MSRPC
Nmap discovered a MSRPC service on the target port 135
┌──(kali㉿kali)-[~/archive/htb/labs/apt]
└─$ rpcclient $IP -N -U ''
Cannot connect to server. Error was NT_STATUS_IO_TIMEOUT
The target MSRPC service doesn’t seem to allow anonymous access
RPC Endpoint
┌──(kali㉿kali)-[~/archive/htb/labs/apt]
└─$ impacket-rpcdump $IP
Impacket v0.11.0 - Copyright 2023 Fortra
[*] Retrieving endpoint list from 10.10.10.213
Protocol: [MS-RSP]: Remote Shutdown Protocol
Provider: wininit.exe
UUID : D95AFE70-A6D5-4259-822E-2C84DA1DDB0D v1.0
Bindings:
ncacn_ip_tcp:10.10.10.213[49664]
ncalrpc:[WindowsShutdown]
ncacn_np:\\APT[\PIPE\InitShutdown]
ncalrpc:[WMsgKRpc06F5B0]
Protocol: N/A
Provider: winlogon.exe
UUID : 76F226C3-EC14-4325-8A99-6A46348418AF v1.0
Bindings:
ncalrpc:[WindowsShutdown]
ncacn_np:\\APT[\PIPE\InitShutdown]
ncalrpc:[WMsgKRpc06F5B0]
ncalrpc:[WMsgKRpc071C11]
Protocol: N/A
Provider: N/A
UUID : D09BDEB5-6171-4A34-BFE2-06FA82652568 v1.0
Bindings:
ncalrpc:[csebpub]
ncalrpc:[LRPC-932188f70bc7c4c30b]
ncalrpc:[LRPC-8c19541253fe9dfab3]
ncacn_np:\\APT[\pipe\LSM_API_service]
ncalrpc:[LSMApi]
ncalrpc:[LRPC-1d28b333dcaf820af7]
ncalrpc:[actkernel]
ncalrpc:[umpo]
ncalrpc:[LRPC-8c19541253fe9dfab3]
ncacn_np:\\APT[\pipe\LSM_API_service]
ncalrpc:[LSMApi]
ncalrpc:[LRPC-1d28b333dcaf820af7]
ncalrpc:[actkernel]
ncalrpc:[umpo]
ncalrpc:[LRPC-38502b7fa05e708539]
ncalrpc:[dhcpcsvc]
ncalrpc:[dhcpcsvc6]
ncacn_ip_tcp:10.10.10.213[49665]
ncacn_np:\\APT[\pipe\eventlog]
ncalrpc:[eventlog]
ncalrpc:[LRPC-1920febf6c31ca0a65]
Protocol: N/A
Provider: N/A
UUID : 697DCDA9-3BA9-4EB2-9247-E11F1901B0D2 v1.0
Bindings:
ncalrpc:[LRPC-932188f70bc7c4c30b]
ncalrpc:[LRPC-8c19541253fe9dfab3]
ncacn_np:\\APT[\pipe\LSM_API_service]
ncalrpc:[LSMApi]
ncalrpc:[LRPC-1d28b333dcaf820af7]
ncalrpc:[actkernel]
ncalrpc:[umpo]
Protocol: N/A
Provider: sysntfy.dll
UUID : C9AC6DB5-82B7-4E55-AE8A-E464ED7B4277 v1.0 Impl friendly name
Bindings:
ncalrpc:[LRPC-1d28b333dcaf820af7]
ncalrpc:[actkernel]
ncalrpc:[umpo]
ncalrpc:[senssvc]
ncalrpc:[OLE4F49E0D1DB5BA2D0B4CE06E30C84]
ncalrpc:[IUserProfile2]
ncalrpc:[IUserProfile2]
ncalrpc:[LRPC-eecd9e94a0aaca8ab1]
ncalrpc:[OLED41E83CF8CFE42AB066284DF9D2D]
ncacn_ip_tcp:10.10.10.213[49667]
ncalrpc:[samss lpc]
ncalrpc:[SidKey Local End Point]
ncalrpc:[protected_storage]
ncalrpc:[lsasspirpc]
ncalrpc:[lsapolicylookup]
ncalrpc:[LSA_EAS_ENDPOINT]
ncalrpc:[lsacap]
ncalrpc:[LSARPC_ENDPOINT]
ncalrpc:[securityevent]
ncalrpc:[audit]
ncacn_np:\\APT[\pipe\lsass]
Protocol: N/A
Provider: nrpsrv.dll
UUID : 30ADC50C-5CBC-46CE-9A0E-91914789E23C v1.0 NRP server endpoint
Bindings:
ncalrpc:[LRPC-cac2d5a61e55017107]
