Enumeration

Port Scan

Rustscan

Open 10.10.218.15:53
Open 10.10.218.15:88
Open 10.10.218.15:389
Open 10.10.218.15:445
Open 10.10.218.15:139
Open 10.10.218.15:135
Open 10.10.218.15:464
Open 10.10.218.15:3269
Open 10.10.218.15:3268
Open 10.10.218.15:5985
Open 10.10.218.15:9389
Open 10.10.218.15:49667
Open 10.10.218.15:49666
Open 10.10.218.15:49676
Open 10.10.218.15:49695
Open 10.10.218.15:49674
Open 10.10.218.15:49675
Open 10.10.218.15:49774

NMAP

tarting Nmap 7.80 ( https://nmap.org ) at 2021-05-14 23:47 GMT                                                                                              
Nmap scan report for vulnnet.thm (10.10.218.15)                                                                                                              
Host is up (0.067s latency).                                                                                                                                 
Not shown: 989 filtered ports                                                                                                                                
PORT     STATE SERVICE       VERSION                                                                                                                         
53/tcp   open  domain?                                                                                                                                       
| fingerprint-strings:                                                                                                                                       
|   DNSVersionBindReqTCP:                                                                                                                                    
|     version                                                                                                                                                
|_    bind
88/tcp   open  kerberos-sec  Microsoft Windows Kerberos (server time: 2021-05-14 23:47:59Z)
135/tcp  open  msrpc         Microsoft Windows RPC
139/tcp  open  netbios-ssn   Microsoft Windows netbios-ssn
389/tcp  open  ldap          Microsoft Windows Active Directory LDAP (Domain: vulnnet-rst.local0., Site: Default-First-Site-Name)
445/tcp  open  microsoft-ds?
464/tcp  open  kpasswd5?
593/tcp  open  ncacn_http    Microsoft Windows RPC over HTTP 1.0
636/tcp  open  tcpwrapped
3268/tcp open  ldap          Microsoft Windows Active Directory LDAP (Domain: vulnnet-rst.local0., Site: Default-First-Site-Name)
3269/tcp open  tcpwrapped
1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
SF-Port53-TCP:V=7.80%I=7%D=5/14%Time=609F0C33%P=x86_64-pc-linux-gnu%r(DNSV
SF:ersionBindReqTCP,20,"\0\x1e\0\x06\x81\x04\0\x01\0\0\0\0\0\0\x07version\
SF:x04bind\0\0\x10\0\x03");
Service Info: Host: WIN-2BO8M1OE1M1; OS: Windows; CPE: cpe:/o:microsoft:windows

SMB Enumeration

monoloco@kali:~/Dokumente/THM/vulnnetroasted$ smbmap -H vulnnet.thm -u anonymo
us
[+] Guest session       IP: vulnnet.thm:445     Name: unknown                                           
        Disk                                                    Permissions     Comment
        ----                                                    -----------     -------
        ADMIN$                                                  NO ACCESS       Remote Admin
        C$                                                      NO ACCESS       Default share
        IPC$                                                    READ ONLY       Remote IPC
        NETLOGON                                                NO ACCESS       Logon server share 
        SYSVOL                                                  NO ACCESS       Logon server share 
        VulnNet-Business-Anonymous                              READ ONLY       VulnNet Business Sharing
        VulnNet-Enterprise-Anonymous                            READ ONLY       VulnNet Enterprise Sharing

20210516020119.png

20210516020231.png

Readable IPC$ means username enumeration:

monoloco@kali:~/Dokumente/THM/vulnnetroasted$ python3 /usr/share/doc/python3-impacket/examples/lookupsid.py [email protected]
Impacket v0.9.21 - Copyright 2020 SecureAuth Corporation

Password:
[*] Brute forcing SIDs at vulnnet.thm
[*] StringBinding ncacn_np:vulnnet.thm[\pipe\lsarpc]
[*] Domain SID is: S-1-5-21-1589833671-435344116-4136949213
498: VULNNET-RST\Enterprise Read-only Domain Controllers (SidTypeGroup)
500: VULNNET-RST\Administrator (SidTypeUser)
501: VULNNET-RST\Guest (SidTypeUser)
502: VULNNET-RST\krbtgt (SidTypeUser)
512: VULNNET-RST\Domain Admins (SidTypeGroup)
513: VULNNET-RST\Domain Users (SidTypeGroup)
514: VULNNET-RST\Domain Guests (SidTypeGroup)
515: VULNNET-RST\Domain Computers (SidTypeGroup)
516: VULNNET-RST\Domain Controllers (SidTypeGroup)
517: VULNNET-RST\Cert Publishers (SidTypeAlias)
518: VULNNET-RST\Schema Admins (SidTypeGroup)
519: VULNNET-RST\Enterprise Admins (SidTypeGroup)
520: VULNNET-RST\Group Policy Creator Owners (SidTypeGroup)
521: VULNNET-RST\Read-only Domain Controllers (SidTypeGroup)
522: VULNNET-RST\Cloneable Domain Controllers (SidTypeGroup)
525: VULNNET-RST\Protected Users (SidTypeGroup)
526: VULNNET-RST\Key Admins (SidTypeGroup)
527: VULNNET-RST\Enterprise Key Admins (SidTypeGroup)
553: VULNNET-RST\RAS and IAS Servers (SidTypeAlias)
571: VULNNET-RST\Allowed RODC Password Replication Group (SidTypeAlias)
572: VULNNET-RST\Denied RODC Password Replication Group (SidTypeAlias)
1000: VULNNET-RST\WIN-2BO8M1OE1M1$ (SidTypeUser)
1101: VULNNET-RST\DnsAdmins (SidTypeAlias)
1102: VULNNET-RST\DnsUpdateProxy (SidTypeGroup)
1104: VULNNET-RST\enterprise-core-vn (SidTypeUser)
1105: VULNNET-RST\a-whitehat (SidTypeUser)
1109: VULNNET-RST\t-skid (SidTypeUser)
1110: VULNNET-RST\j-goldenhand (SidTypeUser)
1111: VULNNET-RST\j-leet (SidTypeUser)