HTB | Vintage
NMAP
└─$ nmap -sT -p- --min-rate 10000 10.10.11.45 -Pn -oA nmap_ports
Starting Nmap 7.95 ( <https://nmap.org> ) at 2025-07-25 19:08 IST
Nmap scan report for 10.10.11.45
Host is up (0.85s latency).
Not shown: 65516 filtered tcp ports (no-response)
PORT STATE SERVICE
53/tcp open domain
88/tcp open kerberos-sec
135/tcp open msrpc
139/tcp open netbios-ssn
389/tcp open ldap
445/tcp open microsoft-ds
464/tcp open kpasswd5
593/tcp open http-rpc-epmap
636/tcp open ldapssl
3268/tcp open globalcatLDAP
3269/tcp open globalcatLDAPssl
5985/tcp open wsman
9389/tcp open adws
49664/tcp open unknown
49668/tcp open unknown
49674/tcp open unknown
49685/tcp open unknown
56155/tcp open unknown
56230/tcp open unknown
Nmap done: 1 IP address (1 host up) scanned in 273.80 secondsSMB
Bloodhound
Foothold/ Shell
Shell as C.Neri
Weak Permission Pre2K

Auth as GMSA01$

GenericWrite / AddSelf

GenericAll

Targeted Kerberoasting on SVC_SQL

Crack the Hash
passwordspray
Privilege Escalation
Shell as L.Bianchi_adm
DAPI
RBCD



Last updated