đź“”
UnderTheWire
  • Introduction
  • Century
    • Century 0 -> 5
    • Century 5 -> 10
    • Century 10 -> 15
  • Cyborg
    • Cyborg 0 -> 5
    • Cyborg 5 -> 10
    • Cyborg 10 -> 15
  • Groot
    • Groot 0 -> 5
    • Groot 5 -> 10
    • Groot 10 ->15
  • Oracle
    • Oracle 0 -> 5
    • Oracle 5 -> 10
    • Oracle 10 -> 15
  • Trebek
    • Trebek 0 -> 5
    • Trebek 5 -> 10
    • Trebek 10 -> 15
Powered by GitBook
On this page
  • Groot 5 -> 6
  • Groot 6 -> 7
  • Groot 7 -> 8
  • Groot 8 -> 9
  • Groot 9 -> 10

Was this helpful?

  1. Groot

Groot 5 -> 10

PreviousGroot 0 -> 5NextGroot 10 ->15

Last updated 4 years ago

Was this helpful?

Groot 5 -> 6

The password for groot6 is the name of the workstation that the user with a username of “baby.groot” can log into as depicted in Active Directory PLUS the name of the file on the desktop

Get-AdUser -Filter "SamAccountName -eq 'baby.groot'" -Property LogonWorkstations
Password: wk11_enterprise

Groot 6 -> 7

The password for groot7 is the name of the program that is set to start when this user logs in PLUS the name of the file on the desktop.

Get-ChildItem HKCU:\Software\Microsoft\Windows\CurrentVersion
Look for the 'run' key
Password: star-lord_rules

Groot 7 -> 8

The password for groot8 is the name of the dll, as depicted in the registry, associated with the “applockerfltr” service PLUS the name of the file on the desktop.

Get-Item HKLM:\SYSTEM\CurrentControlSet\Services\applockerfltr
Password: srpapi_home

Groot 8 -> 9

The password for groot9 is the description of the firewall rule blocking MySQL PLUS the name of the file on the desktop.

Get-NetFirewallRule -DisplayName MySQL | select Description
Password: call_me_starlord

Groot 9 -> 10

The password for groot10 is the name of the OU that doesn’t have accidental deletion protection enabled PLUS the name of the file on the desktop.

Get-ADOrganizationalUnit -filter * -Properties ProtectedFromAccidentalDeletion | where {$_.ProtectedFromAccidentalDeletion -match $False} | select name
Password: t-25_tester

https://docs.microsoft.com/en-us/windows-hardware/drivers/install/hklm-system-currentcontrolset-services-registry-tree
https://docs.microsoft.com/en-us/powershell/module/netsecurity/get-netfirewallrule?view=windowsserver2019-ps