🏛️ CORP\Active Directory Portal

PRACIVO LAB — INTENTIONALLY VULNERABLE
⚠️ Pracivo Security Lab — LDAP injection in login, pass the hash, Kerberoasting simulation, exposed NTLM hashes.

Pass the Hash Lab

In Windows environments, NTLM hashes can be used directly for authentication without cracking them first. Get hashes from /users then use them here.

Step 1: Go to /users to get NTLM hashes. Step 2: Paste the hash here to authenticate without cracking it.