DNS
Nmap discovered a DNS server on the target port 53
The running service is Simple DNS Plus
Reverse Lookup
┌──(kali㉿kali)-[~/archive/htb/labs/search]
└─$ nslookup
> server 10.10.11.129
Default server: 10.10.11.129
Address: 10.10.11.129#53
> 127.0.0.1
1.0.0.127.in-addr.arpa name = localhost.
> search.htb
Server: 10.10.11.129
Address: 10.10.11.129#53
Name: search.htb
Address: 10.10.11.129
Name: search.htb
Address: dead:beef::250
> research.search.htb
Server: 10.10.11.129
Address: 10.10.11.129#53
Name: research.search.htb
Address: 10.10.11.129
Name: research.search.htb
Address: dead:beef::7483:bfdd:785f:d63e
Name: research.search.htb
Address: dead:beef::24e
3 AAAA (IPv6) records associated with the target domain are revealed;
dead:beef::250
dead:beef::7483:bfdd:785f:d63e
dead:beef::24e
AAAA (IPv6) Records
┌──(kali㉿kali)-[~/archive/htb/labs/search]
└─$ rustscan -a dead:beef::7483:bfdd:785f:d63e -b 25000
________________________________________
: https://discord.gg/GFrQsGy :
: https://github.com/RustScan/RustScan :
--------------------------------------
please contribute more quotes to our github https://github.com/rustscan/rustscan
[~] The config file is expected to be at "/home/kali/.rustscan.toml"
[~] Automatically increasing ulimit value to 5000.
[!] File limit is lower than default batch size. Consider upping with --ulimit. May cause harm to sensitive servers
open [dead:beef::7483:bfdd:785f:d63e]:53
open [dead:beef::7483:bfdd:785f:d63e]:80
open [dead:beef::7483:bfdd:785f:d63e]:88
open [dead:beef::7483:bfdd:785f:d63e]:135
open [dead:beef::7483:bfdd:785f:d63e]:445
open [dead:beef::7483:bfdd:785f:d63e]:443
open [dead:beef::7483:bfdd:785f:d63e]:464
open [dead:beef::7483:bfdd:785f:d63e]:593
open [dead:beef::7483:bfdd:785f:d63e]:3268
open [dead:beef::7483:bfdd:785f:d63e]:3269
open [dead:beef::7483:bfdd:785f:d63e]:8172
open [dead:beef::7483:bfdd:785f:d63e]:9389
┌──(kali㉿kali)-[~/archive/htb/labs/search]
└─$ rustscan -a dead:beef::24e -b 25000
________________________________________
: https://discord.gg/GFrQsGy :
: https://github.com/RustScan/RustScan :
--------------------------------------
😵 https://admin.tryhackme.com
[~] The config file is expected to be at "/home/kali/.rustscan.toml"
[~] Automatically increasing ulimit value to 5000.
[!] File limit is lower than default batch size. Consider upping with --ulimit. May cause harm to sensitive servers
open [dead:beef::24e]:53
open [dead:beef::24e]:80
open [dead:beef::24e]:88
open [dead:beef::24e]:135
open [dead:beef::24e]:443
open [dead:beef::24e]:445
open [dead:beef::24e]:464
open [dead:beef::24e]:593
open [dead:beef::24e]:3269
open [dead:beef::24e]:3268
open [dead:beef::24e]:8172
open [dead:beef::24e]:9389
services on both dead:beef::7483:bfdd:785f:d63e
and dead:beef::24e
hosts are already available on the IPv4 address
dead:beef::250
┌──(kali㉿kali)-[~/archive/htb/labs/search]
└─$ rustscan -a dead:beef::250 -b 25000
________________________________________
: https://discord.gg/GFrQsGy :
: https://github.com/RustScan/RustScan :
--------------------------------------
Nmap? More like slowmap.🐢
[~] The config file is expected to be at "/home/kali/.rustscan.toml"
[~] Automatically increasing ulimit value to 5000.
