2025年05月24日
nmap -A -T5 -oN /home/chicken/puppy.nmap 10.10.11.70
# Nmap 7.95 scan initiated Sat May 24 06:50:55 2025 as: nmap -A -T5 -oN /home/chicken/puppy.nmap 10.10.11.70 Nmap scan report for PUPPY.HTB (10.10.11.70) Host is up (0.12s latency). Not shown: 985 filtered tcp ports (no-response) Bug in iscsi-info: no string output. PORT STATE SERVICE VERSION 53/tcp open domain Simple DNS Plus 88/tcp open kerberos-sec Microsoft Windows Kerberos (server time: 2025-05-24 13:30:13Z) 111/tcp open rpcbind 2-4 (RPC #100000) | rpcinfo: | program version port/proto service | 100000 2,3,4 111/tcp rpcbind | 100000 2,3,4 111/tcp6 rpcbind | 100000 2,3,4 111/udp rpcbind | 100000 2,3,4 111/udp6 rpcbind | 100003 2,3 2049/udp nfs | 100003 2,3 2049/udp6 nfs | 100005 1,2,3 2049/udp mountd | 100005 1,2,3 2049/udp6 mountd | 100021 1,2,3,4 2049/tcp nlockmgr | 100021 1,2,3,4 2049/tcp6 nlockmgr | 100021 1,2,3,4 2049/udp nlockmgr | 100021 1,2,3,4 2049/udp6 nlockmgr | 100024 1 2049/tcp status | 100024 1 2049/tcp6 status | 100024 1 2049/udp status |_ 100024 1 2049/udp6 status 135/tcp open msrpc Microsoft Windows RPC 139/tcp open netbios-ssn Microsoft Windows netbios-ssn 389/tcp open ldap Microsoft Windows Active Directory LDAP (Domain: PUPPY.HTB0., Site: Default-First-Site-Name) 445/tcp open microsoft-ds? 464/tcp open kpasswd5? 593/tcp open ncacn_http Microsoft Windows RPC over HTTP 1.0 636/tcp open tcpwrapped 2049/tcp open nlockmgr 1-4 (RPC #100021) 3260/tcp open iscsi? 3268/tcp open ldap Microsoft Windows Active Directory LDAP (Domain: PUPPY.HTB0., Site: Default-First-Site-Name) 3269/tcp open tcpwrapped 5985/tcp open http Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP) |_http-title: Not Found |_http-server-header: Microsoft-HTTPAPI/2.0 Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port Device type: general purpose Running (JUST GUESSING): Microsoft Windows 2022|2012|2016 (89%) OS CPE: cpe:/o:microsoft:windows_server_2022 cpe:/o:microsoft:windows_server_2012:r2 cpe:/o:microsoft:windows_server_2016 Aggressive OS guesses: Microsoft Windows Server 2022 (89%), Microsoft Windows Server 2012 R2 (85%), Microsoft Windows Server 2016 (85%) No exact OS matches for host (test conditions non-ideal). Network Distance: 2 hops Service Info: Host: DC; OS: Windows; CPE: cpe:/o:microsoft:windows Host script results: |_clock-skew: 6h38m58s | smb2-time: | date: 2025-05-24T13:32:14 |_ start_date: N/A | smb2-security-mode: | 3:1:1: |_ Message signing enabled and required TRACEROUTE (using port 135/tcp) HOP RTT ADDRESS 1 128.93 ms 10.10.16.1 (10.10.16.1) 2 129.00 ms PUPPY.HTB (10.10.11.70) OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . # Nmap done at Sat May 24 06:54:07 2025 -- 1 IP address (1 host up) scanned in 192.91 seconds
ldapsearch -x -H "ldap://puppy.htb" -D "levi.james@PUPPY.HTB" -w "KingofAkron2025!" -b "dc=puppy,dc=htb" "(objectCla
ss=user)" sAMAccountName userPrincipalName # extended LDIF # # LDAPv3 # base <dc=puppy,dc=htb> with scope subtree # filter: (objectClass=user) # requesting: sAMAccountName userPrincipalName # # Administrator, Users, PUPPY.HTB dn: CN=Administrator,CN=Users,DC=PUPPY,DC=HTB sAMAccountName: Administrator # Guest, Users, PUPPY.HTB dn: CN=Guest,CN=Users,DC=PUPPY,DC=HTB sAMAccountName: Guest # DC, Domain Controllers, PUPPY.HTB dn: CN=DC,OU=Domain Controllers,DC=PUPPY,DC=HTB sAMAccountName: DC$ # krbtgt, Users, PUPPY.HTB dn: CN=krbtgt,CN=Users,DC=PUPPY,DC=HTB sAMAccountName: krbtgt # Levi B. James, MANPOWER, PUPPY.HTB dn: CN=Levi B. James,OU=MANPOWER,DC=PUPPY,DC=HTB sAMAccountName: levi.james userPrincipalName: levi.james@PUPPY.HTB # Anthony J. Edwards, PUPPY.HTB dn: CN=Anthony J. Edwards,DC=PUPPY,DC=HTB sAMAccountName: ant.edwards userPrincipalName: ant.edwards@PUPPY.HTB # Adam D. Silver, Users, PUPPY.HTB dn: CN=Adam D. Silver,CN=Users,DC=PUPPY,DC=HTB sAMAccountName: adam.silver userPrincipalName: adam.silver@PUPPY.HTB # Jamie S. Williams, Users, PUPPY.HTB dn: CN=Jamie S. Williams,CN=Users,DC=PUPPY,DC=HTB sAMAccountName: jamie.williams userPrincipalName: jamie.williams@PUPPY.HTB # Stephen W. Cooper, PUPPY ADMINS, PUPPY.HTB dn: CN=Stephen W. Cooper,OU=PUPPY ADMINS,DC=PUPPY,DC=HTB sAMAccountName: steph.cooper userPrincipalName: steph.cooper@PUPPY.HTB # Stephen A. Cooper_adm, PUPPY ADMINS, PUPPY.HTB dn: CN=Stephen A. Cooper_adm,OU=PUPPY ADMINS,DC=PUPPY,DC=HTB sAMAccountName: steph.cooper_adm userPrincipalName: steph.cooper_adm@PUPPY.HTB # search reference ref: ldap://ForestDnsZones.PUPPY.HTB/DC=ForestDnsZones,DC=PUPPY,DC=HTB # search reference ref: ldap://DomainDnsZones.PUPPY.HTB/DC=DomainDnsZones,DC=PUPPY,DC=HTB # search reference ref: ldap://PUPPY.HTB/CN=Configuration,DC=PUPPY,DC=HTB # search result search: 2 result: 0 Success # numResponses: 14 # numEntries: 10 # numReferences: 3