Machine IP: 10.10.11.90
Difficulty: Medium
Target OS: Windows
Reconnaissance Phase
Initial Port Scanning — Deep Dive
The reconnaissance phase is the foundation of any penetration test. We used Nmap with aggressive scanning options to perform comprehensive service enumeration:
nmap -p 1-65535 -T4 -A -v 10.10.11.90
Command Breakdown:
-p 1-65535: Scans all 65,535 TCP ports-T4: Sets timing template to "aggressive" (fast scan)-A: Enables OS detection, version detection, script scanning, and traceroute-v: Verbose output for real-time results
What We Discovered:
Only one open port — 1433/TCP running Microsoft SQL Server 2022 RTM (16.00.1000.00)
NTLM leakage in SSL handshake revealed the hostname:
DC01.SIGNED.HTB(domain controller)The service is secured with a self-signed certificate (SSL_Self_Signed_Fallback)
Attack Surface Summary
Single Point of Entry via MSSQL
Domain Controller Context: SQL Server on a DC
Test/Prod Crossover: Self-signed SSL in a domain context