ncalrpc:[LRPC-38502b7fa05e708539]
ncalrpc:[dhcpcsvc]
ncalrpc:[dhcpcsvc6]
ncacn_ip_tcp:10.10.10.213[49665]
ncacn_np:\\APT[\pipe\eventlog]
ncalrpc:[eventlog]
ncalrpc:[LRPC-1920febf6c31ca0a65]
Protocol: N/A
Provider: N/A
UUID : A500D4C6-0DD1-4543-BC0C-D5F93486EAF8 v1.0
Bindings:
ncalrpc:[LRPC-cac2d5a61e55017107]
ncalrpc:[LRPC-38502b7fa05e708539]
ncalrpc:[dhcpcsvc]
ncalrpc:[dhcpcsvc6]
ncacn_ip_tcp:10.10.10.213[49665]
ncacn_np:\\APT[\pipe\eventlog]
ncalrpc:[eventlog]
ncalrpc:[LRPC-1920febf6c31ca0a65]
Protocol: N/A
Provider: dhcpcsvc.dll
UUID : 3C4728C5-F0AB-448B-BDA1-6CE01EB0A6D5 v1.0 DHCP Client LRPC Endpoint
Bindings:
ncalrpc:[dhcpcsvc]
ncalrpc:[dhcpcsvc6]
ncacn_ip_tcp:10.10.10.213[49665]
ncacn_np:\\APT[\pipe\eventlog]
ncalrpc:[eventlog]
ncalrpc:[LRPC-1920febf6c31ca0a65]
Protocol: N/A
Provider: dhcpcsvc6.dll
UUID : 3C4728C5-F0AB-448B-BDA1-6CE01EB0A6D6 v1.0 DHCPv6 Client LRPC Endpoint
Bindings:
ncalrpc:[dhcpcsvc6]
ncacn_ip_tcp:10.10.10.213[49665]
ncacn_np:\\APT[\pipe\eventlog]
ncalrpc:[eventlog]
ncalrpc:[LRPC-1920febf6c31ca0a65]
Protocol: [MS-EVEN6]: EventLog Remoting Protocol
Provider: wevtsvc.dll
UUID : F6BEAFF7-1E19-4FBB-9F8F-B89E2018337C v1.0 Event log TCPIP
Bindings:
ncacn_ip_tcp:10.10.10.213[49665]
ncacn_np:\\APT[\pipe\eventlog]
ncalrpc:[eventlog]
ncalrpc:[LRPC-1920febf6c31ca0a65]
Protocol: N/A
Provider: IKEEXT.DLL
UUID : A398E520-D59A-4BDD-AA7A-3C1E0303A511 v1.0 IKE/Authip API
Bindings:
ncalrpc:[LRPC-e489e3baf8605468fa]
ncacn_ip_tcp:10.10.10.213[49666]
ncalrpc:[ubpmtaskhostchannel]
ncacn_np:\\APT[\PIPE\atsvc]
ncalrpc:[senssvc]
ncalrpc:[OLE4F49E0D1DB5BA2D0B4CE06E30C84]
ncalrpc:[IUserProfile2]
Protocol: N/A
Provider: N/A
UUID : 0D3C7F20-1C8D-4654-A1B3-51563B298BDA v1.0 UserMgrCli
Bindings:
ncalrpc:[LRPC-e489e3baf8605468fa]
ncacn_ip_tcp:10.10.10.213[49666]
ncalrpc:[ubpmtaskhostchannel]
ncacn_np:\\APT[\PIPE\atsvc]
ncalrpc:[senssvc]
ncalrpc:[OLE4F49E0D1DB5BA2D0B4CE06E30C84]
ncalrpc:[IUserProfile2]
Protocol: N/A
Provider: N/A
UUID : B18FBAB6-56F8-4702-84E0-41053293A869 v1.0 UserMgrCli
Bindings:
ncalrpc:[LRPC-e489e3baf8605468fa]
ncacn_ip_tcp:10.10.10.213[49666]
ncalrpc:[ubpmtaskhostchannel]
ncacn_np:\\APT[\PIPE\atsvc]
ncalrpc:[senssvc]
ncalrpc:[OLE4F49E0D1DB5BA2D0B4CE06E30C84]
ncalrpc:[IUserProfile2]
Protocol: N/A
Provider: N/A
UUID : 3A9EF155-691D-4449-8D05-09AD57031823 v1.0
Bindings:
ncacn_ip_tcp:10.10.10.213[49666]
ncalrpc:[ubpmtaskhostchannel]
ncacn_np:\\APT[\PIPE\atsvc]
ncalrpc:[senssvc]
ncalrpc:[OLE4F49E0D1DB5BA2D0B4CE06E30C84]
ncalrpc:[IUserProfile2]
Protocol: [MS-TSCH]: Task Scheduler Service Remoting Protocol
Provider: schedsvc.dll
