
    <rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
      <channel>
        <title>Leopard&#39;s Blogsite</title>
        <link>https://le0pard.vercel.app/blog</link>
        <description></description>
        <language>en-us</language>
        <managingEditor>Leopardplaysctf@gmail.com (Yasir Mehmood)</managingEditor>
        <webMaster>Leopardplaysctf@gmail.com (Yasir Mehmood)</webMaster>
        <lastBuildDate>Mon, 06 Apr 2026 00:00:00 GMT</lastBuildDate>
        <atom:link href="https://le0pard.vercel.app/tags/cmdshell/feed.xml" rel="self" type="application/rss+xml"/>
        
    <item>
      <guid>https://le0pard.vercel.app/blog/HTB-DarkZero-Writeup</guid>
      <title>Hack-The-Box - Hard - Windows - DarkZero</title>
      <link>https://le0pard.vercel.app/blog/HTB-DarkZero-Writeup</link>
      <description>Initial MSSQL access with provided creds revealed a linked server to DC02, enabling xp_cmdshell for lateral movement. CVE-2024-30088 granted SYSTEM on DC02 for user.txt. Unconstrained delegation on DC01 allowed TGT capture via coercion, then DCSync extracted Administrator hash for root.txt.</description>
      <pubDate>Mon, 06 Apr 2026 00:00:00 GMT</pubDate>
      <author>Leopardplaysctf@gmail.com (Yasir Mehmood)</author>
      <category>ALL BLOGS</category><category>Hack-The-Box</category><category>Pentesting</category><category>Machines</category><category>Writeup</category><category>Season-9</category><category>Windows</category><category>Hard</category><category>Active-Directory</category><category>Bloodhound</category><category>MSSQL</category><category>DCSync</category><category>CMDSHELL</category><category>Lateral Movement</category><category>authz_basep</category><category>CVE-2024-30088</category><category>Unconstrained Delegation</category><category>Mimikatz</category><category>Rubeus</category><category>LinkedSQLServer</category><category>Coercion</category>
    </item>
  
      </channel>
    </rss>
  