RustScan
┌──(kali㉿kali)-[~/archive/htb/labs/outdated]
└─$ rustscan -a $IP -b 25000
________________________________________
: https://discord.gg/GFrQsGy :
: https://github.com/RustScan/RustScan :
--------------------------------------
please contribute more quotes to our github https://github.com/rustscan/rustscan
[~] The config file is expected to be at "/home/kali/.rustscan.toml"
[~] Automatically increasing ulimit value to 5000.
[!] File limit is lower than default batch size. Consider upping with --ulimit. May cause harm to sensitive servers
open 10.10.11.175:25
open 10.10.11.175:53
open 10.10.11.175:88
open 10.10.11.175:135
open 10.10.11.175:139
open 10.10.11.175:389
open 10.10.11.175:445
open 10.10.11.175:464
open 10.10.11.175:593
open 10.10.11.175:636
open 10.10.11.175:3268
open 10.10.11.175:3269
open 10.10.11.175:5985
open 10.10.11.175:8530
open 10.10.11.175:8531
open 10.10.11.175:9389
open 10.10.11.175:49667
open 10.10.11.175:49685
open 10.10.11.175:49686
open 10.10.11.175:49944
open 10.10.11.175:49921
open 10.10.11.175:55165
Nmap
┌──(kali㉿kali)-[~/archive/htb/labs/outdated]
└─$ nmap -Pn -p- $IP
Starting Nmap 7.94SVN ( https://nmap.org ) at 2024-01-03 12:21 CET
Nmap scan report for 10.10.11.175
Host is up (0.029s latency).
Not shown: 65513 filtered tcp ports (no-response)
PORT STATE SERVICE
25/tcp open smtp
53/tcp open domain
88/tcp open kerberos-sec
135/tcp open msrpc
139/tcp open netbios-ssn
389/tcp open ldap
445/tcp open microsoft-ds
464/tcp open kpasswd5
593/tcp open http-rpc-epmap
636/tcp open ldapssl
3268/tcp open globalcatLDAP
3269/tcp open globalcatLDAPssl
5985/tcp open wsman
8530/tcp open unknown
8531/tcp open unknown
9389/tcp open adws
49667/tcp open unknown
49685/tcp open unknown
49686/tcp open unknown
49921/tcp open unknown
49944/tcp open unknown
55165/tcp open unknown
Nmap done: 1 IP address (1 host up) scanned in 420.25 seconds
┌──(kali㉿kali)-[~/archive/htb/labs/outdated]
└─$ nmap -Pn -sC -sV -p25,53,88,135,139,389,445,464,593,636,3268,3269,5985,8530,8531,9389,49667,49685,49686,49944,49921,55165 $IP
Starting Nmap 7.94SVN ( https://nmap.org ) at 2024-01-03 12:25 CET
Stats: 0:01:42 elapsed; 0 hosts completed (1 up), 1 undergoing Service Scan
Service scan Timing: About 95.45% done; ETC: 12:27 (0:00:05 remaining)
Stats: 0:02:22 elapsed; 0 hosts completed (1 up), 1 undergoing Service Scan
Service scan Timing: About 100.00% done; ETC: 12:27 (0:00:00 remaining)
Nmap scan report for 10.10.11.175
Host is up (0.029s latency).
PORT STATE SERVICE VERSION
25/tcp open smtp hMailServer smtpd
| smtp-commands: mail.outdated.htb, SIZE 20480000, AUTH LOGIN, HELP
|_ 211 DATA HELO EHLO MAIL NOOP QUIT RCPT RSET SAML TURN VRFY
53/tcp open domain?
88/tcp open kerberos-sec Microsoft Windows Kerberos (server time: 2024-01-03 19:25:21Z)
135/tcp open msrpc Microsoft Windows RPC
139/tcp open netbios-ssn Microsoft Windows netbios-ssn
389/tcp open ldap Microsoft Windows Active Directory LDAP (Domain: outdated.htb0., Site: Default-First-Site-Name)
| ssl-cert: Subject: commonName=DC.outdated.htb
| Subject Alternative Name: othername: 1.3.6.1.4.1.311.25.1::<unsupported>, DNS:DC.outdated.htb
| Not valid before: 2023-12-13T00:17:36
|_Not valid after: 2024-12-12T00:17:36
|_ssl-date: 2024-01-03T19:28:18+00:00; +7h59m51s from scanner time.
445/tcp open microsoft-ds?
464/tcp open kpasswd5?
