Hercules
HackTheBox Hercules machine writeup — reconnaissance and enumeration walkthrough.
Hercules
Phase 1: Reconnaissance & Enumeration
Initial Port Scan
1
nmap -p- -sCV -T4 10.10.11.91 -oN nmap_full.txt
Key Findings:
- Port 53 (DNS): Domain Controller
- Port 88 (Kerberos): Authentication service
- Port 389/636 (LDAP/LDAPS): Directory services
- Port 443 (HTTPS): Web application at
https://hercules.htb - Port 5986 (WinRM SSL): Remote management
Learning Point: These ports indicate a Windows Active Directory Domain Controller. The presence of HTTPS suggests a web application integrated with AD authentication.
Host Configuration
1
2
# Add to /etc/hosts (DC hostname MUST come first for Kerberos SPN resolution)
echo "10.10.11.91 dc.hercules.htb hercules.htb" | sudo tee -a /etc/hosts
Why this order matters: When LDAP/Kerberos clients resolve hostnames, the PRIMARY hostname determines the Service Principal Name (SPN). ldap/dc.hercules.htb@HERCULES.HTB will work, but ldap/hercules.htb@HERCULES.HTB will fail.
Premium Content
The full exploitation walkthrough, privilege escalation, and flags are available exclusively for members.
Unlock Full Writeup → This post is licensed under CC BY 4.0 by the author.