[!] File limit is lower than default batch size. Consider upping with --ulimit. May cause harm to sensitive servers
Open [dead:beef::250]:53
Open [dead:beef::250]:88
Open [dead:beef::250]:135
Open [dead:beef::250]:389
Open [dead:beef::250]:445
Open [dead:beef::250]:443
Open [dead:beef::250]:464
Open [dead:beef::250]:593
Open [dead:beef::250]:636
Open [dead:beef::250]:1801
Open [dead:beef::250]:2103
Open [dead:beef::250]:2105
Open [dead:beef::250]:2107
Open [dead:beef::250]:2179
Open [dead:beef::250]:3268
Open [dead:beef::250]:3269
Open [dead:beef::250]:3389
Open [dead:beef::250]:6406
Open [dead:beef::250]:6404
Open [dead:beef::250]:6410
Open [dead:beef::250]:6407
Open [dead:beef::250]:6616
Open [dead:beef::250]:6642
Open [dead:beef::250]:9389
Open [dead:beef::250]:19126
The dead:beef::250
host, on the other hand, is rather unique that it’s hosting a lot more services that were never seen before
I’ll look more into this
(It turns out HTB has a network issue that allow me to connect to another VM instance. For that reason, I will be disregarding this finding)
dig
┌──(kali㉿kali)-[~/archive/htb/labs/search]
└─$ dig any SEARCH.HTB @$IP
; <<>> DiG 9.19.17-2~kali1-Kali <<>> any SEARCH.HTB @10.10.11.129
;; global options: +cmd
;; got answer:
;; ->>header<<- opcode: QUERY, status: NOERROR, id: 11582
;; flags: qr aa rd ra; QUERY: 1, ANSWER: 4, AUTHORITY: 0, ADDITIONAL: 4
;; opt pseudosection:
; edns: version: 0, flags:; udp: 4000
;; question section:
;SEARCH.HTB. IN ANY
;; answer section:
SEARCH.HTB. 600 IN A 10.10.11.129
SEARCH.HTB. 3600 IN NS research.SEARCH.HTB.
SEARCH.HTB. 3600 IN SOA research.SEARCH.HTB. hostmaster.SEARCH.HTB. 436 900 600 86400 3600
search.htb. 600 in aaaa dead:beef::250
;; additional section:
research.SEARCH.HTB. 3600 IN A 10.10.11.129
research.search.htb. 3600 in aaaa dead:beef::24e
research.search.htb. 3600 in aaaa dead:beef::7483:bfdd:785f:d63e
;; query time: 28 msec
;; server: 10.10.11.129#53(10.10.11.129) (TCP)
;; when: Mon Jan 29 12:47:37 CET 2024
;; msg size rcvd: 225
dig also revealed those 3 AAAA records;
dead:beef::250
dead:beef::7483:bfdd:785f:d63e
dead:beef::24e
dnsenum
┌──(kali㉿kali)-[~/archive/htb/labs/search]
└─$ dnsenum SEARCH.HTB --dnsserver $IP -f /usr/share/wordlists/seclists/Discovery/DNS/subdomains-top1million-110000.txt --threads 16
dnsenum VERSION:1.2.6
----- search.htb -----
Host's addresses:
__________________
search.htb. 600 IN A 10.10.11.129
Name Servers:
______________
research.search.htb. 3600 IN A 10.10.11.129
Mail (MX) Servers:
___________________
Trying Zone Transfers and getting Bind Versions:
_________________________________________________
unresolvable name: research.search.htb at /usr/bin/dnsenum line 900 thread 1.
Trying Zone Transfer for search.htb on research.search.htb ...
AXFR record query failed: no nameservers
Brute forcing with /usr/share/wordlists/seclists/Discovery/DNS/subdomains-top1million-110000.txt:
__________________________________________________________________________________________________
portal.search.htb. 1200 IN A 10.10.11.11
research.search.htb. 3600 IN A 10.10.11.129
gc._msdcs.search.htb. 600 IN A 10.10.11.129
domaindnszones.search.htb. 600 IN A 10.10.11.129
forestdnszones.search.htb. 600 IN A 10.10.11.129
search.htb class C netranges:
______________________________
Performing reverse lookup on 0 ip addresses:
_____________________________________________
0 results out of 0 IP addresses.
search.htb ip blocks:
______________________
done.
dnsenum finds an additional A record, portal.search.htb
, with an IP address of 10.10.11.11
portal.search.htb
┌──(kali㉿kali)-[~/archive/htb/labs/search]
└─$ ping 10.10.11.11 -c 1
PING 10.10.11.11 (10.10.11.11) 56(84) bytes of data.
From 10.10.14.1 icmp_seq=1 Destination Host Unreachable
--- 10.10.11.11 ping statistics ---
1 packets transmitted, 0 received, +1 errors, 100% packet loss, time 0ms
Unable to reach the 10.10.11.11
host
dnsrecon
┌──(kali㉿kali)-[~/archive/htb/labs/search]
└─$ dnsrecon -d SEARCH.HTB -n $IP -D /usr/share/wordlists/seclists/Discovery/DNS/subdomains-top1million-110000.txt --threads 16
[*] std: Performing General Enumeration against: SEARCH.HTB...
