└─# nmap -sS -sV -A -Pn 10.10.11.174 Starting Nmap 7.94SVN ( https://nmap.org ) at 2025-04-18 20:52 CST Nmap scan report for 10.10.11.174 Host is up (1.9s latency). Not shown: 989 filtered tcp ports (no-response) PORT STATE SERVICE VERSION 53/tcp open domain Simple DNS Plus 88/tcp open kerberos-sec Microsoft Windows Kerberos (server time: 2025-04-18 12:58:29Z) 135/tcp open msrpc Microsoft Windows RPC 139/tcp open netbios-ssn Microsoft Windows netbios-ssn 389/tcp open ldap Microsoft Windows Active Directory LDAP (Domain: support.htb0., Site: Default-First-Site-Name) 445/tcp open microsoft-ds? 464/tcp open kpasswd5? 593/tcp open ncacn_http Microsoft Windows RPC over HTTP 1.0 636/tcp open tcpwrapped 3268/tcp open ldap Microsoft Windows Active Directory LDAP (Domain: support.htb0., Site: Default-First-Site-Name) 3269/tcp open tcpwrapped Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port Device type: general purpose Running (JUST GUESSING): Microsoft Windows 2022 (88%) Aggressive OS guesses: Microsoft Windows Server 2022 (88%) No exact OS matches for host (test conditions non-ideal). Network Distance: 3 hops Service Info: Host: DC; OS: Windows; CPE: cpe:/o:microsoft:windows
TRACEROUTE (using port 445/tcp) HOP RTT ADDRESS 1 0.39 ms butt3rf1y.mshome.net (172.30.144.1) 2 3761.06 ms 10.10.16.1 3 3761.11 ms 10.10.11.174
OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 603.02 seconds
扫出来这么多,由扫描结果得知这是一个 AD 的 DC 服务器,有一个 support.htb 域
枚举 DNS
所以接下来用 dig 来查询一下 DNS
1
dig @10.10.11.174 support.htb any +short
扫出的结果确认了服务器的名称为 dc,域名为 support.htb
利用 SMB 获取文件
开放了 445 端口,连接查看有无有用信息
1 2 3 4 5 6 7 8 9 10 11 12 13
└─# smbclient -N -L //10.10.11.174
Sharename Type Comment --------- ---- ------- ADMIN$ Disk Remote Admin C$ Disk Default share IPC$ IPC Remote IPC NETLOGON Disk Logon server share support-tools Disk support staff tools SYSVOL Disk Logon server share Reconnecting with SMB1 for workgroup listing. do_connect: Connection to 10.10.11.174 failed (Error NT_STATUS_RESOURCE_NAME_NOT_FOUND) Unable to connect with SMB1 -- no workgroup available
有一个 support-tools,里面有一些压缩文件和 .exe 文件
1 2 3 4 5 6 7 8 9 10 11 12
smb: \> ls . D 0 Thu Jul 21 01:01:06 2022 .. D 0 Sat May 28 19:18:25 2022 7-ZipPortable_21.07.paf.exe A 2880728 Sat May 28 19:19:19 2022 npp.8.4.1.portable.x64.zip A 5439245 Sat May 28 19:19:55 2022 putty.exe A 1273576 Sat May 28 19:20:06 2022 SysinternalsSuite.zip A 48102161 Sat May 28 19:19:31 2022 UserInfo.exe.zip A 277499 Thu Jul 21 01:01:07 2022 windirstat1_1_2_setup.exe A 79171 Sat May 28 19:20:17 2022 WiresharkPortable64_3.6.5.paf.exe A 44398000 Sat May 28 19:19:43 2022
4026367 blocks of size 4096. 955496 blocks available
.\SharpHound.exe --CollectionMethods All --Domain support.htb --ExcludeDCs
将文件下载到本地
开启 Neo4j 图形数据库
开启 Neo4j 然后访问
1
http://localhost:7474/browser
进去之后修改密码
BloodHound 查看域内关系
打开 BloodHound 用 Neo4j 的用户名和密码登陆进去
将下载的有关 AD 域信息的压缩包导入,直接拖进去就行了
查找 SUPPORT@SUPPORT.HTB 用户,在 Node Info 的 Group Delegated Object Control 中发现 GenericAll 权限也就是完全控制权限,可以发现 SUPPORT@SUPPORT.HTB 属于 SHARED SUPPORT ACCOUNTS 组,该组对整个 DC 有完全控制权限
右键 GenericAll 查看 help 的建议
“Full control of a computer object can be used to perform a resource based constrained delegation attack.”