
    <rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
      <channel>
        <title>Leopard&#39;s Blogsite</title>
        <link>https://le0pard.vercel.app/blog</link>
        <description></description>
        <language>en-us</language>
        <managingEditor>Leopardplaysctf@gmail.com (Yasir Mehmood)</managingEditor>
        <webMaster>Leopardplaysctf@gmail.com (Yasir Mehmood)</webMaster>
        <lastBuildDate>Mon, 06 Apr 2026 00:00:00 GMT</lastBuildDate>
        <atom:link href="https://le0pard.vercel.app/tags/authz_basep/feed.xml" rel="self" type="application/rss+xml"/>
        
    <item>
      <guid>https://le0pard.vercel.app/blog/HTB-DarkZero-Writeup</guid>
      <title>Hack-The-Box - Hard - Windows - DarkZero</title>
      <link>https://le0pard.vercel.app/blog/HTB-DarkZero-Writeup</link>
      <description>Initial MSSQL access on DC01, linked instance on DC02 enables xp_cmdshell for lateral movement. CVE-2024-30088 elevates to SYSTEM. Unconstrained delegation on DC01 coerced via MSSQL to capture TGT with Rubeus, then DCSync extracts Administrator hash for root flag.</description>
      <pubDate>Mon, 06 Apr 2026 00:00:00 GMT</pubDate>
      <author>Leopardplaysctf@gmail.com (Yasir Mehmood)</author>
      <category>ALL BLOGS</category><category>Hack-The-Box</category><category>Pentesting</category><category>Machines</category><category>Writeup</category><category>Season-9</category><category>Windows</category><category>Hard</category><category>Active-Directory</category><category>Bloodhound</category><category>MSSQL</category><category>Unconstrained Delegation</category><category>DCSync</category><category>CVE-2024-30088</category><category>Lateral Movement</category><category>authz_basep</category><category>Mimikatz</category><category>Rubeus</category>
    </item>
  
      </channel>
    </rss>
  