UUID : 86D35949-83C9-4044-B424-DB363231FD0C v1.0
Bindings:
ncacn_ip_tcp:10.10.10.213[49666]
ncalrpc:[ubpmtaskhostchannel]
ncacn_np:\\APT[\PIPE\atsvc]
ncalrpc:[senssvc]
ncalrpc:[OLE4F49E0D1DB5BA2D0B4CE06E30C84]
ncalrpc:[IUserProfile2]
Protocol: [MS-TSCH]: Task Scheduler Service Remoting Protocol
Provider: taskcomp.dll
UUID : 378E52B0-C0A9-11CF-822D-00AA0051E40F v1.0
Bindings:
ncacn_np:\\APT[\PIPE\atsvc]
ncalrpc:[senssvc]
ncalrpc:[OLE4F49E0D1DB5BA2D0B4CE06E30C84]
ncalrpc:[IUserProfile2]
Protocol: [MS-TSCH]: Task Scheduler Service Remoting Protocol
Provider: taskcomp.dll
UUID : 1FF70682-0A51-30E8-076D-740BE8CEE98B v1.0
Bindings:
ncacn_np:\\APT[\PIPE\atsvc]
ncalrpc:[senssvc]
ncalrpc:[OLE4F49E0D1DB5BA2D0B4CE06E30C84]
ncalrpc:[IUserProfile2]
Protocol: N/A
Provider: schedsvc.dll
UUID : 0A74EF1C-41A4-4E06-83AE-DC74FB1CDD53 v1.0
Bindings:
ncalrpc:[senssvc]
ncalrpc:[OLE4F49E0D1DB5BA2D0B4CE06E30C84]
ncalrpc:[IUserProfile2]
Protocol: N/A
Provider: gpsvc.dll
UUID : 2EB08E3E-639F-4FBA-97B1-14F878961076 v1.0 Group Policy RPC Interface
Bindings:
ncalrpc:[LRPC-6953e2be96c76a9cc3]
Protocol: N/A
Provider: nsisvc.dll
UUID : 7EA70BCF-48AF-4F6A-8968-6A440754D5FA v1.0 NSI server endpoint
Bindings:
ncalrpc:[LRPC-274829bd5aa9c26ac0]
Protocol: N/A
Provider: N/A
UUID : 7F1343FE-50A9-4927-A778-0C5859517BAC v1.0 DfsDs service
Bindings:
ncacn_np:\\APT[\PIPE\wkssvc]
ncalrpc:[DNSResolver]
ncalrpc:[LRPC-a2d606ce62be5b835d]
Protocol: N/A
Provider: N/A
UUID : EB081A0D-10EE-478A-A1DD-50995283E7A8 v3.0 Witness Client Test Interface
Bindings:
ncalrpc:[LRPC-a2d606ce62be5b835d]
Protocol: N/A
Provider: N/A
UUID : F2C9B409-C1C9-4100-8639-D8AB1486694A v1.0 Witness Client Upcall Server
Bindings:
ncalrpc:[LRPC-a2d606ce62be5b835d]
Protocol: N/A
Provider: N/A
UUID : DF4DF73A-C52D-4E3A-8003-8437FDF8302A v0.0 WM_WindowManagerRPC\Server
Bindings:
ncalrpc:[LRPC-dc9444ca58af5d7496]
ncalrpc:[LRPC-676dee13e7f4422953]
ncalrpc:[LRPC-c381f911f5187dee1c]
Protocol: N/A
Provider: MPSSVC.dll
UUID : 2FB92682-6599-42DC-AE13-BD2CA89BD11C v1.0 Fw APIs
Bindings:
ncalrpc:[LRPC-676dee13e7f4422953]
ncalrpc:[LRPC-c381f911f5187dee1c]
Protocol: N/A
Provider: N/A
UUID : F47433C3-3E9D-4157-AAD4-83AA1F5C2D4C v1.0 Fw APIs
Bindings:
ncalrpc:[LRPC-676dee13e7f4422953]
ncalrpc:[LRPC-c381f911f5187dee1c]
Protocol: N/A
Provider: MPSSVC.dll
UUID : 7F9D11BF-7FB9-436B-A812-B2D50C5D4C03 v1.0 Fw APIs
Bindings:
ncalrpc:[LRPC-676dee13e7f4422953]
ncalrpc:[LRPC-c381f911f5187dee1c]
Protocol: N/A
Provider: BFE.DLL
UUID : DD490425-5325-4565-B774-7E27D6C09C24 v1.0 Base Firewall Engine API
Bindings:
ncalrpc:[LRPC-c381f911f5187dee1c]
Protocol: [MS-NRPC]: Netlogon Remote Protocol
