MSRPC
The MSRPC is running on the standard port 135
and 593
over HTTP
IOXIDResolver.py
┌──(kali㉿kali)-[~/archive/htb/labs/mantis]
└─$ python3 IOXIDResolver.py -t $IP
[*] Retrieving network interface of 10.10.10.52
Address: mantis
Address: 10.10.10.52
Address: dead:beef::c546:e5ad:b718:d27a
IOXIDResolver allows me to enumerate the target NICs through the RPC
It discovered an IPv6 address; dead:beef::c546:e5ad:b718:d27a
IPv6
┌──(kali㉿kali)-[~/archive/htb/labs/mantis]
└─$ rustscan -a dead:beef::c546:e5ad:b718:d27a -b 10000
.----. .-. .-. .----..---. .----. .---. .--. .-. .-.
| {} }| { } |{ {__ {_ _}{ {__ / ___} / {} \ | `| |
| .-. \| {_} |.-._} } | | .-._} }\ }/ /\ \| |\ |
`-' `-'`-----'`----' `-' `----' `---' `-' `-'`-' `-'
The Modern Day Port Scanner.
________________________________________
: https://discord.gg/GFrQsGy :
: https://github.com/RustScan/RustScan :
--------------------------------------
0day was here ♥
[~] The config file is expected to be at "/home/kali/.rustscan.toml"
[~] Automatically increasing ulimit value to 5000.
[!] File limit is lower than default batch size. Consider upping with --ulimit. May cause harm to sensitive servers
open [dead:beef::c546:e5ad:b718:d27a]:53
open [dead:beef::c546:e5ad:b718:d27a]:88
open [dead:beef::c546:e5ad:b718:d27a]:135
open [dead:beef::c546:e5ad:b718:d27a]:389
open [dead:beef::c546:e5ad:b718:d27a]:445
open [dead:beef::c546:e5ad:b718:d27a]:464
open [dead:beef::c546:e5ad:b718:d27a]:593
open [dead:beef::c546:e5ad:b718:d27a]:1337
open [dead:beef::c546:e5ad:b718:d27a]:1433
open [dead:beef::c546:e5ad:b718:d27a]:3268
open [dead:beef::c546:e5ad:b718:d27a]:3269
open [dead:beef::c546:e5ad:b718:d27a]:5722
open [dead:beef::c546:e5ad:b718:d27a]:8080
open [dead:beef::c546:e5ad:b718:d27a]:9389
open [dead:beef::c546:e5ad:b718:d27a]:47001
open [dead:beef::c546:e5ad:b718:d27a]:49152
open [dead:beef::c546:e5ad:b718:d27a]:49153
open [dead:beef::c546:e5ad:b718:d27a]:49154
open [dead:beef::c546:e5ad:b718:d27a]:49155
open [dead:beef::c546:e5ad:b718:d27a]:49157
open [dead:beef::c546:e5ad:b718:d27a]:49158
open [dead:beef::c546:e5ad:b718:d27a]:49161
open [dead:beef::c546:e5ad:b718:d27a]:49165
open [dead:beef::c546:e5ad:b718:d27a]:49168
open [dead:beef::c546:e5ad:b718:d27a]:50255
It doesn’t seem any different from the initial Nmap scan on the IP address
impacket-rpcdump
┌──(kali㉿kali)-[~/archive/htb/labs/mantis]
└─$ impacket-rpcdump $IP
Impacket v0.10.0 - Copyright 2022 SecureAuth Corporation
[*] Retrieving endpoint list from 10.10.10.52
Protocol: [MS-RSP]: Remote Shutdown Protocol
Provider: wininit.exe
UUID : D95AFE70-A6D5-4259-822E-2C84DA1DDB0D v1.0
Bindings:
ncacn_ip_tcp:10.10.10.52[49152]
ncalrpc:[WindowsShutdown]
ncacn_np:\\MANTIS[\PIPE\InitShutdown]
ncalrpc:[WMsgKRpc08B660]
Protocol: N/A
Provider: winlogon.exe
UUID : 76F226C3-EC14-4325-8A99-6A46348418AF v1.0
Bindings:
ncalrpc:[WindowsShutdown]
ncacn_np:\\MANTIS[\PIPE\InitShutdown]
