MGR1

Executive Workstation (Target)
OS: Windows 11 Pro 24H2
Domain: cjcs.local (Domain-Joined)
IP: 192.168.56.11
User: marcus_chen (Domain Admin)
Status: VULNERABLE
MGR1 represents a worst-case scenario for enterprise security - Domain Admin credentials in cleartext registry, disabled security controls, high-risk services without authentication barriers, the works. This will allow me to start with basic attack methodologies and improve my red team capabilities as I introduce new detection mechanisms.

Critical Findings

🔑 Auto-Logon DA Credentials

marcus_chen (Domain Admin) password stored in cleartext registry via HKLM...Winlogon.

Impact: Domain Compromise

🚫 UAC Disabled

EnableLUA = 0 ensures every process runs with full administrator token silently.

Impact: Silent PrivEsc

🌐 Unrestricted Remote Access

RDP (3389) and SMB (445) exposed with no network-level controls.

Impact: Lateral Movement

Techniques (MITRE ATT&CK)

T1552.002 CRITICAL
Credentials in Registry
reg.exe PowerShell
T1548.002 HIGH
Bypass UAC
Registry Mod Token Manip
T1021 HIGH
Remote Services
nmap Hydra