Rebound
Active Directory! Had some help after it ended.
Gaining Access
$ nmap -p- --min-rate 3000 10.129.148.205
Starting Nmap 7.93 ( https://nmap.org ) at 2023-09-12 16:28 +08
Nmap scan report for 10.129.148.205
Host is up (0.16s latency).
Not shown: 65315 closed tcp ports (conn-refused), 194 filtered tcp ports (no-response)
PORT STATE SERVICE
53/tcp open domain
88/tcp open kerberos-sec
135/tcp open msrpc
139/tcp open netbios-ssn
389/tcp open ldap
445/tcp open microsoft-ds
464/tcp open kpasswd5
593/tcp open http-rpc-epmap
636/tcp open ldapssl
3268/tcp open globalcatLDAP
3269/tcp open globalcatLDAPssl
5985/tcp open wsman
9389/tcp open adws
47001/tcp open winrm
49664/tcp open unknown
49665/tcp open unknown
49666/tcp open unknown
49667/tcp open unknown
49671/tcp open unknown
49686/tcp open unknown
49687/tcp open unknown
49688/tcp open unknown
49705/tcp open unknown
49706/tcp open unknown
49723/tcp open unknown
63777/tcp open unknownAD Enum --> AS-REP Fail
Kerberoast W/O Pre-Auth --> Password
Bloodhound + Password Spray + Thinking


LDAP Monitor --> Change Password

Privilege Escalation
Enumeration

Remote Potato --> Tbrady Hash --> ReadGMSAPassword

Constrained Delegation --> Root


Further Enumeration
Self ServiceMgmt Group
Delegation Issues --> SPN



Last updated
