old htb folders
This commit is contained in:
2023-08-29 21:53:22 +02:00
parent 62ab804867
commit 82b0759f1e
21891 changed files with 6277643 additions and 0 deletions

View File

@@ -0,0 +1,28 @@
# Nmap 7.93 scan initiated Tue Feb 28 14:47:58 2023 as: nmap -vv --reason -Pn -T4 -sU -sV -p 53 "--script=banner,(dns* or ssl*) and not (brute or broadcast or dos or external or fuzzer)" -oN /home/simon/htb/escape/results/sequel.htb/scans/udp53/udp_53_dns_nmap.txt -oX /home/simon/htb/escape/results/sequel.htb/scans/udp53/xml/udp_53_dns_nmap.xml sequel.htb
Nmap scan report for sequel.htb (10.129.184.130)
Host is up, received user-set (0.092s latency).
rDNS record for 10.129.184.130: escape.htb
Scanned at 2023-02-28 14:47:58 CET for 39s
PORT STATE SERVICE REASON VERSION
53/udp open domain udp-response ttl 127 (generic dns response: SERVFAIL)
| fingerprint-strings:
| NBTStat:
|_ CKAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
|_dns-cache-snoop: 0 of 100 tested domains are cached.
| dns-nsec3-enum:
|_ DNSSEC NSEC3 not supported
| dns-nsec-enum:
|_ No NSEC records found
1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
SF-Port53-UDP:V=7.93%I=7%D=2/28%Time=63FE0623%P=x86_64-pc-linux-gnu%r(NBTS
SF:tat,32,"\x80\xf0\x80\x82\0\x01\0\0\0\0\0\0\x20CKAAAAAAAAAAAAAAAAAAAAAAA
SF:AAAAAAA\0\0!\0\x01");
Host script results:
| dns-brute:
|_ DNS Brute-force hostnames: No results.
Read data files from: /usr/bin/../share/nmap
Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Tue Feb 28 14:48:37 2023 -- 1 IP address (1 host up) scanned in 39.43 seconds

View File

@@ -0,0 +1,19 @@
;; communications error to 10.129.184.130#53: timed out
; <<>> DiG 9.18.11-2-Debian <<>> -p 53 -x sequel.htb @sequel.htb
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: SERVFAIL, id: 21447
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4000
;; QUESTION SECTION:
;htb.sequel.in-addr.arpa. IN PTR
;; Query time: 4027 msec
;; SERVER: 10.129.184.130#53(sequel.htb) (UDP)
;; WHEN: Tue Feb 28 14:48:07 CET 2023
;; MSG SIZE rcvd: 52

View File

@@ -0,0 +1,6 @@
; <<>> DiG 9.18.11-2-Debian <<>> AXFR -p 53 @sequel.htb sequel.htb
; (1 server found)
;; global options: +cmd
; Transfer failed.

View File

@@ -0,0 +1,6 @@
; <<>> DiG 9.18.11-2-Debian <<>> AXFR -p 53 @sequel.htb sequel.htb
; (1 server found)
;; global options: +cmd
; Transfer failed.

View File

@@ -0,0 +1,11 @@
;; communications error to 10.129.184.130#53: timed out
; <<>> DiG 9.18.11-2-Debian <<>> AXFR -p 53 @sequel.htb
; (1 server found)
;; global options: +cmd
;; Query time: 4607 msec
;; SERVER: 10.129.184.130#53(sequel.htb) (UDP)
;; WHEN: Tue Feb 28 14:48:08 CET 2023
;; MSG SIZE rcvd: 28