Provider: netlogon.dll
UUID : 12345678-1234-ABCD-EF00-01234567CFFB v1.0
Bindings:
ncalrpc:[NETLOGON_LRPC]
ncacn_ip_tcp:10.10.10.213[49670]
ncacn_np:\\APT[\pipe\26bf261de093392f]
ncacn_http:10.10.10.213[49669]
ncalrpc:[NTDS_LPC]
ncalrpc:[OLED41E83CF8CFE42AB066284DF9D2D]
ncacn_ip_tcp:10.10.10.213[49667]
ncalrpc:[samss lpc]
ncalrpc:[SidKey Local End Point]
ncalrpc:[protected_storage]
ncalrpc:[lsasspirpc]
ncalrpc:[lsapolicylookup]
ncalrpc:[LSA_EAS_ENDPOINT]
ncalrpc:[lsacap]
ncalrpc:[LSARPC_ENDPOINT]
ncalrpc:[securityevent]
ncalrpc:[audit]
ncacn_np:\\APT[\pipe\lsass]
Protocol: [MS-RAA]: Remote Authorization API Protocol
Provider: N/A
UUID : 0B1C2170-5732-4E0E-8CD3-D9B16F3B84D7 v0.0 RemoteAccessCheck
Bindings:
ncalrpc:[NETLOGON_LRPC]
ncacn_ip_tcp:10.10.10.213[49670]
ncacn_np:\\APT[\pipe\26bf261de093392f]
ncacn_http:10.10.10.213[49669]
ncalrpc:[NTDS_LPC]
ncalrpc:[OLED41E83CF8CFE42AB066284DF9D2D]
ncacn_ip_tcp:10.10.10.213[49667]
ncalrpc:[samss lpc]
ncalrpc:[SidKey Local End Point]
ncalrpc:[protected_storage]
ncalrpc:[lsasspirpc]
ncalrpc:[lsapolicylookup]
ncalrpc:[LSA_EAS_ENDPOINT]
ncalrpc:[lsacap]
ncalrpc:[LSARPC_ENDPOINT]
ncalrpc:[securityevent]
ncalrpc:[audit]
ncacn_np:\\APT[\pipe\lsass]
ncalrpc:[NETLOGON_LRPC]
ncacn_ip_tcp:10.10.10.213[49670]
ncacn_np:\\APT[\pipe\26bf261de093392f]
ncacn_http:10.10.10.213[49669]
ncalrpc:[NTDS_LPC]
ncalrpc:[OLED41E83CF8CFE42AB066284DF9D2D]
ncacn_ip_tcp:10.10.10.213[49667]
ncalrpc:[samss lpc]
ncalrpc:[SidKey Local End Point]
ncalrpc:[protected_storage]
ncalrpc:[lsasspirpc]
ncalrpc:[lsapolicylookup]
ncalrpc:[LSA_EAS_ENDPOINT]
ncalrpc:[lsacap]
ncalrpc:[LSARPC_ENDPOINT]
ncalrpc:[securityevent]
ncalrpc:[audit]
ncacn_np:\\APT[\pipe\lsass]
Protocol: N/A
Provider: efssvc.dll
UUID : 04EEB297-CBF4-466B-8A2A-BFD6A2F10BBA v1.0 EFSK RPC Interface
Bindings:
ncacn_np:\\APT[\pipe\efsrpc]
ncalrpc:[LRPC-8ecc3406d2d373af7a]
Protocol: N/A
Provider: efssvc.dll
UUID : DF1941C5-FE89-4E79-BF10-463657ACF44D v1.0 EFS RPC Interface
Bindings:
ncacn_np:\\APT[\pipe\efsrpc]
ncalrpc:[LRPC-8ecc3406d2d373af7a]
Protocol: [MS-SAMR]: Security Account Manager (SAM) Remote Protocol
Provider: samsrv.dll
UUID : 12345778-1234-ABCD-EF00-0123456789AC v1.0
Bindings:
ncacn_ip_tcp:10.10.10.213[49670]
ncacn_np:\\APT[\pipe\26bf261de093392f]
ncacn_http:10.10.10.213[49669]
ncalrpc:[NTDS_LPC]
ncalrpc:[OLED41E83CF8CFE42AB066284DF9D2D]
ncacn_ip_tcp:10.10.10.213[49667]
ncalrpc:[samss lpc]
ncalrpc:[SidKey Local End Point]
ncalrpc:[protected_storage]
ncalrpc:[lsasspirpc]
ncalrpc:[lsapolicylookup]
ncalrpc:[LSA_EAS_ENDPOINT]
ncalrpc:[lsacap]
ncalrpc:[LSARPC_ENDPOINT]
