Cryptographic algorithms for UNCLASSIFIED, PROTECTED A, and PROTECTED B information - ITSP.40.111
This document aids technology practitioners in choosing and appropriately using cryptographic algorithms.
本文是Medium难度的HTB Manager机器的域渗透部分,其中RID cycling, MSSQL xp_dirtree, ESC7 exploitation等域渗透提权细节是此box的特色,主要参考0xdf’s blog manager walkthrough和HTB的manager官方writeup paper记录这篇博客加深记忆和理解,及供后续做深入研究查阅,备忘。
CVE-2021-4034 PwnKit PolKit pkexec Local Privilege Escalation Vulnerability