Home Manager Report
Post
Cancel

Manager Report

Information gathering



Scope: 10.10.11.236/32 (Windows (AD))

TCP Nmap scan: 65,535 ports

  • Open ports:
    • 53/dns:
      • manager.htb
    • 80/http:
      • Banner grabbing
        • Server: Microsoft-IIS/10.0
      • Follow redirect:
        • Service:
          • Content Writing Services
        • Technologies
          • Boostrap
          • JQuery[3.4.1] (OwlCarousel2/2.1.3)
          • Javascript
          • Cloudflare
        • Headers
          • None
        • Cookies
          • None
        • Emails
          • None
        • Users
          • None
      • Directory Fuzzing
        • file: content/dir_fuzzing
      • Subdomains
        • None
    • 5985 (winrm)
      • Banner grabbing:
        • Server: Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP)
        • Valid creds: raven:R4v3nBe5tD3veloP3r!123
    • 88, 464 (kerberos,kpasswd)
      • User enumeration
        • Kerbrute
    • 135, 593 (msrpc):
      • Endpoints (rpcdump_output)
    • 139, 445 (SMB):
      • Banner grabbing
        • Windows 10.0 Build 17763 x64
        • (name:DC01) (domain:manager.htb) (signing:True) (SMBv1:False)
      • User enumeration:
        • Crackmapexec (rid-cycling brute)
    • 389, 636, 3268, 3269 (ldap, ssl):
      • file: ldap_enum_389
    • 1433 (mssql):
      • ms-sql-ntlm-info:
        • 10.10.11.236:1433:
          • Target_Name: MANAGER
          • NetBIOS_Domain_Name: MANAGER
          • NetBIOS_Computer_Name: DC01
          • DNS_Domain_Name: manager.htb
          • DNS_Computer_Name: dc01.manager.htb
          • DNS_Tree_Name: manager.htb
          • Product_Version: 10.0.17763
      • ms-sql-info:
        • 10.10.11.236:1433:
          • Version:
            • name: Microsoft SQL Server 2019 RTM
            • number: 15.00.2000.00
            • Product: Microsoft SQL Server 2019
            • Service pack level: RTM
            • Post-SP patches applied: false

Vulnerability Assesment



  • Equal username and password
    • MSSQL bruteforce (crackmapexec)
      • Valid Creds (operator:operator)
  • MSSQL public funciton (xp_dirtree)
    • Guest user:

Exploitation



Post-exploitation



This post is licensed under CC BY 4.0 by the author.