ncalrpc:[WMsgKRpc08B660]
ncalrpc:[WMsgKRpc08F491]
Protocol: N/A
Provider: sysntfy.dll
UUID : C9AC6DB5-82B7-4E55-AE8A-E464ED7B4277 v1.0 Impl friendly name
Bindings:
ncalrpc:[LRPC-a22123f3d74a93b8d8]
ncalrpc:[senssvc]
ncalrpc:[OLE40F70AB0CC13437D9173F3D57C91]
ncalrpc:[IUserProfile2]
ncalrpc:[IUserProfile2]
ncalrpc:[IUserProfile2]
Protocol: N/A
Provider: dhcpcsvc.dll
UUID : 3C4728C5-F0AB-448B-BDA1-6CE01EB0A6D5 v1.0 DHCP Client LRPC Endpoint
Bindings:
ncalrpc:[dhcpcsvc]
ncalrpc:[dhcpcsvc6]
ncacn_ip_tcp:10.10.10.52[49153]
ncacn_np:\\MANTIS[\pipe\eventlog]
ncalrpc:[eventlog]
Protocol: N/A
Provider: dhcpcsvc6.dll
UUID : 3C4728C5-F0AB-448B-BDA1-6CE01EB0A6D6 v1.0 DHCPv6 Client LRPC Endpoint
Bindings:
ncalrpc:[dhcpcsvc6]
ncacn_ip_tcp:10.10.10.52[49153]
ncacn_np:\\MANTIS[\pipe\eventlog]
ncalrpc:[eventlog]
Protocol: N/A
Provider: nrpsrv.dll
UUID : 30ADC50C-5CBC-46CE-9A0E-91914789E23C v1.0 NRP server endpoint
Bindings:
ncacn_ip_tcp:10.10.10.52[49153]
ncacn_np:\\MANTIS[\pipe\eventlog]
ncalrpc:[eventlog]
Protocol: [MS-EVEN6]: EventLog Remoting Protocol
Provider: wevtsvc.dll
UUID : F6BEAFF7-1E19-4FBB-9F8F-B89E2018337C v1.0 Event log TCPIP
Bindings:
ncacn_ip_tcp:10.10.10.52[49153]
ncacn_np:\\MANTIS[\pipe\eventlog]
ncalrpc:[eventlog]
Protocol: N/A
Provider: iphlpsvc.dll
UUID : 552D076A-CB29-4E44-8B6A-D15E59E2C0AF v1.0 IP Transition Configuration endpoint
Bindings:
ncacn_np:\\MANTIS[\PIPE\srvsvc]
ncacn_ip_tcp:10.10.10.52[49154]
ncacn_np:\\MANTIS[\PIPE\atsvc]
ncalrpc:[senssvc]
ncalrpc:[OLE40F70AB0CC13437D9173F3D57C91]
ncalrpc:[IUserProfile2]
Protocol: N/A
Provider: IKEEXT.DLL
UUID : A398E520-D59A-4BDD-AA7A-3C1E0303A511 v1.0 IKE/Authip API
Bindings:
ncacn_np:\\MANTIS[\PIPE\srvsvc]
ncacn_ip_tcp:10.10.10.52[49154]
ncacn_np:\\MANTIS[\PIPE\atsvc]
ncalrpc:[senssvc]
ncalrpc:[OLE40F70AB0CC13437D9173F3D57C91]
ncalrpc:[IUserProfile2]
Protocol: N/A
Provider: srvsvc.dll
UUID : 98716D03-89AC-44C7-BB8C-285824E51C4A v1.0 XactSrv service
Bindings:
ncacn_ip_tcp:10.10.10.52[49154]
ncacn_np:\\MANTIS[\PIPE\atsvc]
ncalrpc:[senssvc]
ncalrpc:[OLE40F70AB0CC13437D9173F3D57C91]
ncalrpc:[IUserProfile2]
Protocol: [MS-TSCH]: Task Scheduler Service Remoting Protocol
Provider: schedsvc.dll
UUID : 86D35949-83C9-4044-B424-DB363231FD0C v1.0
Bindings:
ncacn_ip_tcp:10.10.10.52[49154]
ncacn_np:\\MANTIS[\PIPE\atsvc]
ncalrpc:[senssvc]
ncalrpc:[OLE40F70AB0CC13437D9173F3D57C91]
ncalrpc:[IUserProfile2]
Protocol: [MS-TSCH]: Task Scheduler Service Remoting Protocol
Provider: taskcomp.dll
UUID : 378E52B0-C0A9-11CF-822D-00AA0051E40F v1.0
Bindings:
ncacn_np:\\MANTIS[\PIPE\atsvc]
ncalrpc:[senssvc]
ncalrpc:[OLE40F70AB0CC13437D9173F3D57C91]
ncalrpc:[IUserProfile2]
Protocol: [MS-TSCH]: Task Scheduler Service Remoting Protocol
Provider: taskcomp.dll
UUID : 1FF70682-0A51-30E8-076D-740BE8CEE98B v1.0
Bindings:
ncacn_np:\\MANTIS[\PIPE\atsvc]
ncalrpc:[senssvc]
ncalrpc:[OLE40F70AB0CC13437D9173F3D57C91]
ncalrpc:[IUserProfile2]
