Member-only story

HTB AD Track: Blackfield Walkthrough

Param Dave
7 min readMay 4, 2024

--

Hello Everyone!! Here’s my writeup for the machine Blackfield.

Let’s start scanning and enumeration of the target machine using Nmap.

Command: sudo nmap -sS -T4 -A -p- -oA <output_file> <target-ip>

-sS: TCP SYN Scan

-T4: Faster scan time

-A: Enables OS and version detection, scans ports using common nmap scripts for specific vulnerabilities and performs traceroute.

-p-: Scan all 65535 ports

-oA: Save scan in 3 file formats (.nmap, .xml, .gnmap)

<output_file>: Replace with a file name of your choice

<target-ip>: Replace with the given IP address of the target machine

Following are the ports and services discovered along with result of some default Nmap scripts.

Nmap Scan output

The results are a clear indicator that we’re dealing with AD.

Port-by-port enumeration reveals the following:

Port 53 — Nothing interesting.

Port 135 — Anonymous login allowed but unable to run any commands within the session.

Port 445 — Anonymous login allowed and have read…

--

--

Param Dave
Param Dave

No responses yet