Member-only story
HTB AD Track: Resolute Walkthrough
Hello Everyone!! Here’s my writeup for the machine Resolute.
We begin our scanning and enumeration of the target machine using Nmap.
Command: nmap -sS -T4 -A -p- -oA <output_file> <target-ip>
-sS: TCP SYN Scan
-T4: Faster scan time
-A: Enables OS and version detection, scans ports using common nmap scripts for specific vulnerabilities and performs traceroute.
-p-: Scan all 65535 ports
-oA: Save scan in 3 file formats (.nmap, .xml, .gnmap)
<output_file>: Replace with a file name of your choice
<target-ip>: Replace with the given IP address of the target machine
Following ports and services are discovered:
Port-by-port enumeration reveals the following:
Port 53 — Nothing interesting here.
Port 135 — Able to enumerate list of users as shown below after anonymous login to msrpc.
Command: rpcclient -U ‘’-N <target-ip>
Within rpcclient, use enumdomusers command to list out all existing domain users.