[DNS] 53/tcp open domain syn-ack ttl 127 Simple DNS Plus
[KERBEROS] 88/tcp open kerberos-sec syn-ack ttl 127 Microsoft Windows Kerberos (server time: 2024-02-26 10:54:38Z) 464/tcp open kpasswd5? syn-ack ttl 127
[WINRPC] 135/tcp open msrpc syn-ack ttl 127 Microsoft Windows RPC 139/tcp open netbios-ssn syn-ack ttl 127 Microsoft Windows netbios-ssn 445/tcp open microsoft-ds? syn-ack ttl 127 593/tcp open ncacn_http syn-ack ttl 127 Microsoft Windows RPC over HTTP 1.0
[LDAP] 389/tcp open ldap syn-ack ttl 127 Microsoft Windows Active Directory LDAP (Domain: jab.htb0., Site: Default-First-Site-Name) 636/tcp open ssl/ldap syn-ack ttl 127 Microsoft Windows Active Directory LDAP (Domain: jab.htb0., Site: Default-First-Site-Name) 3268/tcp open ldap syn-ack ttl 127 Microsoft Windows Active Directory LDAP (Domain: jab.htb0., Site: Default-First-Site-Name) 3269/tcp open ssl/ldap syn-ack ttl 127 Microsoft Windows Active Directory LDAP (Domain: jab.htb0., Site: Default-First-Site-Name) | ssl-cert: Subject: commonName=DC01.jab.htb | Subject Alternative Name: othername: 1.3.6.1.4.1.311.25.1::<unsupported>, DNS:DC01.jab.htb | Issuer: commonName=jab-DC01-CA/domainComponent=jab
[WINRM] 5985/tcp open http syn-ack ttl 127 Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP)
[jabber] 5222/tcp open jabber syn-ack ttl 127 5223/tcp open ssl/jabber syn-ack ttl 127 | ssl-cert: Subject: commonName=dc01.jab.htb | Subject Alternative Name: DNS:dc01.jab.htb, DNS:*.dc01.jab.htb | Issuer: commonName=dc01.jab.htb
5262/tcp open jabber syn-ack ttl 127 Ignite Realtime Openfire Jabber server 3.10.0 or later 5263/tcp open ssl/jabber syn-ack ttl 127
5275/tcp open jabber syn-ack ttl 127 5276/tcp open ssl/jabber syn-ack ttl 127
[XMPP] 5269/tcp open xmpp syn-ack ttl 127 Wildfire XMPP Client 5270/tcp open ssl/xmpp syn-ack ttl 127 Wildfire XMPP Client
7070/tcp open realserver? syn-ack ttl 127
7443/tcp open ssl/oracleas-https? syn-ack ttl 127 |_ssl-date: TLS randomness does not represent time | ssl-cert: Subject: commonName=dc01.jab.htb | Subject Alternative Name: DNS:dc01.jab.htb, DNS:*.dc01.jab.htb | Issuer: commonName=dc01.jab.htb
7777/tcp open socks5 syn-ack ttl 127 (No authentication; connection failed) | socks-auth-info: |_ No authentication
=================================================================================================================== 9389/tcp open mc-nmf syn-ack ttl 127 .NET Message Framing 47001/tcp open http syn-ack ttl 127 Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP) |_http-server-header: Microsoft-HTTPAPI/2.0 |_http-title: Not Found 49664/tcp open msrpc syn-ack ttl 127 Microsoft Windows RPC 49665/tcp open msrpc syn-ack ttl 127 Microsoft Windows RPC 49666/tcp open msrpc syn-ack ttl 127 Microsoft Windows RPC 49667/tcp open msrpc syn-ack ttl 127 Microsoft Windows RPC 49671/tcp open msrpc syn-ack ttl 127 Microsoft Windows RPC 49686/tcp open ncacn_http syn-ack ttl 127 Microsoft Windows RPC over HTTP 1.0 49687/tcp open msrpc syn-ack ttl 127 Microsoft Windows RPC 49688/tcp open msrpc syn-ack ttl 127 Microsoft Windows RPC 49712/tcp open msrpc syn-ack ttl 127 Microsoft Windows RPC 49766/tcp open msrpc syn-ack ttl 127 Microsoft Windows RPC 62646/tcp open msrpc syn-ack ttl 127 Microsoft Windows RPC
(11/22/23 02:31:13) adunn: team, we need to finalize post-remediation testing from last quarter's pentest. @bdavis Brian can you please provide us with a status? (11/22/23 02:33:58) bdavis: sure. we removed the SPN from the svc_openfire account. I believe this was finding #2. can someone from the security team test this? if not we can send it back to the pentesters to validate. (11/22/23 03:30:41) bdavis: here are the commands from the report, can you find someone from the security team who can re-run these to validate? (11/22/23 03:30:43) bdavis: $ GetUserSPNs.py -request -dc-ip 192.168.195.129 jab.htb/hthompson Impacket v0.9.25.dev1+20221216.150032.204c5b6b - Copyright 2021 SecureAuth Corporation Password: ServicePrincipalName Name MemberOf PasswordLastSet LastLogon Delegation -------------------- ------------ -------- -------------------------- --------- ---------- http/xmpp.jab.local svc_openfire 2023-10-27 15:23:49.811611 <never> [-] CCache file is not found. Skipping... $krb5tgs$23$*svc_openfire$JAB.HTB$jab.htb/svc_openfire*$b1abbb2f4beb2a48e7412ccd26b60e61$864f27ddaaded607ab5efa59544870cece4b6262e20f3bee38408d296ffbf07ceb421188b9b82ac0037ae67b488bb0ef2178a0792d62<SNIP>
(11/22/23 03:31:57) adunn: I'll pass this along and circle back with the group (11/22/23 03:32:23) bdavis: perfect, thanks Angela! (11/22/23 02:22:55) The topic is: (02/26/24 22:17:11) jmontgomery: ..
如果你是新手,使用上面的鏈接加入 HTB 的 academy 就可以免費看 Tire 0 的所有教程,這對初學者來説是很友好的。 (建議先完成 INTRODUCTION TO ACADEMY)
If you are a beginner, join HTB’s academy with this link to get free access to all the tutorials for Tire 0. This is very beginner friendly. (It is recommended to complete INTRODUCTION TO ACADEMY first)