🏔️K2 - 2/3 (AD)
Use all of the information gathered from your previous findings in order to keep making your way to the top.
Enumeración de Red
nmap
autoscan 10.10.167.138Resultado nmap
PORT STATE SERVICE VERSION
53/tcp open domain Simple DNS Plus
88/tcp open kerberos-sec Microsoft Windows Kerberos (server time: 2025-08-12 14:41:54Z)
135/tcp open msrpc Microsoft Windows RPC
139/tcp open netbios-ssn Microsoft Windows netbios-ssn
389/tcp open ldap Microsoft Windows Active Directory LDAP (Domain: k2.thm0., Site: Default-First-Site-Name)
445/tcp open microsoft-ds?
464/tcp open kpasswd5?
593/tcp open ncacn_http Microsoft Windows RPC over HTTP 1.0
636/tcp open tcpwrapped
3268/tcp open ldap Microsoft Windows Active Directory LDAP (Domain: k2.thm0., Site: Default-First-Site-Name)
3269/tcp open tcpwrapped
3389/tcp open ms-wbt-server Microsoft Terminal Services
| ssl-cert: Subject: commonName=K2Server.k2.thm
| Not valid before: 2025-08-11T14:36:51
|_Not valid after: 2026-02-10T14:36:51
| rdp-ntlm-info:
| Target_Name: K2
| NetBIOS_Domain_Name: K2
| NetBIOS_Computer_Name: K2SERVER
| DNS_Domain_Name: k2.thm
| DNS_Computer_Name: K2Server.k2.thm
| DNS_Tree_Name: k2.thm
| Product_Version: 10.0.17763
|_ System_Time: 2025-08-12T14:42:43+00:00
|_ssl-date: 2025-08-12T14:43:23+00:00; +1s from scanner time.
5985/tcp open http Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP)
|_http-title: Not Found
|_http-server-header: Microsoft-HTTPAPI/2.0
7680/tcp open pando-pub?
9389/tcp open mc-nmf .NET Message Framing
49669/tcp open msrpc Microsoft Windows RPC
49674/tcp open ncacn_http Microsoft Windows RPC over HTTP 1.0
49675/tcp open msrpc Microsoft Windows RPC
49678/tcp open msrpc Microsoft Windows RPC
49682/tcp open msrpc Microsoft Windows RPC
49711/tcp open msrpc Microsoft Windows RPC
Service Info: Host: K2SERVER; OS: Windows; CPE: cpe:/o:microsoft:windowsWindows - Active Directory
Kerberos, smb, rpc, ldap
domain: k2.thm
computer: K2SERVER
Enumeración de Usuarios de Dominio
Username-Anarchy
Kerbrute Userenum
[+] VALID USERNAME: [email protected] [+] VALID USERNAME: [email protected]
Password Spraying
Contraseñas recogidas anteriormente
[+] k2.thm\r.bud:vRMkaVgdfxhW!8
Iniciar Sesión Remota
[+] k2.thm\r.bud:vRMkaVgdfxhW!8 (Pwn3d!)
Intrusión en el Sistema
Sesión Remota Windows: k2\r.bud
Enumeración Post-Intrusión
C:\Users\r.bud\Documents
notes.txt
note_to_james.txt
La nueva contraseña de james es 'rockyou' + número + carácter especial.
Usuarios locales: j.bold, r.bud, j.smith, administrator
Script pass-gen.py
Generar wordlist passes.txt
Kerbrute Password Bruteforce
[+] VALID LOGIN: [email protected]:#8rockyou
Enumeración Autenticada de Dominio
Recolección
Info BloodHound
[email protected] →
MemberOf→ IT STAFF 1 →GenericAll→ [email protected] (Domain Admin)
GenericAll == ForceChangePassword
Explotación: ForceChangePassword
[+] k2.thm\j.smith:Pass123 (Pwn3d!)
Escalada de Privilegios
Sesión Remota Windows: k2\j.smith
Enumeración Post-Escalada
SAM/SYSTEM Backup + Pass the Hash Attack
Escalada de Privilegios: SAM/SYSTEM Backup + PtH Attack
K2\Administrator:vz0q$i8b4c
Compromiso del Sistema
Sesión Windows Remota: k2\administrator
Última actualización