🏛️ CORP\Active Directory Portal

PRACIVO LAB — INTENTIONALLY VULNERABLE
⚠️ Pracivo Security Lab — LDAP injection in login, pass the hash, Kerberoasting simulation, exposed NTLM hashes.

Domain User Enumeration — All Hashes Exposed

In a real attack these hashes come from tools like Mimikatz, secretsdump, or ntdsutil.

UsernameDistinguished NameGroupsNTLM Hash
administratorCN=Administrator,CN=Users,DC=corp,DC=localDomain Admins, Enterprise Admins9e41538ef7f2d0f7d0a882a668710345
ramCN=Ram,OU=Students,DC=corp,DC=localDomain Users169e52d4048dd41dc715a8773634990e
john.smithCN=John Smith,OU=IT,DC=corp,DC=localDomain Users, IT Staffb56e0b4ea4962283bee762525c2d490f
svc_sqlCN=SQL Service,OU=ServiceAccounts,DC=corp,DC=localDomain Usersf5603806582528dcbd85c58ff552cd6c
svc_iisCN=IIS Service,OU=ServiceAccounts,DC=corp,DC=localDomain Usersd1a1674cc2138e76e4477654e1e7c1e6

Use these hashes in the Pass the Hash lab or crack them with Hashcat/John the Ripper.