{"id":246,"date":"2025-10-07T19:08:00","date_gmt":"2025-10-07T19:08:00","guid":{"rendered":"https:\/\/thecyberstaff.com\/?p=246"},"modified":"2025-12-28T17:58:01","modified_gmt":"2025-12-28T17:58:01","slug":"support-hackthebox-lab","status":"publish","type":"post","link":"https:\/\/thecyberstaff.com\/?p=246","title":{"rendered":"Support- Hackthebox lab"},"content":{"rendered":"\n<p>I started with an nmap scan for all TCP ports and the top UDP ports. This one looks like an Active Directory Domain Controller.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"445\" src=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/10\/Pasted-image-20251004122128-1024x445.png\" alt=\"\" class=\"wp-image-305\" srcset=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/10\/Pasted-image-20251004122128-1024x445.png 1024w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/10\/Pasted-image-20251004122128-300x130.png 300w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/10\/Pasted-image-20251004122128-768x334.png 768w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/10\/Pasted-image-20251004122128.png 1049w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>Added target hostnames to <code>\/etc\/hosts<\/code><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"480\" height=\"200\" src=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/10\/Pasted-image-20251004122447.png\" alt=\"\" class=\"wp-image-306\" srcset=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/10\/Pasted-image-20251004122447.png 480w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/10\/Pasted-image-20251004122447-300x125.png 300w\" sizes=\"auto, (max-width: 480px) 100vw, 480px\" \/><\/figure>\n\n\n\n<p>Looking through the SMB shares, I found one &#8220;support-tools&#8221; that is not default. Looking into the share with guest access, I found some files and one non standard looking binary &#8220;UserInfo.exe.zip&#8221;.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"704\" height=\"251\" src=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/10\/Pasted-image-20251004132942.png\" alt=\"\" class=\"wp-image-307\" srcset=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/10\/Pasted-image-20251004132942.png 704w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/10\/Pasted-image-20251004132942-300x107.png 300w\" sizes=\"auto, (max-width: 704px) 100vw, 704px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"624\" height=\"245\" src=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/10\/Pasted-image-20251004133150.png\" alt=\"\" class=\"wp-image-308\" srcset=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/10\/Pasted-image-20251004133150.png 624w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/10\/Pasted-image-20251004133150-300x118.png 300w\" sizes=\"auto, (max-width: 624px) 100vw, 624px\" \/><\/figure>\n\n\n\n<p>I used the tool dnSpy to do code analysis on the binary. I found a password and a key.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"978\" height=\"247\" src=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/10\/Pasted-image-20251004160530.png\" alt=\"\" class=\"wp-image-309\" srcset=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/10\/Pasted-image-20251004160530.png 978w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/10\/Pasted-image-20251004160530-300x76.png 300w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/10\/Pasted-image-20251004160530-768x194.png 768w\" sizes=\"auto, (max-width: 978px) 100vw, 978px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"831\" height=\"210\" src=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/10\/Pasted-image-20251004160708.png\" alt=\"\" class=\"wp-image-310\" srcset=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/10\/Pasted-image-20251004160708.png 831w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/10\/Pasted-image-20251004160708-300x76.png 300w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/10\/Pasted-image-20251004160708-768x194.png 768w\" sizes=\"auto, (max-width: 831px) 100vw, 831px\" \/><\/figure>\n\n\n\n<p>I used <a href=\"https:\/\/0xdf.gitlab.io\/2022\/12\/17\/htb-support.html\">this post<\/a> to do this next step. This snippet is an interactive Python session that reverses a simple custom obfuscation to reveal a plaintext secret. It first base64-decodes <code>pass_b64<\/code> into raw bytes, then XORs each byte with the corresponding byte from a repeating key (<code>b\"armando\"<\/code>) using <code>itertools.cycle<\/code>, and finally XORs the result with the constant <code>223<\/code> (<code>e ^ k ^ 223<\/code>) to produce the original byte values. The bytes are then combined into a <code>bytearray<\/code> and decoded to UTF-8, yielding the plaintext credential <code>nvEfEK16^1aM4$e7AclUf8x$RtWxPW01%lmz<\/code>. This pattern (base64 + repeating-key XOR + fixed-value XOR) is a lightweight obfuscation method.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"234\" src=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/10\/Pasted-image-20251004161031-1024x234.png\" alt=\"\" class=\"wp-image-311\" srcset=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/10\/Pasted-image-20251004161031-1024x234.png 1024w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/10\/Pasted-image-20251004161031-300x69.png 300w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/10\/Pasted-image-20251004161031-768x176.png 768w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/10\/Pasted-image-20251004161031.png 1071w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>With the credentials gathered for the ldap account, I checked them with Netexec and they were good!<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"104\" src=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/10\/Pasted-image-20251004161744-1024x104.png\" alt=\"\" class=\"wp-image-313\" srcset=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/10\/Pasted-image-20251004161744-1024x104.png 1024w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/10\/Pasted-image-20251004161744-300x30.png 300w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/10\/Pasted-image-20251004161744-768x78.png 768w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/10\/Pasted-image-20251004161744.png 1220w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>Ran the BloodHoundCE ingestor to collect Active Directory objects and relationships from the domain. The resulting graph exposed privilege paths and group memberships useful for privilege escalation planning.