Win-Enum: Windows & Active Directory Auto-Enumerator

Introduction Win-Enum is an automated enumeration tool I built to speed up the initial reconnaissance phase when targeting Windows machines and Active Directory environments. It runs common enumeration tools in sequence and organizes the output for easy review. Language: Python 3 Target: Windows / Active Directory Purpose: OSCP preparation, penetration testing GitHub: github.com/jashidsany/win-enum Why I Built This During OSCP preparation, I found myself running the same enumeration commands repeatedly: Nmap scan SMB null session check User enumeration AS-REP roasting attempt Web directory brute forcing This tool automates all of that and saves output in an organized structure. ...

February 22, 2026 · 3 min

HackTheBox: Forest - AS-REP Roasting & DCSync Attack

Introduction Forest is a Windows Active Directory Domain Controller on HackTheBox. This box demonstrates common AD misconfigurations and attack paths including AS-REP Roasting, privileged group abuse, and DCSync attacks. Difficulty: Easy OS: Windows Skills: AD Enumeration, AS-REP Roasting, Privilege Escalation, DCSync Reconnaissance Nmap Scan nmap -sC -sV -Pn 10.129.1.248 Key findings: Port Service Significance 53 DNS Domain Controller 88 Kerberos AD Authentication 135 RPC Windows RPC 389/3268 LDAP AD Directory 445 SMB File sharing 5985 WinRM Remote management Domain: htb.local Computer: FOREST.htb.local ...

February 21, 2026 · 3 min