ncalrpc:[securityevent]
ncalrpc:[audit]
ncacn_np:\\APT[\pipe\lsass]
Protocol: [MS-LSAT]: Local Security Authority (Translation Methods) Remote
Provider: lsasrv.dll
UUID : 12345778-1234-ABCD-EF00-0123456789AB v0.0
Bindings:
ncacn_np:\\APT[\pipe\26bf261de093392f]
ncacn_http:10.10.10.213[49669]
ncalrpc:[NTDS_LPC]
ncalrpc:[OLED41E83CF8CFE42AB066284DF9D2D]
ncacn_ip_tcp:10.10.10.213[49667]
ncalrpc:[samss lpc]
ncalrpc:[SidKey Local End Point]
ncalrpc:[protected_storage]
ncalrpc:[lsasspirpc]
ncalrpc:[lsapolicylookup]
ncalrpc:[LSA_EAS_ENDPOINT]
ncalrpc:[lsacap]
ncalrpc:[LSARPC_ENDPOINT]
ncalrpc:[securityevent]
ncalrpc:[audit]
ncacn_np:\\APT[\pipe\lsass]
Protocol: [MS-DRSR]: Directory Replication Service (DRS) Remote Protocol
Provider: ntdsai.dll
UUID : E3514235-4B06-11D1-AB04-00C04FC2DCD2 v4.0 MS NT Directory DRS Interface
Bindings:
ncacn_np:\\APT[\pipe\26bf261de093392f]
ncacn_http:10.10.10.213[49669]
ncalrpc:[NTDS_LPC]
ncalrpc:[OLED41E83CF8CFE42AB066284DF9D2D]
ncacn_ip_tcp:10.10.10.213[49667]
ncalrpc:[samss lpc]
ncalrpc:[SidKey Local End Point]
ncalrpc:[protected_storage]
ncalrpc:[lsasspirpc]
ncalrpc:[lsapolicylookup]
ncalrpc:[LSA_EAS_ENDPOINT]
ncalrpc:[lsacap]
ncalrpc:[LSARPC_ENDPOINT]
ncalrpc:[securityevent]
ncalrpc:[audit]
ncacn_np:\\APT[\pipe\lsass]
Protocol: N/A
Provider: N/A
UUID : 1A0D010F-1C33-432C-B0F5-8CF4E8053099 v1.0 IdSegSrv service
Bindings:
ncalrpc:[LRPC-1e629246c3db23d0cc]
Protocol: N/A
Provider: srvsvc.dll
UUID : 98716D03-89AC-44C7-BB8C-285824E51C4A v1.0 XactSrv service
Bindings:
ncalrpc:[LRPC-1e629246c3db23d0cc]
Protocol: N/A
Provider: N/A
UUID : E38F5360-8572-473E-B696-1B46873BEEAB v1.0
Bindings:
ncalrpc:[LRPC-64406a2e345b137dd7]
Protocol: N/A
Provider: N/A
UUID : 4C9DBF19-D39E-4BB9-90EE-8F7179B20283 v1.0
Bindings:
ncalrpc:[LRPC-64406a2e345b137dd7]
Protocol: [MS-SCMR]: Service Control Manager Remote Protocol
Provider: services.exe
UUID : 367ABB81-9844-35F1-AD32-98F038001003 v2.0
Bindings:
ncacn_ip_tcp:10.10.10.213[49675]
Protocol: [MS-CMPO]: MSDTC Connection Manager:
Provider: msdtcprx.dll
UUID : 906B0CE0-C70B-1067-B317-00DD010662DA v1.0
Bindings:
ncalrpc:[LRPC-c7abf0ddd95d286acc]
ncalrpc:[OLECA45ACA07949F01E73A328CF03B3]
ncalrpc:[LRPC-94869335bf0deca8dc]
ncalrpc:[LRPC-94869335bf0deca8dc]
ncalrpc:[LRPC-94869335bf0deca8dc]
Protocol: N/A
Provider: winlogon.exe
UUID : 12E65DD8-887F-41EF-91BF-8D816C42C2E7 v1.0 Secure Desktop LRPC interface
Bindings:
ncalrpc:[WMsgKRpc071C11]
Protocol: [MS-DNSP]: Domain Name Service (DNS) Server Management
Provider: dns.exe
UUID : 50ABC2A4-574D-40B3-9D66-EE4FD5FBA076 v5.0
Bindings:
ncacn_ip_tcp:10.10.10.213[49695]
