赞
踩
先masscan全局快速扫,再namp精细扫
masscan -p1-65535,U:1-65535 10.10.10.175 --rate=1000 -e tun0
nmap -A 10.10.10.175 -p389,5985,445,53,139,49667,636,135,88,49673,49674,80,464,52613,593,49676
可见 开了很多端口,而88 389 这都是域端口,389后面也详细写了域名字,跟htb里这个域渗透的靶机froest很像了。准备好impacket包,neo4j bloodhound这些域渗透工具。在froest文章里也给了下载链接 安装等
具体的域知识这台靶机就不科普啦,在froest文章里写了一些,是有些烧脑,不太理解的话就 先记得 用这些域工具。
C:\root> masscan -p1-65535,U:1-65535 10.10.10.175 --rate=1000 -e tun0 Starting masscan 1.0.5 (http://bit.ly/14GZzcT) at 2021-01-05 10:46:05 GMT -- forced options: -sS -Pn -n --randomize-hosts -v --send-eth Initiating SYN Stealth Scan Scanning 1 hosts [131070 ports/host] Discovered open port 389/tcp on 10.10.10.175 Discovered open port 5985/tcp on 10.10.10.175 Discovered open port 445/tcp on 10.10.10.175 Discovered open port 53/tcp on 10.10.10.175 Discovered open port 53/udp on 10.10.10.175 Discovered open port 139/tcp on 10.10.10.175 Discovered open port 49667/tcp on 10.10.10.175 Discovered open port 636/tcp on 10.10.10.175 Discovered open port 135/tcp on 10.10.10.175 Discovered open port 88/tcp on 10.10.10.175 Discovered open port 49673/tcp on 10.10.10.175 Discovered open port 49674/tcp on 10.10.10.175 Discovered open port 80/tcp on 10.10.10.175 Discovered open port 464/tcp on 10.10.10.175 Discovered open port 52613/tcp on 10.10.10.175 Discovered open port 593/tcp on 10.10.10.175 Discovered open port 49676/tcp on 10.10.10.175 C:\root> nmap -A 10.10
Copyright © 2003-2013 www.wpsshop.cn 版权所有,并保留所有权利。