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"306\" src=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/10\/Pasted-image-20251004175139-1024x306.png\" alt=\"\" class=\"wp-image-314\" srcset=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/10\/Pasted-image-20251004175139-1024x306.png 1024w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/10\/Pasted-image-20251004175139-300x90.png 300w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/10\/Pasted-image-20251004175139-768x229.png 768w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/10\/Pasted-image-20251004175139.png 1280w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>I used <code>ldapsearch<\/code> with the confirmed credentials to pull user\/group attributes and noted that additional useful data was stored in nonstandard fields (e.g., info). Those attributes helped reveal group memberships and service associations.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/10\/Pasted-image-20251004175955-1024x576.png\" alt=\"\" class=\"wp-image-316\" srcset=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/10\/Pasted-image-20251004175955-1024x576.png 1024w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/10\/Pasted-image-20251004175955-300x169.png 300w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/10\/Pasted-image-20251004175955-768x432.png 768w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/10\/Pasted-image-20251004175955.png 1280w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"640\" height=\"480\" src=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/10\/Pasted-image-20251004180235.png\" alt=\"\" class=\"wp-image-317\" srcset=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/10\/Pasted-image-20251004180235.png 640w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/10\/Pasted-image-20251004180235-300x225.png 300w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/figure>\n\n\n\n<p>Found that the <code>support<\/code> account belongs to the Remote Management Users group, indicating elevated remote administration capabilities. That group membership informed which remote management vectors to attempt next.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"334\" src=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/10\/Pasted-image-20251004180407-1024x334.png\" alt=\"\" class=\"wp-image-318\" srcset=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/10\/Pasted-image-20251004180407-1024x334.png 1024w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/10\/Pasted-image-20251004180407-300x98.png 300w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/10\/Pasted-image-20251004180407-768x251.png 768w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/10\/Pasted-image-20251004180407.png 1309w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>Authenticated to the target with Evil-WinRM using the <code>support<\/code> account, giving an interactive Windows shell. This access provided a foothold for data collection and post-exploitation actions.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"179\" src=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/10\/Pasted-image-20251004180725-1024x179.png\" alt=\"\" class=\"wp-image-319\" srcset=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/10\/Pasted-image-20251004180725-1024x179.png 1024w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/10\/Pasted-image-20251004180725-300x52.png 300w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/10\/Pasted-image-20251004180725-768x134.png 768w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/10\/Pasted-image-20251004180725.png 1046w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>Analysis of ACLs and BloodHound output showed a <code>GenericAll<\/code> from the Shared Support Accounts group to the DC.SUPPORT.HTB computer object. This means we can abuse resource-based constrained delegation to elevate our access to domain admin.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"935\" height=\"433\" src=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/10\/Pasted-image-20251004181716.png\" alt=\"\" class=\"wp-image-320\" srcset=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/10\/Pasted-image-20251004181716.png 935w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/10\/Pasted-image-20251004181716-300x139.png 300w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/10\/Pasted-image-20251004181716-768x356.png 768w\" sizes=\"auto, (max-width: 935px) 100vw, 935px\" \/><\/figure>\n\n\n\n<p>I uploaded PowerView, Powermad, and Rubeus for the attack and ran PowerView and Powermad.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"423\" src=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/10\/Pasted-image-20251004182958-1024x423.png\" alt=\"\" class=\"wp-image-321\" srcset=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/10\/Pasted-image-20251004182958-1024x423.png 1024w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/10\/Pasted-image-20251004182958-300x124.png 300w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/10\/Pasted-image-20251004182958-768x318.png 768w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/10\/Pasted-image-20251004182958.png 1151w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>I created a machine account, crafted an ACL granting that machine SID delegation rights, wrote it into a target computer\u2019s <code>msDS-AllowedToActOnBehalfOfOtherIdentity<\/code> attribute, and thereby enabled the machine account to be trusted for Kerberos delegation to that target \u2014 allowing impersonation of users (including high-privileged accounts) domain takeover.