[-] DNSSEC is not configured for SEARCH.HTB
[*] SOA research.SEARCH.HTB 10.10.11.129
[*] SOA research.SEARCH.HTB dead:beef::7483:bfdd:785f:d63e
[*] SOA research.SEARCH.HTB dead:beef::24e
[*] NS research.SEARCH.HTB 10.10.11.129
[*] NS research.SEARCH.HTB dead:beef::7483:bfdd:785f:d63e
[*] NS research.SEARCH.HTB dead:beef::24e
[*] A SEARCH.HTB 10.10.11.129
[*] AAAA SEARCH.HTB dead:beef::250
[*] Enumerating SRV Records
[+] SRV _ldap._tcp.SEARCH.HTB research.search.htb 10.10.11.129 389
[+] SRV _ldap._tcp.SEARCH.HTB research.search.htb dead:beef::24e 389
[+] SRV _ldap._tcp.SEARCH.HTB research.search.htb dead:beef::7483:bfdd:785f:d63e 389
[+] SRV _kerberos._udp.SEARCH.HTB research.search.htb 10.10.11.129 88
[+] SRV _kerberos._udp.SEARCH.HTB research.search.htb dead:beef::7483:bfdd:785f:d63e 88
[+] SRV _kerberos._udp.SEARCH.HTB research.search.htb dead:beef::24e 88
[+] SRV _kerberos._tcp.SEARCH.HTB research.search.htb 10.10.11.129 88
[+] SRV _kerberos._tcp.SEARCH.HTB research.search.htb dead:beef::24e 88
[+] SRV _kerberos._tcp.SEARCH.HTB research.search.htb dead:beef::7483:bfdd:785f:d63e 88
[+] SRV _gc._tcp.SEARCH.HTB research.search.htb 10.10.11.129 3268
[+] SRV _gc._tcp.SEARCH.HTB research.search.htb dead:beef::7483:bfdd:785f:d63e 3268
[+] SRV _gc._tcp.SEARCH.HTB research.search.htb dead:beef::24e 3268
[+] SRV _ldap._tcp.ForestDNSZones.SEARCH.HTB research.search.htb 10.10.11.129 389
[+] SRV _ldap._tcp.ForestDNSZones.SEARCH.HTB research.search.htb dead:beef::7483:bfdd:785f:d63e 389
[+] SRV _ldap._tcp.ForestDNSZones.SEARCH.HTB research.search.htb dead:beef::24e 389
[+] SRV _kpasswd._tcp.SEARCH.HTB research.search.htb 10.10.11.129 464
[+] SRV _kpasswd._tcp.SEARCH.HTB research.search.htb dead:beef::24e 464
[+] SRV _kpasswd._tcp.SEARCH.HTB research.search.htb dead:beef::7483:bfdd:785f:d63e 464
[+] SRV _kpasswd._udp.SEARCH.HTB research.search.htb 10.10.11.129 464
[+] SRV _kpasswd._udp.SEARCH.HTB research.search.htb dead:beef::24e 464
[+] SRV _kpasswd._udp.SEARCH.HTB research.search.htb dead:beef::7483:bfdd:785f:d63e 464
[+] SRV _ldap._tcp.gc._msdcs.SEARCH.HTB research.search.htb 10.10.11.129 3268
[+] SRV _ldap._tcp.gc._msdcs.SEARCH.HTB research.search.htb dead:beef::7483:bfdd:785f:d63e 3268
[+] SRV _ldap._tcp.gc._msdcs.SEARCH.HTB research.search.htb dead:beef::24e 3268
[+] SRV _ldap._tcp.pdc._msdcs.SEARCH.HTB research.search.htb 10.10.11.129 389
[+] SRV _ldap._tcp.pdc._msdcs.SEARCH.HTB research.search.htb dead:beef::7483:bfdd:785f:d63e 389
[+] SRV _ldap._tcp.pdc._msdcs.SEARCH.HTB research.search.htb dead:beef::24e 389
[+] SRV _ldap._tcp.dc._msdcs.SEARCH.HTB research.search.htb 10.10.11.129 389
[+] SRV _ldap._tcp.dc._msdcs.SEARCH.HTB research.search.htb dead:beef::7483:bfdd:785f:d63e 389
[+] SRV _ldap._tcp.dc._msdcs.SEARCH.HTB research.search.htb dead:beef::24e 389
[+] SRV _kerberos._tcp.dc._msdcs.SEARCH.HTB research.search.htb 10.10.11.129 88
[+] SRV _kerberos._tcp.dc._msdcs.SEARCH.HTB research.search.htb dead:beef::24e 88
[+] SRV _kerberos._tcp.dc._msdcs.SEARCH.HTB research.search.htb dead:beef::7483:bfdd:785f:d63e 88
[+] 33 Records Found