Coder
Had great help from @Ruycraft1514 for PE.
Gaining Access
$ nmap -p- --min-rate 3000 10.129.198.189
Starting Nmap 7.93 ( https://nmap.org ) at 2023-04-04 04:35 EDT
Warning: 10.129.198.189 giving up on port because retransmission cap hit (10).
Nmap scan report for 10.129.198.189
Host is up (0.24s latency).
Not shown: 62699 closed tcp ports (conn-refused), 2811 filtered tcp ports (no-response)
PORT STATE SERVICE
53/tcp open domain
80/tcp open http
88/tcp open kerberos-sec
135/tcp open msrpc
139/tcp open netbios-ssn
389/tcp open ldap
443/tcp open https
445/tcp open microsoft-ds
464/tcp open kpasswd5
593/tcp open http-rpc-epmap
636/tcp open ldapssl
5985/tcp open wsman
9389/tcp open adws
47001/tcp open winrm
49664/tcp open unknown
49666/tcp open unknown
49667/tcp open unknown
49673/tcp open unknown
49686/tcp open unknown
49687/tcp open unknown
49695/tcp open unknown
49700/tcp open unknown
49710/tcp open unknown
49712/tcp open unknown
51472/tcp open unknownSMB Shares
Weak PRNG + Keepass

TeamCity



Better Brute Force

AMSI Bypass + PS Shell




User Access
TeamCity Administrator Fail



Finding Credentials

AD Privilege Escalation
PKI Admins




Last updated