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"128\" src=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/10\/Pasted-image-20251004201644-1024x128.png\" alt=\"\" class=\"wp-image-322\" srcset=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/10\/Pasted-image-20251004201644-1024x128.png 1024w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/10\/Pasted-image-20251004201644-300x38.png 300w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/10\/Pasted-image-20251004201644-768x96.png 768w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/10\/Pasted-image-20251004201644.png 1261w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"157\" src=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/10\/Pasted-image-20251004203439-1024x157.png\" alt=\"\" class=\"wp-image-323\" srcset=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/10\/Pasted-image-20251004203439-1024x157.png 1024w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/10\/Pasted-image-20251004203439-300x46.png 300w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/10\/Pasted-image-20251004203439-768x117.png 768w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/10\/Pasted-image-20251004203439.png 1229w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>Collecting RC4 hash with Rubeus<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"354\" src=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/10\/Pasted-image-20251006195049-1024x354.png\" alt=\"\" class=\"wp-image-324\" srcset=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/10\/Pasted-image-20251006195049-1024x354.png 1024w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/10\/Pasted-image-20251006195049-300x104.png 300w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/10\/Pasted-image-20251006195049-768x265.png 768w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/10\/Pasted-image-20251006195049-1536x530.png 1536w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/10\/Pasted-image-20251006195049-2048x707.png 2048w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"274\" src=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/10\/Pasted-image-20251006195114-1024x274.png\" alt=\"\" class=\"wp-image-325\" srcset=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/10\/Pasted-image-20251006195114-1024x274.png 1024w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/10\/Pasted-image-20251006195114-300x80.png 300w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/10\/Pasted-image-20251006195114-768x206.png 768w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/10\/Pasted-image-20251006195114-1536x411.png 1536w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/10\/Pasted-image-20251006195114-2048x548.png 2048w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>Successfully obtained a usable Kerberos ticket for a privileged account, which then allowed authenticated access to otherwise-restricted services.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"843\" src=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/10\/Pasted-image-20251006195134-1024x843.png\" alt=\"\" class=\"wp-image-326\" srcset=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/10\/Pasted-image-20251006195134-1024x843.png 1024w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/10\/Pasted-image-20251006195134-300x247.png 300w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/10\/Pasted-image-20251006195134-768x632.png 768w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/10\/Pasted-image-20251006195134.png 1416w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>Decoded the Base64-encoded ticket into its binary <code>.kirbi<\/code>\/<code>.ccache<\/code> form and then converted it to the format required by our tooling (e.g., ccache).<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"285\" src=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/10\/Pasted-image-20251006195158-1024x285.png\" alt=\"\" class=\"wp-image-327\" srcset=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/10\/Pasted-image-20251006195158-1024x285.png 1024w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/10\/Pasted-image-20251006195158-300x83.png 300w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/10\/Pasted-image-20251006195158-768x213.png 768w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/10\/Pasted-image-20251006195158.png 1202w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>I then converted the ticket to (KRB5CCNAME) and used it with <code>impacket-psexec -k -no-pass<\/code> to authenticate to <code>dc.support.htb<\/code> as <code>administrator@dc.support.htb<\/code>, found a writable <code>ADMIN$<\/code> share, uploaded a payload and created a service.<br>Service started successfully and elevated to <strong>NT AUTHORITY\\SYSTEM<\/strong>, giving full system control on the domain controller.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"403\" src=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/10\/Pasted-image-20251006195215-1024x403.png\" alt=\"\" class=\"wp-image-328\" srcset=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/10\/Pasted-image-20251006195215-1024x403.png 1024w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/10\/Pasted-image-20251006195215-300x118.png 300w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/10\/Pasted-image-20251006195215-768x303.png 768w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/10\/Pasted-image-20251006195215-1536x605.png 1536w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/10\/Pasted-image-20251006195215.png 1584w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>I started with an nmap scan for all TCP ports and the top UDP ports. This one looks like an Active Directory Domain Controller. Added target hostnames to \/etc\/hosts Looking through the SMB shares, I found one &#8220;support-tools&#8221; that is not default. Looking into the share with guest access, I [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":247,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3,4],"tags":[],"class_list":["post-246","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","category-pentesting"],"brizy_media":[],"_links":{"self":[{"href":"https:\/\/thecyberstaff.com\/index.php?rest_route=\/wp\/v2\/posts\/246","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/thecyberstaff.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/thecyberstaff.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/thecyberstaff.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/thecyberstaff.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=246"}],"version-history":[{"count":2,"href":"https:\/\/thecyberstaff.com\/index.php?rest_route=\/wp\/v2\/posts\/246\/revisions"}],"predecessor-version":[{"id":329,"href":"https:\/\/thecyberstaff.com\/index.php?rest_route=\/wp\/v2\/posts\/246\/revisions\/329"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/thecyberstaff.com\/index.php?rest_route=\/wp\/v2\/media\/247"}],"wp:attachment":[{"href":"https:\/\/thecyberstaff.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=246"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/thecyberstaff.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=246"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/thecyberstaff.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=246"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}