Protocol: [MS-FRS2]: Distributed File System Replication Protocol
Provider: dfsrmig.exe
UUID : 897E2E5F-93F3-4376-9C9C-FD2277495C27 v1.0 Frs2 Service
Bindings:
ncacn_ip_tcp:10.10.10.213[58348]
ncalrpc:[OLEC275F2559CB185D3DA588ACABB0D]
[*] Received 270 endpoints.
impacket-rpcdump enumerated a total of 270 RPC endpoints
Interestingly, there are a few services that are mostly available for Windows Active Directory environment, such as;
MS-DRSR
for directory replicationMS-DNSP
for DNSgpsvc.dll
: DLL responsible for Group Policy servicedhcpcsvc
anddhcpcsvc6
for DHCP service
This might be implications that the target system is either part of a Windows domain or the domain controller itself
IOXIDResolver
┌──(kali㉿kali)-[~/archive/htb/labs/apt]
└─$ python3 IOXIDResolver.py -t $IP
[*] Retrieving network interface of 10.10.10.213
address: apt
address: 10.10.10.213
address: dead:beef::24b
address: dead:beef::b885:d62a:d679:573f
address: dead:beef::183f:801c:80e2:9c63
IOXIDResolver found the hostname as well as 3 additional IPv6 addresses I will run some basic scans against these IPv6 addresses
IPv6
┌──(kali㉿kali)-[~/archive/htb/labs/apt]
└─$ rustscan -a dead:beef::24b -b 25000
________________________________________
: https://discord.gg/GFrQsGy :
: https://github.com/RustScan/RustScan :
--------------------------------------
Nmap? More like slowmap.🐢
[~] The config file is expected to be at "/home/kali/.rustscan.toml"
[~] Automatically increasing ulimit value to 5000.
[!] File limit is lower than default batch size. Consider upping with --ulimit. May cause harm to sensitive servers
Open [dead:beef::24b]:53
Open [dead:beef::24b]:80
Open [dead:beef::24b]:88
Open [dead:beef::24b]:135
Open [dead:beef::24b]:389
Open [dead:beef::24b]:445
Open [dead:beef::24b]:464
Open [dead:beef::24b]:593
Open [dead:beef::24b]:636
Open [dead:beef::24b]:3269
Open [dead:beef::24b]:3268
Open [dead:beef::24b]:5985
Open [dead:beef::24b]:9389
Open [dead:beef::24b]:47001
Open [dead:beef::24b]:49664
Open [dead:beef::24b]:49666
Open [dead:beef::24b]:49665
Open [dead:beef::24b]:49667
Open [dead:beef::24b]:49669
Open [dead:beef::24b]:49670
Open [dead:beef::24b]:49675
Open [dead:beef::24b]:49695
Open [dead:beef::24b]:58348
┌──(kali㉿kali)-[~/archive/htb/labs/apt]
└─$ rustscan -a dead:beef::b885:d62a:d679:573f -b 25000
________________________________________
: https://discord.gg/GFrQsGy :
: https://github.com/RustScan/RustScan :
--------------------------------------
😵 https://admin.tryhackme.com
[~] The config file is expected to be at "/home/kali/.rustscan.toml"
[~] Automatically increasing ulimit value to 5000.