593/tcp open ncacn_http Microsoft Windows RPC over HTTP 1.0
636/tcp open ssl/ldap Microsoft Windows Active Directory LDAP (Domain: outdated.htb0., Site: Default-First-Site-Name)
|_ssl-date: 2024-01-03T19:28:18+00:00; +7h59m51s from scanner time.
| ssl-cert: Subject: commonName=DC.outdated.htb
| Subject Alternative Name: othername: 1.3.6.1.4.1.311.25.1::<unsupported>, DNS:DC.outdated.htb
| Not valid before: 2023-12-13T00:17:36
|_Not valid after: 2024-12-12T00:17:36
3268/tcp open ldap Microsoft Windows Active Directory LDAP (Domain: outdated.htb0., Site: Default-First-Site-Name)
|_ssl-date: 2024-01-03T19:28:18+00:00; +7h59m51s from scanner time.
| ssl-cert: Subject: commonName=DC.outdated.htb
| Subject Alternative Name: othername: 1.3.6.1.4.1.311.25.1::<unsupported>, DNS:DC.outdated.htb
| Not valid before: 2023-12-13T00:17:36
|_Not valid after: 2024-12-12T00:17:36
3269/tcp open ssl/ldap Microsoft Windows Active Directory LDAP (Domain: outdated.htb0., Site: Default-First-Site-Name)
|_ssl-date: 2024-01-03T19:28:18+00:00; +7h59m51s from scanner time.
| ssl-cert: Subject: commonName=DC.outdated.htb
| Subject Alternative Name: othername: 1.3.6.1.4.1.311.25.1::<unsupported>, DNS:DC.outdated.htb
| Not valid before: 2023-12-13T00:17:36
|_Not valid after: 2024-12-12T00:17:36
5985/tcp open http Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP)
|_http-server-header: Microsoft-HTTPAPI/2.0
|_http-title: Not Found
8530/tcp open http Microsoft IIS httpd 10.0
| http-methods:
|_ Potentially risky methods: TRACE
|_http-title: Site doesn't have a title.
|_http-server-header: Microsoft-IIS/10.0
8531/tcp open unknown
9389/tcp open mc-nmf .NET Message Framing
49667/tcp open msrpc Microsoft Windows RPC
49685/tcp open ncacn_http Microsoft Windows RPC over HTTP 1.0
49686/tcp open msrpc Microsoft Windows RPC
49921/tcp open msrpc Microsoft Windows RPC
49944/tcp open msrpc Microsoft Windows RPC
55165/tcp open msrpc Microsoft Windows RPC
Service Info: Hosts: mail.outdated.htb, DC; OS: Windows; CPE: cpe:/o:microsoft:windows
Host script results:
| smb2-time:
| date: 2024-01-03T19:27:41
|_ start_date: N/A
| smb2-security-mode:
| 3:1:1:
|_ Message signing enabled and required
|_clock-skew: mean: 7h59m50s, deviation: 0s, median: 7h59m50s
Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 186.11 seconds
The target system appears to be a Domain Controller in an Active Directory environment
The domain is outdated.htb
According to the scan result above, the FQDN of the DC host is DC.outdated.htb
while the target system appears to be mail.outdated.htb
Although the target environment has not been identified yet, I will have those written down to the /etc/hosts
file
The domain information has been appended to the
/etc/hosts
file on Kali for local DNS resolution
UDP
┌──(kali㉿kali)-[~/archive/htb/labs/outdated]
└─$ sudo nmap -sU -top-ports 1000 $IP
starting nmap 7.94svn ( https://nmap.org ) at 2024-01-03 12:15 CET
Nmap scan report for 10.10.11.175
Host is up (0.029s latency).
not shown: 997 open|filtered udp ports (no-response)
PORT STATE SERVICE
53/udp open domain
88/udp open kerberos-sec
123/udp open ntp
nmap done: 1 IP address (1 host up) scanned in 12.25 seconds
┌──(kali㉿kali)-[~/archive/htb/labs/outdated]
└─$ sudo nmap -Pn -sU -sC -sV -p53,88,123 $IP
[sudo] password for kali:
starting nmap 7.94svn ( https://nmap.org ) at 2024-01-03 12:26 CET
Nmap scan report for 10.10.11.175
Host is up (0.025s latency).
PORT STATE SERVICE VERSION
53/udp open domain (generic dns response: NOTIMP)
| fingerprint-strings:
| nbtstat:
|_ CKAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
88/udp open kerberos-sec microsoft windows kerberos (server time: 2024-01-03 19:26:30Z)
123/udp open ntp NTP v3
| ntp-info:
|_
1 service unrecognized despite returning data. if you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
sf-port53-udp:V=7.94SVN%I=7%D=1/3%Time=6595447E%P=x86_64-pc-linux-gnu%r(NB
sf:TStat,32,"\x80\xf0\x80\x82\0\x01\0\0\0\0\0\0\x20CKAAAAAAAAAAAAAAAAAAAAA
sf:AAAAAAAAA\0\0!\0\x01");
service info: OS: Windows; CPE: cpe:/o:microsoft:windows
host script results:
|_clock-skew: 7h59m56s
service detection performed. please report any incorrect results at https://nmap.org/submit/ .
nmap done: 1 IP address (1 host up) scanned in 31.50 seconds