ツール nmap enum4linux smbmap smbclient gpp-decrypt SharpHound.exe BloodHound Impacket: GetUserSPNs.py john Impacket: psexec.py 詳細手順 ネットワークサービススキャン nmap IPアドレス 10.10.10.100をactive.htbとして、/etc/hostsに追加します。その上で、nmapを使用し、ポートスキャンを実行します。 $ nmap -T4 -A -v active.htb Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-05 01:26 EST Nmap scan report for active.htb (10.10.10.100) Host is up (0.22s latency). Not
![【HackTheBox】Active - Walkthrough - - Qiita](https://cdn-ak-scissors.b.st-hatena.com/image/square/bae9e85b2114a61e3c0fbf2c3ec802d87828097d/height=288;version=1;width=512/https%3A%2F%2Fqiita-user-contents.imgix.net%2Fhttps%253A%252F%252Fcdn.qiita.com%252Fassets%252Fpublic%252Farticle-ogp-background-412672c5f0600ab9a64263b751f1bc81.png%3Fixlib%3Drb-4.0.0%26w%3D1200%26mark64%3DaHR0cHM6Ly9xaWl0YS11c2VyLWNvbnRlbnRzLmltZ2l4Lm5ldC9-dGV4dD9peGxpYj1yYi00LjAuMCZ3PTk3MiZoPTM3OCZ0eHQ9JUUzJTgwJTkwSGFja1RoZUJveCVFMyU4MCU5MUFjdGl2ZSUyMC0lMjBXYWxrdGhyb3VnaCUyMC0mdHh0LWFsaWduPWxlZnQlMkN0b3AmdHh0LWNvbG9yPSUyMzIxMjEyMSZ0eHQtZm9udD1IaXJhZ2lubyUyMFNhbnMlMjBXNiZ0eHQtc2l6ZT01NiZzPWU0OTUwMDgxOTEzZDM4Yzc0MmViYTQzMTEyNzc5OWMx%26mark-x%3D142%26mark-y%3D57%26blend64%3DaHR0cHM6Ly9xaWl0YS11c2VyLWNvbnRlbnRzLmltZ2l4Lm5ldC9-dGV4dD9peGxpYj1yYi00LjAuMCZoPTc2Jnc9NzcwJnR4dD0lNDB2X2F2ZW5nZXImdHh0LWNvbG9yPSUyMzIxMjEyMSZ0eHQtZm9udD1IaXJhZ2lubyUyMFNhbnMlMjBXNiZ0eHQtc2l6ZT0zNiZ0eHQtYWxpZ249bGVmdCUyQ3RvcCZzPWI3MTNlNDJmNTc0ODQ2ZmZlZTYwYzk1Y2U4MDQ2ZWRl%26blend-x%3D142%26blend-y%3D436%26blend-mode%3Dnormal%26txt64%3DaW4g44OI44Os44Oz44OJ44Oe44Kk44Kv44Ot5qCq5byP5Lya56S-77yIVHJlbmQgTWljcm_vvIk%26txt-width%3D770%26txt-clip%3Dend%252Cellipsis%26txt-color%3D%2523212121%26txt-font%3DHiragino%2520Sans%2520W6%26txt-size%3D36%26txt-x%3D156%26txt-y%3D536%26s%3D45d11ae290fb6d47cfdfac8a21085173)