NanoCorp
HackTheBox NanoCorp machine writeup — reconnaissance and enumeration walkthrough.
NanoCorp
1. Reconnaissance & Enumeration
1.1 Network Discovery
Starting with a comprehensive port scan to identify all available services:
1
nmap -sC -sV -p- 10.10.11.93 -oN nanocorp_scan.txt
Scan Results:
1
2
3
4
5
6
7
8
9
10
11
12
13
14
PORT STATE SERVICE VERSION
53/tcp open domain Simple DNS Plus
80/tcp open http Apache httpd 2.4.58 (OpenSSL/3.1.3 PHP/8.2.12)
88/tcp open kerberos-sec Microsoft Windows Kerberos
135/tcp open msrpc Microsoft Windows RPC
139/tcp open netbios-ssn Microsoft Windows netbios-ssn
389/tcp open ldap Microsoft Windows Active Directory LDAP (Domain: nanocorp.htb)
445/tcp open microsoft-ds?
464/tcp open kpasswd5?
593/tcp open ncacn_http Microsoft Windows RPC over HTTP 1.0
636/tcp open ldapssl?
3269/tcp open globalcatLDAPssl?
5986/tcp open ssl/http Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP) - WinRM SSL
9389/tcp open mc-nmf .NET Message Framing
1.2 Key Findings from Reconnaissance
The scan reveals several critical services:
- Port 80 (HTTP): Apache web server redirecting to nanocorp.htb
- Port 88 (Kerberos): Active Directory domain controller
- Port 389/636 (LDAP/LDAPS): Directory services
- Port 445 (SMB): File sharing protocol
- Port 5986 (WinRM SSL): Remote management over HTTPS
The presence of Kerberos, LDAP, and the domain name nanocorp.htb confirms this is a Windows Active Directory environment with the hostname dc01.nanocorp.htb.
1.3 Host Configuration
Add the discovered domain to /etc/hosts:
1
echo "10.10.11.93 nanocorp.htb dc01.nanocorp.htb" | sudo tee -a /etc/hosts
Premium Content
The full exploitation walkthrough, privilege escalation, and flags are available exclusively for members.
Unlock Full Writeup → This post is licensed under CC BY 4.0 by the author.