;0&#34; class=&#34;chroma&#34;&gt;&lt;code class=&#34;language-bash&#34; data-lang=&#34;bash&#34;&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;nmap -sC -sV -vv -oA nmap/initial_scan &amp;lt;Target-IP&amp;gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;ul&gt;&#xA;&lt;li&gt;&lt;code&gt;-sC&lt;/code&gt; Default script scan&lt;/li&gt;&#xA;&lt;li&gt;&lt;code&gt;-sV&lt;/code&gt; Service version detection&lt;/li&gt;&#xA;&lt;li&gt;&lt;code&gt;-vv&lt;/code&gt; Verbose output&lt;/li&gt;&#xA;&lt;li&gt;&lt;code&gt;-oA&lt;/code&gt; Output all formats&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;p&gt;Nmap reports only Port 80 open:&lt;/p&gt;</description>
    </item>
  </channel>
</rss>
