THM Flags

What is the valid email address from the list ?

canderson@gmail.com

What is the flag ? (Exploiting Vulnerable Password Reset Logic)

THM{50_pr3d1ct4BL333!!}	

What is the flag? (Exploiting HTTP Basic Authentication)

THM{b4$$1C_AuTTHHH}

In a Windows domain, credentials are stored in a centralised repository called ?

Active Directory

The server in charge of running the Active Directory services is called ?

Domain Admins

What would be the name of the machine account associated with a machine named TOM-PC ?

TOM-PC$

Suppose our company creates a new department for Quality Assurance. What type of containers should we use to group all Quality Assurance users so that policies can be applied consistently to them ?

Organizational Units

What was the flag found on Sophie's desktop ?

THM{thanks_for_contacting_support}

The process of granting privileges to a user over some OU or other AD Object is called ?

delegation

After organising the available computers, how many ended up in the Workstations OU ?

7

Is it recommendable to create separate OUs for Servers and Workstations? (yay/nay) ?

yay

What is the name of the network share used to distribute GPOs to domain machines ?

sysvol

Can a GPO be used to apply settings to users and computers? (yay/nay) ?

Yay

Will a current version of Windows use NetNTLM as the preferred authentication protocol by default? (yay/nay) ?

nay

When referring to Kerberos, what type of ticket allows us to request further tickets known as TGS ?

Ticket Granting Ticket

When using NetNTLM, is a user's password transmitted over the network at any point? (yay/nay) ?

nay

Last updated