APT
Challenging! Did with the help of a writeup.
Gaining Access
$ nmap -p- --min-rate 5000 10.129.96.60
Starting Nmap 7.93 ( https://nmap.org ) at 2023-06-22 14:58 +08
Nmap scan report for 10.129.96.60
Host is up (0.0095s latency).
Not shown: 65533 filtered tcp ports (no-response)
PORT STATE SERVICE
80/tcp open http
135/tcp open msrpcPort 80

Port 135 RPC
RPC Reading -> IPv6 Address
Re-enumeration -> SMB
User Brute -> Hash Brute
PTH Reg Query

Privilege Escalation
Finding Defences
NTLMv1 -> Steal Hash


Last updated
