HTB | TheFrizz
Nmap
└─$ nmap -sT -p- --min-rate 10000 10.10.11.60 -Pn -oA nmap_ports
Starting Nmap 7.94SVN ( <https://nmap.org> ) at 2025-05-07 14:39 IST
Nmap scan report for 10.10.11.60
Host is up (0.25s latency).
Not shown: 65515 filtered tcp ports (no-response)
PORT STATE SERVICE
22/tcp open ssh
53/tcp open domain
80/tcp open http
88/tcp open kerberos-sec
135/tcp open msrpc
139/tcp open netbios-ssn
389/tcp open ldap
445/tcp open microsoft-ds
464/tcp open kpasswd5
593/tcp open http-rpc-epmap
636/tcp open ldapssl
3268/tcp open globalcatLDAP
3269/tcp open globalcatLDAPssl
9389/tcp open adws
49664/tcp open unknown
49668/tcp open unknown
49670/tcp open unknown
56383/tcp open unknown
56387/tcp open unknown
56397/tcp open unknown
Nmap done: 1 IP address (1 host up) scanned in 54.76 secondsPort 80


Foothold/shell
CVE-2023-34598

CVE-2023-45878

shell as w.webservice



MySql
shell as f.frizzle
cracking password
shell via tgt




Privilege Escalation
Bloodhound

shell as w.schoolbus





Administrator privilege

GPO Abuse

Last updated