View File

@@ -0,0 +1,33 @@
[*] std: Performing General Enumeration against: sequel.htb...
[-] All nameservers failed to answer the DNSSEC query for sequel.htb
[*] SOA dc.sequel.htb 10.129.184.130
[*] SOA dc.sequel.htb dead:beef::e81d:5431:35e5:8351
[*] NS dc.sequel.htb 10.129.184.130
[*] NS dc.sequel.htb dead:beef::e81d:5431:35e5:8351
[*] A sequel.htb 10.129.184.130
[*] AAAA sequel.htb dead:beef::e81d:5431:35e5:8351
[*] Enumerating SRV Records
[+] SRV _gc._tcp.sequel.htb dc.sequel.htb 10.129.184.130 3268
[+] SRV _gc._tcp.sequel.htb dc.sequel.htb dead:beef::e81d:5431:35e5:8351 3268
[+] SRV _ldap._tcp.sequel.htb dc.sequel.htb 10.129.184.130 389
[+] SRV _ldap._tcp.sequel.htb dc.sequel.htb dead:beef::e81d:5431:35e5:8351 389
[+] SRV _kerberos._udp.sequel.htb dc.sequel.htb 10.129.184.130 88
[+] SRV _kerberos._udp.sequel.htb dc.sequel.htb dead:beef::e81d:5431:35e5:8351 88
[+] SRV _kerberos._tcp.sequel.htb dc.sequel.htb 10.129.184.130 88
[+] SRV _kerberos._tcp.sequel.htb dc.sequel.htb dead:beef::e81d:5431:35e5:8351 88
[+] SRV _ldap._tcp.ForestDNSZones.sequel.htb dc.sequel.htb 10.129.184.130 389
[+] SRV _ldap._tcp.ForestDNSZones.sequel.htb dc.sequel.htb dead:beef::e81d:5431:35e5:8351 389
[+] SRV _ldap._tcp.dc._msdcs.sequel.htb dc.sequel.htb 10.129.184.130 389
[+] SRV _ldap._tcp.dc._msdcs.sequel.htb dc.sequel.htb dead:beef::e81d:5431:35e5:8351 389
[+] SRV _kerberos._tcp.dc._msdcs.sequel.htb dc.sequel.htb 10.129.184.130 88
[+] SRV _kerberos._tcp.dc._msdcs.sequel.htb dc.sequel.htb dead:beef::e81d:5431:35e5:8351 88
[+] SRV _ldap._tcp.gc._msdcs.sequel.htb dc.sequel.htb 10.129.184.130 3268
[+] SRV _ldap._tcp.gc._msdcs.sequel.htb dc.sequel.htb dead:beef::e81d:5431:35e5:8351 3268
[+] SRV _ldap._tcp.pdc._msdcs.sequel.htb dc.sequel.htb 10.129.184.130 389
[+] SRV _ldap._tcp.pdc._msdcs.sequel.htb dc.sequel.htb dead:beef::e81d:5431:35e5:8351 389
[+] SRV _kpasswd._udp.sequel.htb dc.sequel.htb 10.129.184.130 464
[+] SRV _kpasswd._udp.sequel.htb dc.sequel.htb dead:beef::e81d:5431:35e5:8351 464
[+] SRV _kpasswd._tcp.sequel.htb dc.sequel.htb 10.129.184.130 464
[+] SRV _kpasswd._tcp.sequel.htb dc.sequel.htb dead:beef::e81d:5431:35e5:8351 464
[+] 22 Records Found

View File

@@ -0,0 +1,4 @@
Found: dc.sequel.htb
Found: gc._msdcs.sequel.htb
Found: domaindnszones.sequel.htb
Found: forestdnszones.sequel.htb