[!] File limit is lower than default batch size. Consider upping with --ulimit. May cause harm to sensitive servers
Open [dead:beef::b885:d62a:d679:573f]:53
Open [dead:beef::b885:d62a:d679:573f]:88
Open [dead:beef::b885:d62a:d679:573f]:80
Open [dead:beef::b885:d62a:d679:573f]:135
Open [dead:beef::b885:d62a:d679:573f]:389
Open [dead:beef::b885:d62a:d679:573f]:445
Open [dead:beef::b885:d62a:d679:573f]:464
Open [dead:beef::b885:d62a:d679:573f]:593
Open [dead:beef::b885:d62a:d679:573f]:636
Open [dead:beef::b885:d62a:d679:573f]:3268
Open [dead:beef::b885:d62a:d679:573f]:3269
Open [dead:beef::b885:d62a:d679:573f]:5985
Open [dead:beef::b885:d62a:d679:573f]:9389
Open [dead:beef::b885:d62a:d679:573f]:47001
Open [dead:beef::b885:d62a:d679:573f]:49665
Open [dead:beef::b885:d62a:d679:573f]:49664
Open [dead:beef::b885:d62a:d679:573f]:49667
Open [dead:beef::b885:d62a:d679:573f]:49669
Open [dead:beef::b885:d62a:d679:573f]:49666
Open [dead:beef::b885:d62a:d679:573f]:49670
Open [dead:beef::b885:d62a:d679:573f]:49675
Open [dead:beef::b885:d62a:d679:573f]:49695
Open [dead:beef::b885:d62a:d679:573f]:58348
┌──(kali㉿kali)-[~/archive/htb/labs/apt]
└─$ rustscan -a dead:beef::183f:801c:80e2:9c63 -b 25000
________________________________________
: https://discord.gg/GFrQsGy :
: https://github.com/RustScan/RustScan :
--------------------------------------
😵 https://admin.tryhackme.com
[~] The config file is expected to be at "/home/kali/.rustscan.toml"
[~] Automatically increasing ulimit value to 5000.
[!] File limit is lower than default batch size. Consider upping with --ulimit. May cause harm to sensitive servers
Open [dead:beef::183f:801c:80e2:9c63]:53
Open [dead:beef::183f:801c:80e2:9c63]:80
Open [dead:beef::183f:801c:80e2:9c63]:88
Open [dead:beef::183f:801c:80e2:9c63]:135
Open [dead:beef::183f:801c:80e2:9c63]:389
Open [dead:beef::183f:801c:80e2:9c63]:445
Open [dead:beef::183f:801c:80e2:9c63]:464
Open [dead:beef::183f:801c:80e2:9c63]:593
Open [dead:beef::183f:801c:80e2:9c63]:636
Open [dead:beef::183f:801c:80e2:9c63]:3269
Open [dead:beef::183f:801c:80e2:9c63]:3268
Open [dead:beef::183f:801c:80e2:9c63]:5985
Open [dead:beef::183f:801c:80e2:9c63]:9389
Open [dead:beef::183f:801c:80e2:9c63]:47001
Open [dead:beef::183f:801c:80e2:9c63]:49670
Open [dead:beef::183f:801c:80e2:9c63]:49664
Open [dead:beef::183f:801c:80e2:9c63]:49665
Open [dead:beef::183f:801c:80e2:9c63]:49666
Open [dead:beef::183f:801c:80e2:9c63]:49675
Open [dead:beef::183f:801c:80e2:9c63]:49667
Open [dead:beef::183f:801c:80e2:9c63]:49669
Open [dead:beef::183f:801c:80e2:9c63]:49695
Open [dead:beef::183f:801c:80e2:9c63]:58348
Those IPv6 addresses have many ports open Judging by the open ports, the target system does indeed appears to be a Domain Controller in an Active Directory environment Proceeding to conducting an additional Recon operation