hack_htb_legacy
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
hack_htb_legacy [2020/11/07 00:23] – gman | hack_htb_legacy [2022/09/24 18:19] (current) – removed gman | ||
---|---|---|---|
Line 1: | Line 1: | ||
- | ====== HTB: Legacy ====== | ||
- | |||
- | IP: 10.10.10.4 | ||
- | Me: 10.10.14.25 | ||
- | |||
- | ===== Scan ===== | ||
- | |||
- | **Note:** masscan found a udp port that nmap did not. Remember to scan UDP! | ||
- | * I later ran nmap to scan UDP (-sU) and found it (it just take forever). | ||
- | * Syntax: '' | ||
- | |||
- | ==== masscan ==== | ||
- | |||
- | Scan Syntax: | ||
- | < | ||
- | masscan 10.10.10.4 -p1-65535, | ||
- | # -p1-65535, | ||
- | # --rate=1000 | ||
- | # -e tun0 # listen on the VPN network interface for responses | ||
- | </ | ||
- | |||
- | Results: | ||
- | < | ||
- | Starting masscan 1.0.5 (http:// | ||
- | -- forced options: -sS -Pn -n --randomize-hosts -v --send-eth | ||
- | Initiating SYN Stealth Scan | ||
- | Scanning 1 hosts [131070 ports/host] | ||
- | Discovered open port 445/tcp on 10.10.10.4 | ||
- | Discovered open port 137/udp on 10.10.10.4 | ||
- | Discovered open port 139/tcp on 10.10.10.4 | ||
- | rate: 0.00-kpps, 100.00% done, waiting -308-secs, found=2 | ||
- | </ | ||
- | |||
- | ==== nmap ==== | ||
- | |||
- | First: | ||
- | |||
- | < | ||
- | root@kali: | ||
- | Starting Nmap 7.80 ( https:// | ||
- | Nmap scan report for 10.10.10.4 | ||
- | Host is up (0.037s latency). | ||
- | Not shown: 65532 filtered ports | ||
- | |||
- | PORT | ||
- | 139/ | ||
- | 445/ | ||
- | 3389/tcp closed ms-wbt-server | ||
- | </ | ||
- | |||
- | Second: | ||
- | |||
- | < | ||
- | root@kali: | ||
- | Starting Nmap 7.80 ( https:// | ||
- | Nmap scan report for 10.10.10.4 | ||
- | Host is up (0.037s latency). | ||
- | |||
- | PORT | ||
- | 139/ | ||
- | 445/ | ||
- | 3389/tcp closed ms-wbt-server | ||
- | Device type: general purpose|specialized | ||
- | Running (JUST GUESSING): Microsoft Windows 2000|XP|2003|2008 (92%), General Dynamics embedded (87%) | ||
- | OS CPE: cpe:/ | ||
- | Aggressive OS guesses: Microsoft Windows 2000 SP4 or Windows XP SP2 or SP3 (92%), Microsoft Windows XP SP2 (92%), Microsoft Windows XP SP2 or Windows Small Business Server 2003 (91%), Microsoft Windows Server 2003 (90%), Microsoft Windows 2000 SP4 (90%), Microsoft Windows XP Professional SP3 (90%), Microsoft Windows XP SP2 or SP3 (90%), Microsoft Windows XP SP3 (90%), Microsoft Windows XP SP2 or Windows Server 2003 (90%), Microsoft Windows 2000 Server (89%) | ||
- | No exact OS matches for host (test conditions non-ideal). | ||
- | Network Distance: 2 hops | ||
- | Service Info: OSs: Windows, Windows XP; CPE: cpe:/ | ||
- | |||
- | Host script results: | ||
- | |_clock-skew: | ||
- | |_nbstat: NetBIOS name: LEGACY, NetBIOS user: < | ||
- | | smb-os-discovery: | ||
- | | OS: Windows XP (Windows 2000 LAN Manager) | ||
- | | OS CPE: cpe:/ | ||
- | | | ||
- | | | ||
- | | | ||
- | |_ System time: 2020-09-20T22: | ||
- | | smb-security-mode: | ||
- | | | ||
- | | | ||
- | | | ||
- | |_ message_signing: | ||
- | |_smb2-time: | ||
- | |||
- | TRACEROUTE (using port 3389/tcp) | ||
- | HOP RTT ADDRESS | ||
- | 1 36.83 ms 10.10.14.1 | ||
- | 2 37.15 ms 10.10.10.4 | ||
- | |||
- | OS and Service detection performed. Please report any incorrect results at https:// | ||
- | Nmap done: 1 IP address (1 host up) scanned in 61.96 seconds | ||
- | </ | ||
- | |||
- | ==== MetaSploit ==== | ||
- | |||
- | This took forever but I let it run anyway... | ||
- | * I actually finished hacking into the box by the time this finished. | ||
- | |||
- | < | ||
- | Module options (auxiliary/ | ||
- | |||
- | | ||
- | | ||
- | | ||
- | | ||
- | | ||
- | | ||
- | | ||
- | | ||
- | | ||
- | | ||
- | | ||
- | |||
- | msf5 auxiliary(scanner/ | ||
- | |||
- | </ | ||
- | |||
- | ===== Enumerate ===== | ||
- | |||
- | |||
- | ===== Exploit ===== | ||
- | |||
- | |||
- | ===== Post-Ex Enum ===== | ||
- | |||
hack_htb_legacy.1604708631.txt.gz · Last modified: by gman