Posts: 33
Threads: 4
Joined: Jun 2023
Jan 20, 2024, 10:00 PM
(This post was last modified: Jan 20, 2024, 10:03 PM by raiderado.)
(Jan 20, 2024, 09:33 PM)ajasjas Wrote: It's a DC, it has a DNS server.... you brute force subdomains via DNS using the host as the resolver. If it exists it will resolve it, if not it will return NX or such. gobuster does this, every other tool for DNS bruteforcing does it too.
I have one question. What if the target is not a DNS server, what custom DNS resolver we give in that case with Gobuster. Gateway IP ?
Posts: 9
Threads: 0
Joined: Jan 2024
(Jan 20, 2024, 09:51 PM)Shalabi Wrote: (Jan 20, 2024, 09:47 PM)youssefm55 Wrote: (Jan 20, 2024, 09:33 PM)ajasjas Wrote: It's a DC, it has a DNS server.... you brute force subdomains via DNS using the host as the resolver. If it exists it will resolve it, if not it will return NX or such. gobuster does this, every other tool for DNS bruteforcing does it too.
I am doing this but no results are coming out
You have to use dns param not vhost this was the command I used is there sth wrong about it??
gobuster dns -d analysis.htb -w /usr/share/wordlists/SecLists/Discovery/DNS/subdomains-top1million-20000.txt
Posts: 33
Threads: 4
Joined: Jun 2023
Jan 20, 2024, 10:02 PM
(This post was last modified: Jan 20, 2024, 10:02 PM by raiderado.)
(Jan 20, 2024, 10:00 PM)youssefm55 Wrote: (Jan 20, 2024, 09:51 PM)Shalabi Wrote: (Jan 20, 2024, 09:47 PM)youssefm55 Wrote: (Jan 20, 2024, 09:33 PM)ajasjas Wrote: It's a DC, it has a DNS server.... you brute force subdomains via DNS using the host as the resolver. If it exists it will resolve it, if not it will return NX or such. gobuster does this, every other tool for DNS bruteforcing does it too.
I am doing this but no results are coming out
You have to use dns param not vhost this was the command I used is there sth wrong about it??
gobuster dns -d analysis.htb -w /usr/share/wordlists/SecLists/Discovery/DNS/subdomains-top1million-20000.txt
include -r DNSIP: PORT
Posts: 9
Threads: 0
Joined: Jan 2024
(Jan 20, 2024, 10:02 PM)raiderado Wrote: (Jan 20, 2024, 10:00 PM)youssefm55 Wrote: (Jan 20, 2024, 09:51 PM)Shalabi Wrote: (Jan 20, 2024, 09:47 PM)youssefm55 Wrote: (Jan 20, 2024, 09:33 PM)ajasjas Wrote: It's a DC, it has a DNS server.... you brute force subdomains via DNS using the host as the resolver. If it exists it will resolve it, if not it will return NX or such. gobuster does this, every other tool for DNS bruteforcing does it too.
I am doing this but no results are coming out
You have to use dns param not vhost this was the command I used is there sth wrong about it??
gobuster dns -d analysis.htb -w /usr/share/wordlists/SecLists/Discovery/DNS/subdomains-top1million-20000.txt
include -r DNSIP: PORT
ok great thanks bro
Posts: 312
Threads: 7
Joined: Oct 2023
Found: www.analysis.htb
Found: internal.analysis.htb
Found: domaindnszones.analysis.htb
Found: forestdnszones.analysis.htb
Posts: 9
Threads: 0
Joined: Jan 2024
(Jan 20, 2024, 10:20 PM)Art10n Wrote: Found: www.analysis.htb
Found: internal.analysis.htb
Found: domaindnszones.analysis.htb
Found: forestdnszones.analysis.htb also there is gc._msdcs.analysis.htb
Posts: 37
Threads: 1
Joined: Dec 2023
list.php?name= is an injectable ldap query.
So far all I can do is get a few usernames, and enumerate a bunch of uninstersting ldap attributes.
Guessing login form is also an ldap injection.
Posts: 3
Threads: 0
Joined: Jan 2024
Posts: 312
Threads: 7
Joined: Oct 2023
[+] VALID USERNAME: jdoe@analysis.htb
[+] VALID USERNAME: ajohnson@analysis.htb
[+] VALID USERNAME: cwilliams@analysis.htb
[+] VALID USERNAME: wsmith@analysis.htb
[+] VALID USERNAME: jangel@analysis.htb
[+] VALID USERNAME: technician@analysis.htb
Posts: 14
Threads: 0
Joined: Jan 2024
Jan 20, 2024, 11:06 PM
(This post was last modified: Jan 20, 2024, 11:08 PM by Dr1s.)
Also anonymos login is eanbled in port 135 rpc.... use rpcclient
(Jan 20, 2024, 10:54 PM)Art10n Wrote: [+] VALID USERNAME: jdoe@analysis.htb
[+] VALID USERNAME: ajohnson@analysis.htb
[+] VALID USERNAME: cwilliams@analysis.htb
[+] VALID USERNAME: wsmith@analysis.htb
[+] VALID USERNAME: jangel@analysis.htb
[+] VALID USERNAME: technician@analysis.htb
how did u found this?
|