
    <rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
      <channel>
        <title>Leopard&#39;s Blogsite</title>
        <link>https://le0pard.vercel.app/blog</link>
        <description></description>
        <language>en-us</language>
        <managingEditor>Leopardplaysctf@gmail.com (Yasir Mehmood)</managingEditor>
        <webMaster>Leopardplaysctf@gmail.com (Yasir Mehmood)</webMaster>
        <lastBuildDate>Mon, 24 Nov 2025 00:00:00 GMT</lastBuildDate>
        <atom:link href="https://le0pard.vercel.app/tags/nats-server/feed.xml" rel="self" type="application/rss+xml"/>
        
    <item>
      <guid>https://le0pard.vercel.app/blog/HTB-Mirage-Writeup</guid>
      <title>Hack-The-Box - Hard - Windows - Mirage</title>
      <link>https://le0pard.vercel.app/blog/HTB-Mirage-Writeup</link>
      <description>Initial SMB share revealed reports with usernames &amp; DNS misconfig. Performed MITM via DNS, stole NATS creds, found domain user. Kerberoasted to initial shell. Escalated using Winlogon creds, ACE ForceChangePassword, ReadGMSAPassword. Exploited ESC10 &amp; RBCD to DCSync and get SYSTEM.</description>
      <pubDate>Mon, 24 Nov 2025 00:00:00 GMT</pubDate>
      <author>Leopardplaysctf@gmail.com (Yasir Mehmood)</author>
      <category>ALL BLOGS</category><category>Hack-The-Box</category><category>Pentesting</category><category>Machines</category><category>Writeup</category><category>Season-8</category><category>Windows</category><category>Hard</category><category>Active-Directory</category><category>Bloodhound</category><category>NATS-Server</category><category>MITM</category><category>RID-Brute-Force</category><category>AD-CS</category><category>Kerberoasting</category><category>Winlogon</category><category>ACLs</category><category>ACEs</category><category>ForceChangePassword</category><category>ReadGMSAPassword</category><category>ESC10</category><category>RBCD</category><category>S4U</category>
    </item>
  
      </channel>
    </rss>
  