View File

@@ -0,0 +1,46 @@
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE nmaprun>
<?xml-stylesheet href="file:///usr/bin/../share/nmap/nmap.xsl" type="text/xsl"?>
<!-- Nmap 7.93 scan initiated Tue Feb 28 14:47:58 2023 as: nmap -vv -&#45;reason -Pn -T4 -sU -sV -p 53 &quot;-&#45;script=banner,(dns* or ssl*) and not (brute or broadcast or dos or external or fuzzer)&quot; -oN /home/simon/htb/escape/results/sequel.htb/scans/udp53/udp_53_dns_nmap.txt -oX /home/simon/htb/escape/results/sequel.htb/scans/udp53/xml/udp_53_dns_nmap.xml sequel.htb -->
<nmaprun scanner="nmap" args="nmap -vv -&#45;reason -Pn -T4 -sU -sV -p 53 &quot;-&#45;script=banner,(dns* or ssl*) and not (brute or broadcast or dos or external or fuzzer)&quot; -oN /home/simon/htb/escape/results/sequel.htb/scans/udp53/udp_53_dns_nmap.txt -oX /home/simon/htb/escape/results/sequel.htb/scans/udp53/xml/udp_53_dns_nmap.xml sequel.htb" start="1677592078" startstr="Tue Feb 28 14:47:58 2023" version="7.93" xmloutputversion="1.05">
<scaninfo type="udp" protocol="udp" numservices="1" services="53"/>
<verbose level="2"/>
<debugging level="0"/>
<taskbegin task="NSE" time="1677592078"/>
<taskend task="NSE" time="1677592078"/>
<taskbegin task="NSE" time="1677592078"/>
<taskend task="NSE" time="1677592078"/>
<taskbegin task="NSE" time="1677592078"/>
<taskend task="NSE" time="1677592078"/>
<taskbegin task="UDP Scan" time="1677592078"/>
<taskend task="UDP Scan" time="1677592078" extrainfo="1 total ports"/>
<taskbegin task="Service scan" time="1677592079"/>
<taskend task="Service scan" time="1677592099" extrainfo="1 service on 1 host"/>
<taskbegin task="NSE" time="1677592099"/>
<taskend task="NSE" time="1677592117"/>
<taskbegin task="NSE" time="1677592117"/>
<taskend task="NSE" time="1677592117"/>
<taskbegin task="NSE" time="1677592117"/>
<taskend task="NSE" time="1677592117"/>
<host starttime="1677592078" endtime="1677592117"><status state="up" reason="user-set" reason_ttl="0"/>
<address addr="10.129.184.130" addrtype="ipv4"/>
<hostnames>
<hostname name="sequel.htb" type="user"/>
<hostname name="escape.htb" type="PTR"/>
</hostnames>
<ports><port protocol="udp" portid="53"><state state="open" reason="udp-response" reason_ttl="127"/><service name="domain" extrainfo="generic dns response: SERVFAIL" servicefp="SF-Port53-UDP:V=7.93%I=7%D=2/28%Time=63FE0623%P=x86_64-pc-linux-gnu%r(NBTStat,32,&quot;\x80\xf0\x80\x82\0\x01\0\0\0\0\0\0\x20CKAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA\0\0!\0\x01&quot;);" method="probed" conf="10"/><script id="fingerprint-strings" output="&#xa; NBTStat: &#xa; CKAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA"><elem key="NBTStat">&#xa; CKAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA</elem>
</script><script id="dns-cache-snoop" output="0 of 100 tested domains are cached.&#xa;"/><script id="dns-nsec3-enum" output="&#xa; DNSSEC NSEC3 not supported&#xa;"/><script id="dns-nsec-enum" output="&#xa; No NSEC records found&#xa;"/></port>
</ports>
<hostscript><script id="dns-brute" output="&#xa; DNS Brute-force hostnames: No results."><table key="DNS Brute-force hostnames">
</table>
</script></hostscript><times srtt="91800" rttvar="91800" to="459000"/>
</host>
<taskbegin task="NSE" time="1677592117"/>
<taskend task="NSE" time="1677592117"/>
<taskbegin task="NSE" time="1677592117"/>
<taskend task="NSE" time="1677592117"/>
<taskbegin task="NSE" time="1677592117"/>
<taskend task="NSE" time="1677592117"/>
<runstats><finished time="1677592117" timestr="Tue Feb 28 14:48:37 2023" summary="Nmap done at Tue Feb 28 14:48:37 2023; 1 IP address (1 host up) scanned in 39.43 seconds" elapsed="39.43" exit="success"/><hosts up="1" down="0" total="1"/>
</runstats>
</nmaprun>