Protocol: N/A
Provider: schedsvc.dll
UUID : 0A74EF1C-41A4-4E06-83AE-DC74FB1CDD53 v1.0
Bindings:
ncalrpc:[senssvc]
ncalrpc:[OLE40F70AB0CC13437D9173F3D57C91]
ncalrpc:[IUserProfile2]
Protocol: N/A
Provider: gpsvc.dll
UUID : 2EB08E3E-639F-4FBA-97B1-14F878961076 v1.0
Bindings:
ncalrpc:[OLE40F70AB0CC13437D9173F3D57C91]
ncalrpc:[IUserProfile2]
Protocol: N/A
Provider: authui.dll
UUID : 24019106-A203-4642-B88D-82DAE9158929 v1.0
Bindings:
ncalrpc:[LRPC-5ac3df7e9162da544c]
Protocol: N/A
Provider: N/A
UUID : 3473DD4D-2E88-4006-9CBA-22570909DD10 v5.1 WinHttp Auto-Proxy Service
Bindings:
ncacn_np:\\MANTIS[\PIPE\W32TIME_ALT]
ncalrpc:[W32TIME_ALT]
ncalrpc:[LRPC-df7a3fceaa031f34d5]
ncalrpc:[OLE7BFDA877E0F648F597758C345CF4]
Protocol: N/A
Provider: nsisvc.dll
UUID : 7EA70BCF-48AF-4F6A-8968-6A440754D5FA v1.0 NSI server endpoint
Bindings:
ncalrpc:[LRPC-df7a3fceaa031f34d5]
ncalrpc:[OLE7BFDA877E0F648F597758C345CF4]
Protocol: N/A
Provider: MPSSVC.dll
UUID : 2FB92682-6599-42DC-AE13-BD2CA89BD11C v1.0 Fw APIs
Bindings:
ncalrpc:[LRPC-b9cc2e8a5ff347b6ec]
Protocol: N/A
Provider: MPSSVC.dll
UUID : 7F9D11BF-7FB9-436B-A812-B2D50C5D4C03 v1.0 Fw APIs
Bindings:
ncalrpc:[LRPC-b9cc2e8a5ff347b6ec]
Protocol: N/A
Provider: BFE.DLL
UUID : DD490425-5325-4565-B774-7E27D6C09C24 v1.0 Base Firewall Engine API
Bindings:
ncalrpc:[LRPC-b9cc2e8a5ff347b6ec]
Protocol: [MS-NRPC]: Netlogon Remote Protocol
Provider: netlogon.dll
UUID : 12345678-1234-ABCD-EF00-01234567CFFB v1.0
Bindings:
ncacn_ip_tcp:10.10.10.52[49158]
ncacn_http:10.10.10.52[49157]
ncalrpc:[NTDS_LPC]
ncalrpc:[OLE42620453ABBD4B5B9562F7FBFB9D]
ncacn_ip_tcp:10.10.10.52[49155]
ncalrpc:[samss lpc]
ncalrpc:[dsrole]
ncacn_np:\\MANTIS[\PIPE\protected_storage]
ncalrpc:[protected_storage]
ncalrpc:[lsasspirpc]
ncalrpc:[lsapolicylookup]
ncalrpc:[LSARPC_ENDPOINT]
ncalrpc:[securityevent]
ncalrpc:[audit]
ncalrpc:[LRPC-2fd1d854c5b789d7bd]
ncacn_np:\\MANTIS[\pipe\lsass]
Protocol: [MS-SAMR]: Security Account Manager (SAM) Remote Protocol
Provider: samsrv.dll
UUID : 12345778-1234-ABCD-EF00-0123456789AC v1.0
Bindings:
ncacn_ip_tcp:10.10.10.52[49158]
ncacn_http:10.10.10.52[49157]
ncalrpc:[NTDS_LPC]
ncalrpc:[OLE42620453ABBD4B5B9562F7FBFB9D]
ncacn_ip_tcp:10.10.10.52[49155]
ncalrpc:[samss lpc]
ncalrpc:[dsrole]
ncacn_np:\\MANTIS[\PIPE\protected_storage]
ncalrpc:[protected_storage]
ncalrpc:[lsasspirpc]
ncalrpc:[lsapolicylookup]
ncalrpc:[LSARPC_ENDPOINT]
ncalrpc:[securityevent]
ncalrpc:[audit]
ncalrpc:[LRPC-2fd1d854c5b789d7bd]
ncacn_np:\\MANTIS[\pipe\lsass]
Protocol: [MS-LSAT]: Local Security Authority (Translation Methods) Remote
Provider: lsasrv.dll
UUID : 12345778-1234-ABCD-EF00-0123456789AB v0.0
Bindings:
ncacn_http:10.10.10.52[49157]
ncalrpc:[NTDS_LPC]
ncalrpc:[OLE42620453ABBD4B5B9562F7FBFB9D]
ncacn_ip_tcp:10.10.10.52[49155]
ncalrpc:[samss lpc]
ncalrpc:[dsrole]
ncacn_np:\\MANTIS[\PIPE\protected_storage]
ncalrpc:[protected_storage]
ncalrpc:[lsasspirpc]
