Enumeration Nmap From the Nmap scan, we can see that the target has various TCP ports open, including 53 (DNS), 80 (HTTP), 88 (Kerberos), 389 (LDAP), 445 (SMB), and 5985 (WinRM). It’s worth noting that the target is part of an Active Directory domain called intelligence.htb, and we can see a hostname for the domain… Continue reading Hack the Box: Intelligence
Tag: Active Directory
Hack the Box: Escape
Enumeration Nmap Based on the Nmap scan, it appears that the target has various TCP ports open, including 53 (DNS), 88 (Kerberos), 389 (LDAP), 445 (SMB), 1433 (MSSQL), and 5985 (WinRM). It’s worth noting that the target is a part of a domain called sequel.htb, and we can see a hostname for the domain controller… Continue reading Hack the Box: Escape
Hack the Box: Timelapse
Enumeration Nmap The Nmap scan shows among other things that TCP ports 53 (DNS), 88 (Kerberos), 445 (SMB), and 5986 (WinRM with SSL) are open on the target. Target is part of an Active Directory domain called timelapse.htb; the computer name is DC01. SMB With Smbclient we were able to list the available shares using… Continue reading Hack the Box: Timelapse
Hack the Box: Active
Enumerointi Nmap Nmap-skannauksesta huomataan, että kohteessa on muun muassa avoinna portti 53 (DNS), LDAP portit 389 ja 3268 sekä portti 445 (SM). Nmap tunnistaa kohteen Active Directory toimialueen: active.htb. Kohde on Active Directory Domain Controller, jossa on Windows Server 2008 käyttöjärjestelmä. Nmap-skriptillä safe huomataan, että kohteessa on SMB-versio 2 käynnissä ja Message signing on päällä,… Continue reading Hack the Box: Active