RetroTwo

#easy #windows

https://app.hackthebox.com/machines/685arrow-up-right


Enumeración

sudo nmap -p- -sS --min-rate 5000 -Pn -n -vv 10.129.73.77 -oA allPorts
PORT      STATE SERVICE          REASON
53/tcp    open  domain           syn-ack ttl 127
88/tcp    open  kerberos-sec     syn-ack ttl 127
135/tcp   open  msrpc            syn-ack ttl 127
139/tcp   open  netbios-ssn      syn-ack ttl 127
389/tcp   open  ldap             syn-ack ttl 127
445/tcp   open  microsoft-ds     syn-ack ttl 127
464/tcp   open  kpasswd5         syn-ack ttl 127
593/tcp   open  http-rpc-epmap   syn-ack ttl 127
636/tcp   open  ldapssl          syn-ack ttl 127
3268/tcp  open  globalcatLDAP    syn-ack ttl 127
3269/tcp  open  globalcatLDAPssl syn-ack ttl 127
3389/tcp  open  ms-wbt-server    syn-ack ttl 127
5722/tcp  open  msdfsr           syn-ack ttl 127
9389/tcp  open  adws             syn-ack ttl 127
49154/tcp open  unknown          syn-ack ttl 127
49155/tcp open  unknown          syn-ack ttl 127
49157/tcp open  unknown          syn-ack ttl 127
49158/tcp open  unknown          syn-ack ttl 127
49164/tcp open  unknown          syn-ack ttl 127

En PowerShell

User flag

circle-check

https://github.com/itm4n/Perfusionarrow-up-right

Instalar

  • MSVC v142 - VS 2019 C++ x64/x86 build tools

  • Windows 10 SDK

En Developer Command Prompt for VS 2022

Transferir el ejecutable

Máquina víctima

Máquina atacante

Ejecutar Perfusion.exe

Root flag

circle-check

Last updated