ncalrpc:[lsapolicylookup]
ncalrpc:[LSARPC_ENDPOINT]
ncalrpc:[securityevent]
ncalrpc:[audit]
ncalrpc:[LRPC-2fd1d854c5b789d7bd]
ncacn_np:\\MANTIS[\pipe\lsass]
Protocol: [MS-DRSR]: Directory Replication Service (DRS) Remote Protocol
Provider: ntdsai.dll
UUID : E3514235-4B06-11D1-AB04-00C04FC2DCD2 v4.0 MS NT Directory DRS Interface
Bindings:
ncacn_http:10.10.10.52[49157]
ncalrpc:[NTDS_LPC]
ncalrpc:[OLE42620453ABBD4B5B9562F7FBFB9D]
ncacn_ip_tcp:10.10.10.52[49155]
ncalrpc:[samss lpc]
ncalrpc:[dsrole]
ncacn_np:\\MANTIS[\PIPE\protected_storage]
ncalrpc:[protected_storage]
ncalrpc:[lsasspirpc]
ncalrpc:[lsapolicylookup]
ncalrpc:[LSARPC_ENDPOINT]
ncalrpc:[securityevent]
ncalrpc:[audit]
ncalrpc:[LRPC-2fd1d854c5b789d7bd]
ncacn_np:\\MANTIS[\pipe\lsass]
Protocol: N/A
Provider: spoolsv.exe
UUID : 4A452661-8290-4B36-8FBE-7F4093A94978 v1.0 Spooler function endpoint
Bindings:
ncalrpc:[spoolss]
Protocol: [MS-PAN]: Print System Asynchronous Notification Protocol
Provider: spoolsv.exe
UUID : AE33069B-A2A8-46EE-A235-DDFD339BE281 v1.0 Spooler base remote object endpoint
Bindings:
ncalrpc:[spoolss]
Protocol: [MS-PAN]: Print System Asynchronous Notification Protocol
Provider: spoolsv.exe
UUID : 0B6EDBFA-4A24-4FC6-8A23-942B1ECA65D1 v1.0 Spooler function endpoint
Bindings:
ncalrpc:[spoolss]
Protocol: [MS-SCMR]: Service Control Manager Remote Protocol
Provider: services.exe
UUID : 367ABB81-9844-35F1-AD32-98F038001003 v2.0
Bindings:
ncacn_ip_tcp:10.10.10.52[49161]
Protocol: [MS-DNSP]: Domain Name Service (DNS) Server Management
Provider: dns.exe
UUID : 50ABC2A4-574D-40B3-9D66-EE4FD5FBA076 v5.0
Bindings:
ncacn_ip_tcp:10.10.10.52[49165]
Protocol: [MS-RPRN]: Print System Remote Protocol
Provider: spoolsv.exe
UUID : 12345678-1234-ABCD-EF00-0123456789AB v1.0 IPSec Policy agent endpoint
Bindings:
ncalrpc:[LRPC-2a9c7467adafdf9cbb]
ncacn_ip_tcp:10.10.10.52[49168]
Protocol: [MS-FASP]: Firewall and Advanced Security Protocol
Provider: FwRemoteSvr.dll
UUID : 6B5BDD1E-528C-422C-AF8C-A4079BE4FE48 v1.0 Remote Fw APIs
Bindings:
ncacn_ip_tcp:10.10.10.52[49168]
Protocol: [MS-CMPO]: MSDTC Connection Manager:
Provider: msdtcprx.dll
UUID : 906B0CE0-C70B-1067-B317-00DD010662DA v1.0
Bindings:
ncalrpc:[LRPC-000f40c0841dd838ee]
ncalrpc:[OLE2668ADC420134091A2083854003B]
ncalrpc:[LRPC-a94ff1c080c42d46eb]
ncalrpc:[LRPC-a94ff1c080c42d46eb]
ncalrpc:[LRPC-a94ff1c080c42d46eb]
ncalrpc:[LRPC-a94ff1c080c42d46eb]
Protocol: [MS-FRS2]: Distributed File System Replication Protocol
Provider: dfsrmig.exe
UUID : 897E2E5F-93F3-4376-9C9C-FD2277495C27 v1.0 Frs2 Service
Bindings:
ncacn_ip_tcp:10.10.10.52[5722]
ncalrpc:[OLE28E10749B0054CA6BAEDEF847D64]
[*] Received 152 endpoints.
impacket-rpcdump
revealed the target RPC endpoint
Notice there are MS-PAN
and MS-RPRN
from the Window Spooler service running.
But there is no end point to connect to ncacn_np:\\MANTIS[\PIPE\spoolss]
Other than those, everything else seems normal