Resourced

Information Gathering

NMAP - Ports and Services


PORT      STATE SERVICE       VERSION
53/tcp    open  domain        Simple DNS Plus
88/tcp    open  kerberos-sec  Microsoft Windows Kerberos (server time: 2025-02-13 16:03:40Z)
135/tcp   open  msrpc         Microsoft Windows RPC
139/tcp   open  netbios-ssn   Microsoft Windows netbios-ssn
389/tcp   open  ldap          Microsoft Windows Active Directory LDAP (Domain: resourced.local0., Site: Default-First-Site-Name)
445/tcp   open  microsoft-ds?
464/tcp   open  kpasswd5?
593/tcp   open  ncacn_http    Microsoft Windows RPC over HTTP 1.0
636/tcp   open  tcpwrapped
3268/tcp  open  ldap          Microsoft Windows Active Directory LDAP (Domain: resourced.local0., Site: Default-First-Site-Name)
3269/tcp  open  tcpwrapped
3389/tcp  open  ms-wbt-server Microsoft Terminal Services
| ssl-cert: Subject: commonName=ResourceDC.resourced.local
| Not valid before: 2025-02-12T15:43:10
|_Not valid after:  2025-08-14T15:43:10
| rdp-ntlm-info: 
|   Target_Name: resourced
|   NetBIOS_Domain_Name: resourced
|   NetBIOS_Computer_Name: RESOURCEDC
|   DNS_Domain_Name: resourced.local
|   DNS_Computer_Name: ResourceDC.resourced.local
|   DNS_Tree_Name: resourced.local
|   Product_Version: 10.0.17763
|_  System_Time: 2025-02-13T16:04:28+00:00
|_ssl-date: 2025-02-13T16:05:08+00:00; -2s from scanner time.
5985/tcp  open  http          Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP)
|_http-server-header: Microsoft-HTTPAPI/2.0
|_http-title: Not Found
9389/tcp  open  mc-nmf        .NET Message Framing
49666/tcp open  msrpc         Microsoft Windows RPC
49668/tcp open  msrpc         Microsoft Windows RPC
49674/tcp open  ncacn_http    Microsoft Windows RPC over HTTP 1.0
49675/tcp open  msrpc         Microsoft Windows RPC
49693/tcp open  msrpc         Microsoft Windows RPC
49708/tcp open  msrpc         Microsoft Windows RPC
Service Info: Host: RESOURCEDC; OS: Windows; CPE: cpe:/o:microsoft:windows

Host script results:
|_clock-skew: mean: -2s, deviation: 0s, median: -3s
| smb2-time: 
|   date: 2025-02-13T16:04:29
|_  start_date: N/A
| smb2-security-mode: 
|   3:1:1: 
|_    Message signing enabled and required

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 95.83 seconds
                                                              

LDAP

External

  • ldapsearch : not showing

SMB

External

  • guest : fail

  • null fail

Internal

as a v.ventz

SMB DOWNLOAD FILE FROM Password Audit

GPPASSWORD

RPC

  • rpcclient null sesison

creds : V.Ventz:HotelCalifornia194!

Initial Access

DUMPING SYSTEM, SECURITY, AND NTDS.dit

Spraying NTLM HASH

save entire hash and usersname

checking for winrm

Pass The Hash

BLOODHOUND

Resource-Based Constrained Delegation (RBCD) Attack

Pass The Hash

Machine Recap

  1. nmap port and service scan

  2. username enumeration

  3. smb null session download SYSTEM, SECURITY, and NTDS.dit

  4. perform secretdump

  5. Spray Hash and Pass The Hash

  6. privilege escalation via Resource-Based Constrained Delegation (RBCD) Attack

  7. silver ticket

Last updated